Provision
of defense in-depth Network Security LAYERED APPROACH :
First line of defense :
1.
Perimeter
– internet gateway to/from internal network
Internal
Network Defense :
2.
Network
– Internal LAN or WAN
3.
Hosts and
PCs – Devices such as servers, desktops, switches, routers, etc. on
the network
4.
Application
– software application
5.
Data
– sensitive data such as confidential business data, user data, and
private customer information stores
|