Defense in Depth
|
Audio transcript |
Strategies Defense in Depth strategies include protection of information and information systems through:
Approaches Defense in Depth approaches use technical solutions to:
|
Defense in Depth provides successive layers of protection for GIG components, and positions safeguards at different locations and in different ways, so that a single breach will not affect an entire system. Defense in Depth integrates the capabilities of people, operations, and technology to ensure the security of information and information systems. |
Next | Information Assurance page 2 | Main Menu | Resources | Glossary |