1. Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide your employees. Please explain your choices and why these policies are important.
2. Do you believe that everyone should be allowed to use a VPN for anonymity and to keep his or her browsing habits private? Why, or why not?