Content deleted Content added
Reverted good faith edits by 197.184.160.218 (talk): It is not necessary to add links for all words Tags: Twinkle Mobile edit Mobile web edit Advanced mobile edit |
Citation bot (talk | contribs) Add: isbn, publisher. | Use this bot. Report bugs. | Suggested by Spinixster | Category:Computer network security | #UCB_Category 112/182 |
||
Line 7:
== Controls ==
Defense in depth can be divided into three areas: Physical, Technical, and Administrative.<ref>{{cite book |last1=Stewart |first1=James Michael |url=https://books.google.com/books?id=xSvdCQAAQBAJ |title=CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide |last2=Chapple |first2=Mike |last3=Gibson |first3=Darril |date=2015|publisher=John Wiley & Sons |isbn=978-1-119-04271-6 }}</ref>
=== Physical ===
|