The concept of defense in depth refers to an effective asset-protection scheme comprising multiple, complementary levels of security. It ensures that if one layer of security fails, subsequent layers continue to provide protection.
Layered Security:
Involves combining physical, technical, and procedural measures to create a robust defense system.
Examples include perimeter fencing, access controls, surveillance systems, and response protocols.
Redundancy:
Multiple layers reduce the likelihood of a single-point failure.
Comprehensive Approach:
Covers different threat vectors, from physical breaches to cyberattacks.
B: Strategic risk management focuses on decision-making rather than physical security layers.
C: Risk management is broader and does not specifically imply layered defenses.
D: Paradigm shift frequency protection is not a recognized security term.
Key Features of Defense in Depth:Why Other Options Are Incorrect:ASIS CPP® References:
Domain 5: Physical SecurityDiscusses the principles and applications of defense in depth in security planning.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit