1.What is the concept of depth? What are the different kinds of layers that can be placed between an asset and unsecure network? (1 page content) (Refer cyber_Attacks_chapter_6 ppt and attached textbook) 2. Is simply hiding vulnerabilities and other system architecture information a solid method of defense? What methods would you suggest?(1 page content) (Refer attached text book chapter 7) Should be in APA format, need in-text citations .