Method, tool, or procedure for enforcing a Security Policy
We employ multiple security mechanisms (multi-layer defense) because of insufficient nature of security
Prevention of attacks
often blocks legitimate use cases
Detection of attacks
Via like logging things
Recovery from attacks
Often most difficult

Seonglae Cho