As relates to Information security, you are required to provide ONLY the 5-step process for solving problems. Be specific to the points and NOT MORE than two lines of explanation for each step. Follow this instruction, or else your submission will not be graded.