In the lab, you defined the information systems security responsibility for each of the seven domains of a typical IT infrastructure. In which domain would you be most likely to secure access through the Internet and from employees’ homes?