Policies, procedures, and awareness - User education; manageable network plans; and employee onboarding and off-boarding procedures., Physical - Fences, door locks, mantraps, turnstiles, device locks, server cages, cameras, motion detectors, and environmental controls., Perimeter - Firewalls using ACLs and securing the wireless network., Network - The installation and configuration of switches and routers; implementation of VLANs; penetration testing; and virtualization use., Host - Log management, OS hardening, patch implementation, patch management, auditing, anti-malware, and password attack prevention on each workstation, laptop, and mobile device., Application - Authentication and authorization, user management, group policies, and web application security., Data - Storing data properly, destroying data, classifying data, cryptography, and data transmission security.,
0%
Defense in Depth (Definition Exercise)
Share
by
Terry22
9th Grade
10th Grade
11th Grade
12th Grade
Vocational / Technical
Higher Education
CompTIA
Computing
CompTIA
Cybersecurity
Security
Edit Content
Embed
More
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?