In: Computer Science
Match each component with proposed strategies/elements of a framework for Defense-in-Depth security.
Word bank:
Risk management program
Cyber security architecture
Physical security
ICS Network Architecture
ICS Network Perimeter Security
Host security
Security monitoring
Vendor management
The human element
| 
 Defense in Depth Strategy Elements  | 
|
| 
 1.  | 
  | 
| 
 2.  | 
  | 
| 
 3.  | 
  | 
| 
 4.  | 
  | 
| 
 5.  | 
  | 
| 
 6.  | 
  | 
| 
 7.  | 
  | 
| 
 8.  | 
  | 
| 
 9.  | 
  | 
| 
 Defense in Depth Strategy Elements  | 
|
| 
 1.Risk management program  | 
  | 
| 
 2. ICS Network Perimeter Security  | 
  | 
| 
 3.Cyber security architecture  | 
  | 
| 
 4. ICS Network Architecture  | 
  | 
| 
 5.Physical security  | 
  | 
| 
 6.Host security  | 
  | 
| 
 7.Security monitoring  | 
  | 
| 
 8.The human element  | 
  | 
| 
 9. Vendor Management  | 
  |