Like erstwhile forts, security relies upon defense in depth and also upon the security of other infrastructure elements, that a particular service depends on. If the crocodiles in the moat around the fort die, then you have a vulnerability that can compromise the security of the fort. Therefore, this item http://news.cnet.com/8301-1009_3-20044775-83.html?tag=nl.e757 illustrates a key element, that a core component’s security is reliant upon the security of other components that support it.
Geetu R. Vaswani 1 Minute
Published by Geetu R. Vaswani