Security

Your duties as Insecure University’s security administrator just got even more interesting because they are now sold on the fact that a proactive approach to security is their only option. They want a multi-layered security approach, but need you to provide a more granular snapshot of what a DID architecture means for them. You are asked to turn the DID diagram from last week into a slideshow/PowerPoint presentation and elaborate on each layer of security in regards to Insecure University.
What solutions will provide Insecure University with a DID architecture. Please go into depth on each layer (types of firewalls, what does OS hardening consist of, definition of strong authentication, user awareness activities, IDS or IPS?, these are just examples to give you an idea of what I am looking for relative to each layer.)

==============