What should you do to design a monitoring strategy for the folders that contain customer information?
What should you do to provide a solution which will meet the public Web site’s security requirements?