1. Discuss two security mechanisms applied at the application layer. Are they safer than those applied at the lower network layer? Support your response.
2. Are there security mechanisms applicable at transport layer? Is it safer?
3. Discuss the difficulties encountered in enforcing security best practices.