1. A strong security process contains several layers of operational functionality. Discuss any five layers of operational functionality 2. An organization’s security implementation plan can be launched and established using a series of best practices. Discuss any ten of these best practices. 3. Explain five challenges that can be experienced when carrying out an information systems audit