What is a defense in depth security strategy?

After you have read Chapter 1 and listened to the Chapter 1 lecture research defense in depth.

What is a defense in depth security strategy?

How is it implemented?

Describe the defense in depth strategy used by your company or by a company with which you are familiar
Field of study: 
No answers yet