What are the first two lines of defense a company should take when addressing security risks?; What reroutes requests for legitimate websites to false websites?; What is hardware or software that guards a private network by analyzing?; What is the unauthorized use duplication distribution or sale of copyrighted software?