A common model for security is called “Defense in Depth.” As the name might suggest, this is recommending a layered approach to security with multiple security protections in line between the item of value and any potential attacker. Pick some item of value (data), describe the data and its value, and suggest a set of security protections you would recommend that are in line for adequate defense in depth.
- Posts should be 250 to 300 words in length
- Must include at least one source outside of your textbook, and it should be included in the reference list at the end of the post
- All sources should be used in the content of the post using APA format