Sunday, June 26, 2005

The Defense-in-Depth Model

The following is the defense-in-depth model adopted from from Protect Your Windows Network : From Perimeter to Data by Jesper M. Johansson, Steve Riley.
  • People, policies, and processes
  • Physical security
  • Perimeter
  • Network
  • Host
  • Application
  • Data

0 Comments:

Post a Comment

<< Home