Defence in Depth Example

2 Layers

  1. Firewall
  2. Host based packet filtering

5 Layers

(Increase security on the Internet side to handle DDOS attacks)
  1. Border router
  2. Network management system
  3. Intrusion detection system
  4. Firewall
  5. Host based packet filtering

8 Layers

(Increase security on the workstation side to handle internal attacks)
  1. Border router
  2. Network management system
  3. Intrusion detection system
  4. Firewall
  5. Host based packet filtering
  6. Log analysis and alert
  7. File integrity validation
  8. Cryptography