The Defense-in-Depth Model
The following is the defense-in-depth model adopted from from Protect Your Windows Network : From Perimeter to Data by Jesper M. Johansson, Steve Riley.
- People, policies, and processes
- Physical security
- Perimeter
- Network
- Host
- Application
- Data
0 Comments:
Post a Comment
<< Home