Effective physical defenses also support the digital defensive mechanisms by restraining access to the network workstations and servers.
Recent events have led to extensive focus on the dangers of insider threat to information and information systems. Consequently, much more time has been spent in detailing how to employ layered digital defenses against the insider threat. In the technical environment, like the physical, the “concurrent employment of protection tools of different origins and the same fundamental purpose provides variability in the technical approach to protection. This increases the likelihood of success”.134
Thus a combination of policies, physical controls, and technical controls, such as firewalls, intrusion ...