What are three primary activities in the cycle of building an enterprise security strategy? (Choose three