Help


from Wikipedia
« »  
Recall the earlier discussion about administrative controls, logical controls, and physical controls.
The three types of controls can be used to form the basis upon which to build a defense-in-depth strategy.
With this approach, defense-in-depth can be conceptualized as three distinct layers or planes laid one on top of the other.
Additional insight into defense-in-depth can be gained by thinking of it as forming the layers of an onion, with data at the core of the onion, people the next outer layer of the onion, and network security, host-based security and application security forming the outermost layers of the onion.
Both perspectives are equally valid and each provides valuable insight into the implementation of a good defense-in-depth strategy.

1.798 seconds.