Organizations must protect data in a variety of ways. In Chapter 11, you read about different methodologies on securing data in the enterprise. In Chapter 12, you also read about the different hardware topologies that data and database management systems reside on. Answer each of the following questions:
You must answer BOTH questions to earn FULL points for this discussion.
Spelling, citation, and grammar count towards your grade. Feedback to peer responses is also an integral part of your weekly participation)