![defense zone 2 level 8 defense zone 2 level 8](https://i.ytimg.com/vi/lPV64cDZtH0/maxresdefault.jpg)
![defense zone 2 level 8 defense zone 2 level 8](https://i.ytimg.com/vi/HY4YCEjoWrY/maxresdefault.jpg)
Data protection – Data protection methods include data at rest encryption, hashing, secure data transmission and encrypted backups.Workstation defenses – Workstation defense measures include antivirus and anti-spam software.Access measures – Access measures include authentication controls, biometrics, timed access and VPN.Administrative controls – Administrative controls are security measures consisting of policies or procedures directed at an organization’s employees, e.g., instructing users to label sensitive information as “confidential”.Īdditionally, the following security layers help protect individual facets of your network:.Technical controls – Technical controls include security measures that protect network systems or resources using specialized hardware or software, such as a firewall appliance or antivirus program.Physical controls – These controls include security measures that prevent physical access to IT systems, such as security guards or locked doors.Defense in depth, layered security architecture