Problem
A. Choose a workgroup, client/server, WLAN, or (virtual private network) VPN layout from the Background Information (on network layouts) on this page and briefly outline the relationship between your chosen network layout and the seven domains of a typical IT infrastructure.
B. Briefly outline the vulnerabilities that exist in your chosen layout.
C. Determine which information security protocol meets the most pressing needs, considering the potential costs of deployment.
D. Put the information together in a compelling narrative addressing the major issues.