1. Identify and discuss at least three major evolutionary steps in digital computing/networking experienced in major organizations. If possible, provide such insight regarding your current or former organization. 2. How is the adoption of an enterprise security framework helpful for developing an enterprise security policy? 3. A. How does Donn Parker's model compare with the X.805 framework? B. If an organization consulted you about its decision on an enterprise security framework, which would you recommend and why?