SlideShare a Scribd company logo
1 of 2
Description:
Defense-in-Depth, an IA concept refers to multiple layers of
security controls placed throughout an IT system. Post a brief
summary of examples of these types of controls in action and
your experience with at least one of type of control. Illustrate
whether or not you believe, in your experience, this approach is
effective. Be sure to indicate in what domain your example
occurs:
User domain - any user of our systems falls in this domain,
whether inside or outside our organization
Workstation domain - not just computers, but any device our
users use
LAN domain - each LAN and the devices that make a LAN work
WAN domain - the system that links devices across long
distances; typically this is the Internet which is used by most
businesses
LAN-to-WAN domain - the infrastructure and devices that
connect our organization's LANs to the WAN system
Remote Access domain - the technologies used by our mobile
and remote users to connect to their customary resources; can
include VPN solutions and encryption technology
System/Application domain - technologies used to actually
conduct business functions, as opposed to making connections
of various types
Description  Defense-in-Depth, an IA concept refers to multip.docx

More Related Content

Similar to Description  Defense-in-Depth, an IA concept refers to multip.docx

Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentCryptzone
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfaquazac
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-HiChapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-HiEstelaJeffery653
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfjibinsh
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfatimagull32
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That WorksBrett L. Scott
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configurationVon Alvarez
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranetvikashchauhan908
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System SecurityAmber Wheeler
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcKristen Wilson
 

Similar to Description  Defense-in-Depth, an IA concept refers to multip.docx (20)

Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
Firewall and vpn
Firewall and vpnFirewall and vpn
Firewall and vpn
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSo
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
Network security
Network securityNetwork security
Network security
 
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-HiChapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 

More from donaldp2

DescriptionRefer to this resource when completing the Its All .docx
DescriptionRefer to this resource when completing the Its All .docxDescriptionRefer to this resource when completing the Its All .docx
DescriptionRefer to this resource when completing the Its All .docxdonaldp2
 
DescriptionPresentation Assignment – Revised (November 16, 2.docx
DescriptionPresentation Assignment – Revised (November 16, 2.docxDescriptionPresentation Assignment – Revised (November 16, 2.docx
DescriptionPresentation Assignment – Revised (November 16, 2.docxdonaldp2
 
DescriptionInfographics represent information in a visual m.docx
DescriptionInfographics represent information in a visual m.docxDescriptionInfographics represent information in a visual m.docx
DescriptionInfographics represent information in a visual m.docxdonaldp2
 
DescriptionIn this activity, you will analyze and study the subj.docx
DescriptionIn this activity, you will analyze and study the subj.docxDescriptionIn this activity, you will analyze and study the subj.docx
DescriptionIn this activity, you will analyze and study the subj.docxdonaldp2
 
DescriptionImplement a basic Calculator using an Arduino, pus.docx
DescriptionImplement a basic Calculator using an Arduino, pus.docxDescriptionImplement a basic Calculator using an Arduino, pus.docx
DescriptionImplement a basic Calculator using an Arduino, pus.docxdonaldp2
 
DescriptionFor this assignment, students will choose something .docx
DescriptionFor this assignment, students will choose something .docxDescriptionFor this assignment, students will choose something .docx
DescriptionFor this assignment, students will choose something .docxdonaldp2
 
DescriptionDefend your choice of topic in 500 words or more..docx
DescriptionDefend your choice of topic in 500 words or more..docxDescriptionDefend your choice of topic in 500 words or more..docx
DescriptionDefend your choice of topic in 500 words or more..docxdonaldp2
 
DescriptionDebate  on a wide variety of issues in the United.docx
DescriptionDebate  on a wide variety of issues in the United.docxDescriptionDebate  on a wide variety of issues in the United.docx
DescriptionDebate  on a wide variety of issues in the United.docxdonaldp2
 
DescriptionAlpha is the best platform for entertainment to tel.docx
DescriptionAlpha is the best platform for entertainment to tel.docxDescriptionAlpha is the best platform for entertainment to tel.docx
DescriptionAlpha is the best platform for entertainment to tel.docxdonaldp2
 
DescriptionAnalyze  the parody of the show. The message bein.docx
DescriptionAnalyze  the parody of the show. The message bein.docxDescriptionAnalyze  the parody of the show. The message bein.docx
DescriptionAnalyze  the parody of the show. The message bein.docxdonaldp2
 
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docxDESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docxdonaldp2
 
Description Watch President Ronald Reagan’s 1983 speech to the Na.docx
Description Watch President Ronald Reagan’s 1983 speech to the Na.docxDescription Watch President Ronald Reagan’s 1983 speech to the Na.docx
Description Watch President Ronald Reagan’s 1983 speech to the Na.docxdonaldp2
 
Description Total Possible Score 30.00Distinguished .docx
Description Total Possible Score 30.00Distinguished .docxDescription Total Possible Score 30.00Distinguished .docx
Description Total Possible Score 30.00Distinguished .docxdonaldp2
 
Description Total Possible Score 16.00Distinguished .docx
Description Total Possible Score 16.00Distinguished .docxDescription Total Possible Score 16.00Distinguished .docx
Description Total Possible Score 16.00Distinguished .docxdonaldp2
 
Description The scenario description and requirements for Short.docx
Description The scenario description and requirements for Short.docxDescription The scenario description and requirements for Short.docx
Description The scenario description and requirements for Short.docxdonaldp2
 
Description Research the internet for an example of a violation.docx
Description Research the internet for an example of a violation.docxDescription Research the internet for an example of a violation.docx
Description Research the internet for an example of a violation.docxdonaldp2
 
Description Presentation (500 words + 10minutes)Percentage 40.docx
Description Presentation (500 words + 10minutes)Percentage 40.docxDescription Presentation (500 words + 10minutes)Percentage 40.docx
Description Presentation (500 words + 10minutes)Percentage 40.docxdonaldp2
 
Description of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docxDescription of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docxdonaldp2
 
Description of the toolUsages and meritsYour own demonstration.docx
Description of the toolUsages and meritsYour own demonstration.docxDescription of the toolUsages and meritsYour own demonstration.docx
Description of the toolUsages and meritsYour own demonstration.docxdonaldp2
 
Description of the AssignmentThe assignment provides an oppo.docx
Description of the AssignmentThe assignment provides an oppo.docxDescription of the AssignmentThe assignment provides an oppo.docx
Description of the AssignmentThe assignment provides an oppo.docxdonaldp2
 

More from donaldp2 (20)

DescriptionRefer to this resource when completing the Its All .docx
DescriptionRefer to this resource when completing the Its All .docxDescriptionRefer to this resource when completing the Its All .docx
DescriptionRefer to this resource when completing the Its All .docx
 
DescriptionPresentation Assignment – Revised (November 16, 2.docx
DescriptionPresentation Assignment – Revised (November 16, 2.docxDescriptionPresentation Assignment – Revised (November 16, 2.docx
DescriptionPresentation Assignment – Revised (November 16, 2.docx
 
DescriptionInfographics represent information in a visual m.docx
DescriptionInfographics represent information in a visual m.docxDescriptionInfographics represent information in a visual m.docx
DescriptionInfographics represent information in a visual m.docx
 
DescriptionIn this activity, you will analyze and study the subj.docx
DescriptionIn this activity, you will analyze and study the subj.docxDescriptionIn this activity, you will analyze and study the subj.docx
DescriptionIn this activity, you will analyze and study the subj.docx
 
DescriptionImplement a basic Calculator using an Arduino, pus.docx
DescriptionImplement a basic Calculator using an Arduino, pus.docxDescriptionImplement a basic Calculator using an Arduino, pus.docx
DescriptionImplement a basic Calculator using an Arduino, pus.docx
 
DescriptionFor this assignment, students will choose something .docx
DescriptionFor this assignment, students will choose something .docxDescriptionFor this assignment, students will choose something .docx
DescriptionFor this assignment, students will choose something .docx
 
