1. Describe at least two (2) methods that business owners could use in order to
protect the privacy of both personal information and organizational data
resources related to the web and information technologies. Provide one (1)
example of the use of each method to support your response.
2. Analyze the design process for defining a customized security solution. Give
your opinion as to which step in this design process is most significant.
3. Analyze the key functions a Chief Information Officer (CIO) performs to define,
develop, implement, and support ongoing security countermeasures. Determine the
function that you believe is the most important in supporting the security of