4Information Security Models


Just about everyone involved in information security has heard the term “defense-indepth,” the practice of building many layers of security into systems, networks, applications, or anything that needs to be secured. Defense-in-depth is creating several controls that are unique, but complement each other to provide effective protection.

Layered security is best recognized in a bank. They have guards, a safe, alarms, security cameras, and locked doors. If one of these were to fail, another corresponding security control would back it up. For example, if the guard is subdued, the alarm should detect the intruder. If ...

Get The Ethical Hack now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.