4Information Security Models


Just about everyone involved in information security has heard the term “defense-indepth,” the practice of building many layers of security into systems, networks, applications, or anything that needs to be secured. Defense-in-depth is creating several controls that are unique, but complement each other to provide effective protection.

Layered security is best recognized in a bank. They have guards, a safe, alarms, security cameras, and locked doors. If one of these were to fail, another corresponding security control would back it up. For example, if the guard is subdued, the alarm should detect the intruder. If ...

Get The Ethical Hack now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.