Discuss the layered implementation of security.

What will be an ideal response?

One of the basic tenets of security architectures is the layered implementation of security. This layered approach is called defense in depth. To achieve defense in depth, an organization must establish multiple layers of security controls and safeguards, which can be organized into policy, training and education, and technology per the NSTISSC model. Although policy itself may not prevent attacks, it certainly prepares the organization to handle them, and coupled with other layers, it can deter attacks. This is true of training and education, which can also provide some defense against attacks stemming from employee ignorance and social engineering. Technology is also implemented in layers, with detection equipment working in tandem with reaction technology, all operating behind access control mechanisms.

Computer Science & Information Technology

You might also like to view...

If you have saved macros in your document, you want to save the document with what extension to ensure that they will work when the document is reopened?

A) .docx B) .domx C) .dotm D) .docm

Computer Science & Information Technology

___________________ provides a method for viewing a single surrounding image as if you were “inside” the picture and able to look up or down, turn, or zoom in on features.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology