Method, tool, or procedure for enforcing a Security Policy
We employ multiple security mechanisms (multi-layer defense) because of insufficient nature of security
Prevention of attacks
often blocks legitimate use cases
Detection of attacks
Via like logging things
Recovery from attacks
Often most difficult