1. Describe at least two (2) methods that business owners could use in order to protect the privacy of both personal information and organizational data resources related to the web and information technologies. Provide one (1) example of the use of each method to support your response.2. Analyze the design process for defining a customized security solution. Give your opinion as to which step in this design process is most significant.3. Analyze the key functions a Chief Information Officer (CIO) performs to define, develop, implement, and support ongoing security countermeasures. Determine the function that you believe is the most important in supporting the security of information.