Recognize and explain Trust/Security Domain boundaries which may be applicable to the personal computer (workstation) security in the business context. In your analysis, consider when it is suitable to assume that the room the machine is placed in, the machine itself or some application within the machine, are within different boundaries.