-Imagine you are a home based prudential elections consultant with a critical strategy electronic document that can help your team win the election. Discuss the critical threats to your data
-Explain with the aid of diagram how can use the defense in depth strategy to protect you critical strategy electronic documents.
-Demonstrate how the above would deter an attacker from reaching the protected document even after failure of one or two levels of control.