1. The document discusses threat modeling and security principles like reducing attack surface, defense in depth, and least privilege. It provides examples of how these principles can be applied, like turning off unused ports and services to reduce attack surface.
2. Defense in depth is explained as having multiple layers of defense so that if one layer is breached, the next prevents damage. An example is provided of how Windows Server 2003 was unaffected by a vulnerability through defense in depth techniques.
3. These include changes to the underlying code, default configuration differences, and additional protections like buffer overrun detection that together prevented exploitation even if the vulnerability was present.