Problem
Defending a network from threats and attacks is a constant job. As a security professional, one needs to be vigilant to every entry point, vulnerability, attack surface, and other potential threats to your organization. You must neutralize or eliminate every instance. One way to achieve this is to use the Layered Security Model.
1. Discuss the layered security model by breaking down each security layer into specific categories.
2. Discuss how it touches on the importance of cybersecurity, information systems security, and security breach risks, threats, and vulnerabilities.
3. Discuss network monitoring tools used in the layered security model, such as packet sniffing tools.