Apply your protection plan to the network you created. Use the protection plan to discuss how you will protect each asset on the network you built in VirtualBox. You don’t need to protect Kali Linux, since this will not be considered part of your network, even though it is connected. Be precise, be specific, and be thorough. The report should be professionally written in docx format and include: Title page Table of Contents List of figures (if applicable, derived from images captioned properly) Introduction Main body divided with headings corresponding to each asset References Appendices (if needed) Consider having a glossary of terms to define technical terms used in the report. Use the 3rd-person narrative style. Avoid slang, jargon, and colloquialisms.