Defence in Depth Example
2 Layers
- Firewall
 
- Host based packet filtering
 
5 Layers
(Increase security on the Internet side to handle DDOS attacks)
- Border router
 
- Network management system
 
- Intrusion detection system
 
- Firewall
 
- Host based packet filtering
 
8 Layers
(Increase security on the workstation side to handle internal attacks)
- Border router
 
- Network management system
 
- Intrusion detection system
 
- Firewall
 
- Host based packet filtering
 
- Log analysis and alert
 
- File integrity validation
 
- Cryptography