Need to 2-3 pages in APA format.Who is ultimately responsible for the security of information in an organization?What are the disadvantages of using a VPN instead of a leased line?If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, identify the different threat categories encompassed by this attack?What do VPNs do that firewalls cannot do?