作者: Lance Cleghorn
关键词:
摘要: The defense in depth methodology was popularized the early 2000’s amid growing concerns for information security; this paper will address shortcomings of implementations. In the last two years, many supporters security methodology have changed their allegiance to an offshoot method dubbed the defense breadth methodology. A substantial portion paper’s body will be devoted comparing real-world usage scenarios and discussing flaws in each method. major goal publication be assist readers in selecting a that best benefit personal environment. Scenarios certainly exist where one may clearly favored; article help identify factors make clear choice over another. This paper strive not only highlight key strengths weaknesses the two strategies listed, but also provide evaluation techniques necessary for apply other popular methodologies order most appropriate determinations.