Corollaries: Principles That Spring from the Classics

Although the classic three security principles can be used to describe just about every security technology and practice, additional security principles have grown from them and from the experiences of security practitioners. If you examine these principles, you will see how many of your efforts for hardening and defending your information systems and their data fit into the greater picture. Put these principles together with those described earlier in this chapter, and you will be able to anticipate ways to protect your systems now and in the future.

Defense in Depth

No security device or hardening technique alone will protect your information systems. Defense in depth means using multiple ...

Get Windows Server 2003 Security: A Technical Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.