Cyber Security

Read through each report below:

Vilcinskas, M. (n.d.). Security entities building block architecture (Links to an external site.). Retrieved from https://msdn.microsoft.com/en-us/library/cc723497.aspx
Dodds, T., & Pfeil, K. (n.d.). Security considerations for end systems (Links to an external site.). Retrieved from https://msdn.microsoft.com/en-us/library/cc723491.aspx
Microsoft Developer Network. (n.d.). Security considerations for administrative authority (Links to an external site.). Retrieved from https://msdn.microsoft.com/en-us/library/cc723501.aspx
Based on the whitepapers as well as outside sources and class readings, respond to the following:

What are the goals and objectives of enterprise security architecture?
How does enterprise security architecture within the articles support business goals and strategy?
What are some of the important complexities to consider when developing the enterprise security architecture? Why?
Discuss the importance of people and their roles when creating an enterprise security architecture.
What is the relation between process and technology?