In: Computer Science
Match each component with proposed strategies/elements of a framework for Defense-in-Depth security.
Word bank:
Risk management program
Cyber security architecture
Physical security
ICS Network Architecture
ICS Network Perimeter Security
Host security
Security monitoring
Vendor management
The human element
Defense in Depth Strategy Elements |
|
1. |
|
2. |
|
3. |
|
4. |
|
5. |
|
6. |
|
7. |
|
8. |
|
9. |
|
Defense in Depth Strategy Elements |
|
1.Risk management program |
|
2. ICS Network Perimeter Security |
|
3.Cyber security architecture |
|
4. ICS Network Architecture |
|
5.Physical security |
|
6.Host security |
|
7.Security monitoring |
|
8.The human element |
|
9. Vendor Management |
|