Layered Defence & Exam Technique
The final lesson. This is where everything comes together. Matching attacks to defences, understanding why no single measure is ever sufficient, and the exam technique that turns good knowledge into full marks.
A medieval castle didn't rely on just a high wall. There was a moat, then a drawbridge, then a portcullis, then a gatehouse, then inner walls, then a keep. Each layer was designed so that breaching one left you facing the next. No attacker was expected to be stopped by a single barrier.
The principle is defence in depth - using multiple overlapping layers of security so that an attacker who defeats one layer immediately faces the next. This lesson brings together everything from the series into a complete picture.
Defence in depth - the layered model
Defence in depth is a security strategy where multiple, independent layers of protection are used. No single measure is treated as infallible - instead, each layer reduces risk, and an attacker must defeat all layers to succeed.
Consider a company that uses: a firewall (filters traffic) + anti-malware (detects threats that get through) + encryption (makes stolen data useless) + 2FA (prevents stolen credentials from being used) + regular backups (allows recovery if everything else fails) + staff training (reduces social engineering success). An attacker who defeats the firewall still faces five more layers.
Threat to defence mapping
This table is the most useful revision tool in the series - memorise the right-hand column for every row.
Worked exam scenarios
Read each exam question and attempt an answer before revealing the mark scheme. The goal is to practise the level of precision these questions require.
Common exam mistakes - and how to avoid them
A security consultant tells a company: "You will never achieve perfect security - the goal is to make the cost of attacking you higher than the value an attacker would gain." Evaluate this statement in the context of defence in depth.
How defence in depth achieves this: A brute force attack that takes months is impractical even if theoretically possible. Ransomware that can be recovered from via backups costs the attacker time with no financial return. Social engineering that fails because staff are trained to be suspicious yields nothing. Each layer raises the cost of success.
Limitations: The statement implies that sufficiently determined and well-resourced attackers (nation-states, for example) will eventually succeed regardless. In these cases, the goal shifts from prevention to detection and response - and this is where monitoring, incident response plans, and backups become critical even when defences are strong.
Practice what you have learned
Three levels of worksheet for this lesson. Download, print and complete offline.