DescriptionDefend your choice of topic in 500 words or more..docx
DescriptionDefend your choice of topic in 500 words or more..docxDescriptionDefend your choice of topic in 500 words or more..docx
DescriptionDefend your choice of topic in 500 words or more..docx
 
DescriptionDebate  on a wide variety of issues in the United.docx
DescriptionDebate  on a wide variety of issues in the United.docxDescriptionDebate  on a wide variety of issues in the United.docx
DescriptionDebate  on a wide variety of issues in the United.docx
 
DescriptionAlpha is the best platform for entertainment to tel.docx
DescriptionAlpha is the best platform for entertainment to tel.docxDescriptionAlpha is the best platform for entertainment to tel.docx
DescriptionAlpha is the best platform for entertainment to tel.docx
 
DescriptionAnalyze  the parody of the show. The message bein.docx
DescriptionAnalyze  the parody of the show. The message bein.docxDescriptionAnalyze  the parody of the show. The message bein.docx
DescriptionAnalyze  the parody of the show. The message bein.docx
 
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docxDESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
 
Description Watch President Ronald Reagan’s 1983 speech to the Na.docx
Description Watch President Ronald Reagan’s 1983 speech to the Na.docxDescription Watch President Ronald Reagan’s 1983 speech to the Na.docx
Description Watch President Ronald Reagan’s 1983 speech to the Na.docx
 
Description Total Possible Score 30.00Distinguished .docx
Description Total Possible Score 30.00Distinguished .docxDescription Total Possible Score 30.00Distinguished .docx
Description Total Possible Score 30.00Distinguished .docx
 
Description Total Possible Score 16.00Distinguished .docx
Description Total Possible Score 16.00Distinguished .docxDescription Total Possible Score 16.00Distinguished .docx
Description Total Possible Score 16.00Distinguished .docx
 
Description The scenario description and requirements for Short.docx
Description The scenario description and requirements for Short.docxDescription The scenario description and requirements for Short.docx
Description The scenario description and requirements for Short.docx
 
Description Research the internet for an example of a violation.docx
Description Research the internet for an example of a violation.docxDescription Research the internet for an example of a violation.docx
Description Research the internet for an example of a violation.docx
 
Description Presentation (500 words + 10minutes)Percentage 40.docx
Description Presentation (500 words + 10minutes)Percentage 40.docxDescription Presentation (500 words + 10minutes)Percentage 40.docx
Description Presentation (500 words + 10minutes)Percentage 40.docx
 
Description of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docxDescription of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docx
 
Description of the toolUsages and meritsYour own demonstration.docx
Description of the toolUsages and meritsYour own demonstration.docxDescription of the toolUsages and meritsYour own demonstration.docx
Description of the toolUsages and meritsYour own demonstration.docx
 
Description of the AssignmentThe assignment provides an oppo.docx
Description of the AssignmentThe assignment provides an oppo.docxDescription of the AssignmentThe assignment provides an oppo.docx
Description of the AssignmentThe assignment provides an oppo.docx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Description  Defense-in-Depth, an IA concept refers to multip.docx

  • 1. Description: Defense-in-Depth, an IA concept refers to multiple layers of security controls placed throughout an IT system. Post a brief summary of examples of these types of controls in action and your experience with at least one of type of control. Illustrate whether or not you believe, in your experience, this approach is effective. Be sure to indicate in what domain your example occurs: User domain - any user of our systems falls in this domain, whether inside or outside our organization Workstation domain - not just computers, but any device our users use LAN domain - each LAN and the devices that make a LAN work WAN domain - the system that links devices across long distances; typically this is the Internet which is used by most businesses LAN-to-WAN domain - the infrastructure and devices that connect our organization's LANs to the WAN system Remote Access domain - the technologies used by our mobile and remote users to connect to their customary resources; can include VPN solutions and encryption technology System/Application domain - technologies used to actually conduct business functions, as opposed to making connections of various types