Merkow PPT 02-jrm
Merkow PPT 02-jrm
Merkow PPT 02-jrm
Defense in depth
Security implemented in overlapping layers
that provide the three elements needed to
secure assets: prevention, detection, and
response
The weaknesses of one security layer are
offset by the strengths of two or more
layers
Pearson Education Information Security:
Principles and Practices 5
Information Security Principles:
#4 When Left on Their Own, People Tend to
Make the Worst Security Decisions
Takes little to convince someone to give
up their credentials in exchange for trivial
or worthless goods
Many people are easily convinced to
double-click on the attachment
Subject: Here you have, ;o)
Message body: Hi: Check This!
Attachment: AnnaKournikova.jpg.vbs
Vulnerability
A known problem within a system or program
Exploit
A program or a cookbook on how to take
advantage of a specific vulnerability
Attacker
The link between a vulnerability and an exploit