Identify and describe what Security Domain(s) and sub-domains are applicable to personal computer (workstation) security in a business context. In your analysis, consider when it is appropriate to assume that the room the machine is placed in, the machine itself or some application within the machine, are within different domains/sub-domains. Note that a Security domain can exist within another security domain.