What are the benefits of layering security?

What will be an ideal response?


At any given time a bank may have tens of thousands of dollars in cash on hand. What security is used to protect the money from theft? There is not a single type of security, such as a front door with a strong lock. Rather, there are several types of security. In addition to a front door with a strong lock, there may also be video cameras, armed guards, motion detectors, and a vault.

Each of these types of bank security is designed to coordinate with the other types of security to create layers of protection around the money.A front door with a strong lock may be the first layer of security, followed by video cameras, motion detectors, armed guards, and finally the vault.The philosophy behind layering security is that an attacker who is able to penetrate one layer (by breaking down the front door) would then face additional layers of security (an armed guard, motion detectors, and a vault) before reaching the money. A layered approach has the advantage of creating a barrier of multiple defenses that can thwart a thief who is able to break through one layer. In addition, layers can prevent a variety of attacks: layers of security at a bank can stop both a midnight break-in as well as a holdup in broad daylight.

Computer Science & Information Technology

You might also like to view...

A table of figures is inserted in a document ________ the table of contents page

A) instead of B) before C) within D) after

Computer Science & Information Technology

Some designers suggest that speech recognition should be used in a telephone menu system. This would allow users to interact with the system by speaking instead of pressing buttons on the dial pad. Give two arguments for and two arguments against the proposal.

What will be an ideal response?

Computer Science & Information Technology

Write the declaration for a function named funct1 that expects an array of floats, the number of elements in the array and does not return any value.

What will be an ideal response?

Computer Science & Information Technology

_____ is the process by which virtual private networks (VPNs) transfer information by encapsulating traffic in Internet Protocol (IP) packets over the Internet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology