An organization implements multiple security controls at different layers of its IT infrastructure. This approach exemplifies the ____________ strategy.

  • Defense-in-Depth
  • Least Privilege
  • Security Through Obscurity
  • Zero Trust
The defense-in-depth strategy involves implementing multiple layers of security controls to protect against various types of cyber threats. This approach recognizes that no single security measure is foolproof, and a combination of defenses is needed to create a robust security posture. Understanding and implementing defense-in-depth is fundamental for building resilient and comprehensive cybersecurity strategies.__________________________________________________
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *