Outskirts Press

Solving Information Assurance Issues using Defense in Depth Measures and The Analytical Hiearchy Process

Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. …

Learn more