Group 3: Enterprise Secure and Not-Secure SubNetworks Your company Beta has some users, hosts, and data that require high-level security protection, while some users, hosts, and data that don't need high-level security protection, just need to prevent outsiders from accessing their data. Describe how you will design your system to accommodate both types of users, hosts, and data..