You are a security professional. You have been asked to develop strategies to protect data and file systems in a small Linux environment. The environment contains a Linux application server, a Linux web server, and 30 workstations and laptops. Several users connect to the network from their personal mobile devices.For this assignment: