33 using fig 2.2 (“Knowledge sets that feed a security analysis”) as a guide, in your

To enhance the security of information systems, enterprises are developing and adopting information system management systems. However, if an information management system is exploited, applications and the data they contain will be compromised. Therefore, it is important to perform a comprehensive security analysis throughout the enterprise. In your own words explain (a) the purpose of an security analysis, and (b) using fig 2.2 (“Knowledge sets that feed a security analysis”) as a guide, in your own words briefly explain what each knowledge domain entails. Please state your answer in a 1-2 page paper in APA format.  Include citations and sources in APA style. Must requirements: Meets or exceeds established assignment criteria Demonstrates an understanding of lesson concepts Clearly presents well-reasoned ideas and concepts Uses proper mechanics, punctuation, sentence structure, spelling and APA structure