SlideShare a Scribd company logo
Description:
Defense-in-Depth, an IA concept refers to multiple layers of
security controls placed throughout an IT system. Post a brief
summary of examples of these types of controls in action and
your experience with at least one of type of control. Illustrate
whether or not you believe, in your experience, this approach is
effective. Be sure to indicate in what domain your example
occurs:
User domain - any user of our systems falls in this domain,
whether inside or outside our organization
Workstation domain - not just computers, but any device our
users use
LAN domain - each LAN and the devices that make a LAN work
WAN domain - the system that links devices across long
distances; typically this is the Internet which is used by most
businesses
LAN-to-WAN domain - the infrastructure and devices that
connect our organization's LANs to the WAN system
Remote Access domain - the technologies used by our mobile
and remote users to connect to their customary resources; can
include VPN solutions and encryption technology
System/Application domain - technologies used to actually
conduct business functions, as opposed to making connections
of various types
Description  Defense-in-Depth, an IA concept refers to multip.docx

More Related Content

Similar to Description  Defense-in-Depth, an IA concept refers to multip.docx

Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera Technologies
 
Firewall and vpn
Firewall and vpnFirewall and vpn
Firewall and vpn
Joseph Sebastian
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Cryptzone
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
IOSR Journals
 
Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSo
surya kumar palla
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
aquazac
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
willcoxjanay
 
Network security
Network securityNetwork security
Network security
Pooja Dewangan
 
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-HiChapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
EstelaJeffery653
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
jibinsh
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
fatimagull32
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
Brett L. Scott
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
vijay_m_chaudhary
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
Von Alvarez
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
vikashchauhan908
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
Kristen Wilson
 

Similar to Description  Defense-in-Depth, an IA concept refers to multip.docx (20)

Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
Firewall and vpn
Firewall and vpnFirewall and vpn
Firewall and vpn
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSo
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
Network security
Network securityNetwork security
Network security
 
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-HiChapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 

More from donaldp2

DescriptionRefer to this resource when completing the Its All .docx
DescriptionRefer to this resource when completing the Its All .docxDescriptionRefer to this resource when completing the Its All .docx
DescriptionRefer to this resource when completing the Its All .docx
donaldp2
 
DescriptionPresentation Assignment – Revised (November 16, 2.docx
DescriptionPresentation Assignment – Revised (November 16, 2.docxDescriptionPresentation Assignment – Revised (November 16, 2.docx
DescriptionPresentation Assignment – Revised (November 16, 2.docx
donaldp2
 
DescriptionInfographics represent information in a visual m.docx
DescriptionInfographics represent information in a visual m.docxDescriptionInfographics represent information in a visual m.docx
DescriptionInfographics represent information in a visual m.docx
donaldp2
 
DescriptionIn this activity, you will analyze and study the subj.docx
DescriptionIn this activity, you will analyze and study the subj.docxDescriptionIn this activity, you will analyze and study the subj.docx
DescriptionIn this activity, you will analyze and study the subj.docx
donaldp2
 
DescriptionImplement a basic Calculator using an Arduino, pus.docx
DescriptionImplement a basic Calculator using an Arduino, pus.docxDescriptionImplement a basic Calculator using an Arduino, pus.docx
DescriptionImplement a basic Calculator using an Arduino, pus.docx
donaldp2
 
DescriptionFor this assignment, students will choose something .docx
DescriptionFor this assignment, students will choose something .docxDescriptionFor this assignment, students will choose something .docx
DescriptionFor this assignment, students will choose something .docx
donaldp2
 
DescriptionDefend your choice of topic in 500 words or more..docx
DescriptionDefend your choice of topic in 500 words or more..docxDescriptionDefend your choice of topic in 500 words or more..docx
DescriptionDefend your choice of topic in 500 words or more..docx
donaldp2
 
DescriptionDebate  on a wide variety of issues in the United.docx
DescriptionDebate  on a wide variety of issues in the United.docxDescriptionDebate  on a wide variety of issues in the United.docx
DescriptionDebate  on a wide variety of issues in the United.docx
donaldp2
 
