8 layers of Information Security One single method of IT security cannot insure protection of mission-critical data. In the enterprise IT environment, layering multiple tactics and security processes can help close all of the gaps. A visual look at 8 layer of information technology security which work together.
Understanding this model is essential for anyone who wants to be involved in the field of computer networking. If you have forgotten the OSI model or just want to get a crash course in it, this cheat sheet by Ccna-security.net should help