Discussion Post: Corporate IT Security Audit Compliance
a) In your opinion, what defines the limits within the User Domain and validates user activities that would provide an important security layer in a defense-in-depth approach to system security.
b) Discuss this statement: "All of the domains in the IT infrastructure are important. Although it might be difficult to highlight any one domain over the others, the LAN Domain does tend to be where much of an organization's critical data resides". What is in the LAN Domain that makes this statement true?
The response must include a reference list. Using one-inch margins, double-space, Times New Roman 12 pnt font and APA style of writing and citations.