DescriptionAlpha is the best platform for entertainment to tel.docx
DescriptionAlpha is the best platform for entertainment to tel.docxDescriptionAlpha is the best platform for entertainment to tel.docx
DescriptionAlpha is the best platform for entertainment to tel.docx
donaldp2
 
DescriptionAnalyze  the parody of the show. The message bein.docx
DescriptionAnalyze  the parody of the show. The message bein.docxDescriptionAnalyze  the parody of the show. The message bein.docx
DescriptionAnalyze  the parody of the show. The message bein.docx
donaldp2
 
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docxDESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
donaldp2
 
Description Watch President Ronald Reagan’s 1983 speech to the Na.docx
Description Watch President Ronald Reagan’s 1983 speech to the Na.docxDescription Watch President Ronald Reagan’s 1983 speech to the Na.docx
Description Watch President Ronald Reagan’s 1983 speech to the Na.docx
donaldp2
 
Description Total Possible Score 30.00Distinguished .docx
Description Total Possible Score 30.00Distinguished .docxDescription Total Possible Score 30.00Distinguished .docx
Description Total Possible Score 30.00Distinguished .docx
donaldp2
 
Description Total Possible Score 16.00Distinguished .docx
Description Total Possible Score 16.00Distinguished .docxDescription Total Possible Score 16.00Distinguished .docx
Description Total Possible Score 16.00Distinguished .docx
donaldp2
 
Description The scenario description and requirements for Short.docx
Description The scenario description and requirements for Short.docxDescription The scenario description and requirements for Short.docx
Description The scenario description and requirements for Short.docx
donaldp2
 
Description Research the internet for an example of a violation.docx
Description Research the internet for an example of a violation.docxDescription Research the internet for an example of a violation.docx
Description Research the internet for an example of a violation.docx
donaldp2
 
Description Presentation (500 words + 10minutes)Percentage 40.docx
Description Presentation (500 words + 10minutes)Percentage 40.docxDescription Presentation (500 words + 10minutes)Percentage 40.docx
Description Presentation (500 words + 10minutes)Percentage 40.docx
donaldp2
 
Description of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docxDescription of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docx
donaldp2
 
Description of the toolUsages and meritsYour own demonstration.docx
Description of the toolUsages and meritsYour own demonstration.docxDescription of the toolUsages and meritsYour own demonstration.docx
Description of the toolUsages and meritsYour own demonstration.docx
donaldp2
 
Description of the AssignmentThe assignment provides an oppo.docx
Description of the AssignmentThe assignment provides an oppo.docxDescription of the AssignmentThe assignment provides an oppo.docx
Description of the AssignmentThe assignment provides an oppo.docx
donaldp2
 

More from donaldp2 (20)

DescriptionRefer to this resource when completing the Its All .docx
DescriptionRefer to this resource when completing the Its All .docxDescriptionRefer to this resource when completing the Its All .docx
DescriptionRefer to this resource when completing the Its All .docx
 
DescriptionPresentation Assignment – Revised (November 16, 2.docx
DescriptionPresentation Assignment – Revised (November 16, 2.docxDescriptionPresentation Assignment – Revised (November 16, 2.docx
DescriptionPresentation Assignment – Revised (November 16, 2.docx
 
DescriptionInfographics represent information in a visual m.docx
DescriptionInfographics represent information in a visual m.docxDescriptionInfographics represent information in a visual m.docx
DescriptionInfographics represent information in a visual m.docx
 
DescriptionIn this activity, you will analyze and study the subj.docx
DescriptionIn this activity, you will analyze and study the subj.docxDescriptionIn this activity, you will analyze and study the subj.docx
DescriptionIn this activity, you will analyze and study the subj.docx
 
DescriptionImplement a basic Calculator using an Arduino, pus.docx
DescriptionImplement a basic Calculator using an Arduino, pus.docxDescriptionImplement a basic Calculator using an Arduino, pus.docx
DescriptionImplement a basic Calculator using an Arduino, pus.docx
 
DescriptionFor this assignment, students will choose something .docx
DescriptionFor this assignment, students will choose something .docxDescriptionFor this assignment, students will choose something .docx
DescriptionFor this assignment, students will choose something .docx
 
