Defense in Depth
Using the Reading, the library, and Internet research, answer or explain the following in a minimum 400-word paper that covers the following and includes three or more APA style references:
Differentiate perimeter controls from internal controls. Give examples.
What controls constitute a defense in depth strategy? Explain.
How are security controls tested and verified?