What are the benefits of layering security?

What will be an ideal response?

At any given time a bank may have tens of thousands of dollars in cash on hand. What security is used to protect the money from theft? There is not a single type of security, such as a front door with a strong lock. Rather, there are several types of security. In addition to a front door with a strong lock, there may also be video cameras, armed guards, motion detectors, and a vault.

Each of these types of bank security is designed to coordinate with the other types of security to create layers of protection around the money.A front door with a strong lock may be the first layer of security, followed by video cameras, motion detectors, armed guards, and finally the vault.The philosophy behind layering security is that an attacker who is able to penetrate one layer (by breaking down the front door) would then face additional layers of security (an armed guard, motion detectors, and a vault) before reaching the money. A layered approach has the advantage of creating a barrier of multiple defenses that can thwart a thief who is able to break through one layer. In addition, layers can prevent a variety of attacks: layers of security at a bank can stop both a midnight break-in as well as a holdup in broad daylight.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is TRUE regarding multitable queries?

A) Related tables never need to be previously established when you create a multitable query. B) If join lines do not appear between tables, the multitable query results will not be affected. C) Creating a multitable query is significantly different from creating a single-table query. D) Skill is required in choosing the right tables and managing table relationships.

Computer Science & Information Technology

Android requires the user’s permission to allow an app to save files. In Android 6.0, the app ________.

a. prompts the user at installation time with a complete list of permissions the app requires. b. prompts the user at installation time and execution time with a complete list of permissions the app requires. c. requests each permission individually at execution time, only when the permission is required to perform a given task for the first time. d. None of the above.

Computer Science & Information Technology