1. Recommend three countermeasures that could enhance the information security
measures of an enterprise. Justify your recommendations.
2. Summarize, in your own words, how the recommendations and framework of the EBK
can be adapted to a specific environment. Identify a process that can be used to
validate relevant application of the EBK to a specific environment.