Star 0

Abstract

Critical systems and data demand robust protection. Building solutions with multiple layers of security components can meet this need. Defense-in-depth approaches compose different security functions. This session will show how to compose layers of the same security function, the importance of independence in designing the layers and a technique for predicting assurance of the layered solution.