DescriptionDefend your choice of topic in 500 words or more..docx
DescriptionDefend your choice of topic in 500 words or more..docxDescriptionDefend your choice of topic in 500 words or more..docx
DescriptionDefend your choice of topic in 500 words or more..docx
 
DescriptionDebate  on a wide variety of issues in the United.docx
DescriptionDebate  on a wide variety of issues in the United.docxDescriptionDebate  on a wide variety of issues in the United.docx
DescriptionDebate  on a wide variety of issues in the United.docx
 
DescriptionAlpha is the best platform for entertainment to tel.docx
DescriptionAlpha is the best platform for entertainment to tel.docxDescriptionAlpha is the best platform for entertainment to tel.docx
DescriptionAlpha is the best platform for entertainment to tel.docx
 
DescriptionAnalyze  the parody of the show. The message bein.docx
DescriptionAnalyze  the parody of the show. The message bein.docxDescriptionAnalyze  the parody of the show. The message bein.docx
DescriptionAnalyze  the parody of the show. The message bein.docx
 
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docxDESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
DESCRIPTION530 UNIT 4 QUESTION 3 Examine how knowledge of a.docx
 
Description Watch President Ronald Reagan’s 1983 speech to the Na.docx
Description Watch President Ronald Reagan’s 1983 speech to the Na.docxDescription Watch President Ronald Reagan’s 1983 speech to the Na.docx
Description Watch President Ronald Reagan’s 1983 speech to the Na.docx
 
Description Total Possible Score 30.00Distinguished .docx
Description Total Possible Score 30.00Distinguished .docxDescription Total Possible Score 30.00Distinguished .docx
Description Total Possible Score 30.00Distinguished .docx
 
Description Total Possible Score 16.00Distinguished .docx
Description Total Possible Score 16.00Distinguished .docxDescription Total Possible Score 16.00Distinguished .docx
Description Total Possible Score 16.00Distinguished .docx
 
Description The scenario description and requirements for Short.docx
Description The scenario description and requirements for Short.docxDescription The scenario description and requirements for Short.docx
Description The scenario description and requirements for Short.docx
 
Description Research the internet for an example of a violation.docx
Description Research the internet for an example of a violation.docxDescription Research the internet for an example of a violation.docx
Description Research the internet for an example of a violation.docx
 
Description Presentation (500 words + 10minutes)Percentage 40.docx
Description Presentation (500 words + 10minutes)Percentage 40.docxDescription Presentation (500 words + 10minutes)Percentage 40.docx
Description Presentation (500 words + 10minutes)Percentage 40.docx
 
Description of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docxDescription of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docx
 
Description of the toolUsages and meritsYour own demonstration.docx
Description of the toolUsages and meritsYour own demonstration.docxDescription of the toolUsages and meritsYour own demonstration.docx
Description of the toolUsages and meritsYour own demonstration.docx
 
Description of the AssignmentThe assignment provides an oppo.docx
Description of the AssignmentThe assignment provides an oppo.docxDescription of the AssignmentThe assignment provides an oppo.docx
Description of the AssignmentThe assignment provides an oppo.docx
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

Description  Defense-in-Depth, an IA concept refers to multip.docx

  • 1. Description: Defense-in-Depth, an IA concept refers to multiple layers of security controls placed throughout an IT system. Post a brief summary of examples of these types of controls in action and your experience with at least one of type of control. Illustrate whether or not you believe, in your experience, this approach is effective. Be sure to indicate in what domain your example occurs: User domain - any user of our systems falls in this domain, whether inside or outside our organization Workstation domain - not just computers, but any device our users use LAN domain - each LAN and the devices that make a LAN work WAN domain - the system that links devices across long distances; typically this is the Internet which is used by most businesses LAN-to-WAN domain - the infrastructure and devices that connect our organization's LANs to the WAN system Remote Access domain - the technologies used by our mobile and remote users to connect to their customary resources; can include VPN solutions and encryption technology System/Application domain - technologies used to actually conduct business functions, as opposed to making connections of various types