Apply your knowledge of the 5-step hacking process to perform proper security testing and penetration testing on the Systems/Applications Domain to achieve compliance. Describe what applications, tools, and methods you would use to assess the Systems/Applications Domain's compliance for ensuring the confidentiality of privacy data (HIPAA, GLBA, FERPA, etc.) and what security controls and counter measure are implemented or need to be implemented to achieve compliance.