1. Virtual security seems to work in some systems. Why is this so? Can you apply it in a network environment? Support your response.
2. Security best practices are security guidelines and policies aimed at enhancing system security. Can they work without known and proven security mechanisms?