Creating a secondary authentication process for network access would be an example of?
Creating a secondary authentication process for network access would be an example of?
Creating a secondary authentication process for network access is an example of Defense in depth cost enumerated costs. Defense in depth is a strategy that involves multiple layers of security controls to protect information and resources. Implementing a secondary authentication adds an additional layer of security, enhancing the overall security posture by requiring multiple factors to authenticate users. This ensures that even if one layer of defense is compromised, other layers provide additional protection.
Each letter here seem to have more than one answer. This is either layered security or MFA or similar.
This is layered security.
A. Defense in depth, also referred to as Layered Security.
Correct answer is A
A. Defense in depth cost enumerated costs Defense in depth is a cybersecurity strategy that employs multiple layers of security controls (defenses) to protect information and resources. Implementing a secondary authentication process is a classic example of adding an additional layer of security, enhancing the overall security posture by requiring multiple factors to authenticate users. This approach ensures that even if one layer of defense (e.g., primary authentication) is compromised, other layers (e.g., secondary authentication) provide additional protection.
sec authentication is an added sec feature underlying defense in depth concept