business challenges within the seven domains of it responsibility

Organizations of any size can have millions of transactions occurring every day between customers, employees, and suppliers. Today, many systems are automated. They generate their own transactions in the form of online product queries, searches, inventory checks, authorization checks, and log entries.

1. Explain the concept of defense-n-depth.

2. How does the use of security policies mitigate risks within the seven domains?

3. Discuss two methods for developing access control.