Defense-in-Depth: An Introduction

Many strategies exist to secure computer systems. However, no single method is sufficient to repel all forms of attacks. In fact, even with every strategy implemented, there will still be imperfections and deficiencies in every secure network. However, the goal of defense in depth is to decrease...
By Brian Nelson
June 30, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg