An organization employs encryption, backups, and an incident response plan as part of its security strategy. This comprehensive approach is an example of ____________.

  • Defense in Depth
  • Least Privilege
  • Security by Design
  • Security through Obscurity
The use of encryption, backups, and an incident response plan as part of a security strategy reflects the principle of Defense in Depth. This approach involves implementing multiple layers of security controls to provide comprehensive protection. Understanding the concept of Defense in Depth is essential for designing robust security architectures that address a wide range of potential threats and vulnerabilities.__________________________________________________
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *