Security Analysis and RemediationData Protection StrategySecure Internet Access – Proxy, Firewall, Caching ServerSecurity Audits