Dated: 12-11-2024 Ch02. Security Overlay of an Enterprise Architecture - 2 (traffic flows) What are the traffic flows specific to good security design?