- Jan 26, 2020
- 1,628
If I use KIS, then is that necessary to enable Microsoft Edge's Enhanced Security Mode?
Microsoft Edge's Enhanced Security Mode explained - gHacks Tech News
Microsoft Edge's Enhanced Security Mode explained - gHacks Tech News
I know layered protection is very good to have, but as a savvy user that I use common sense, and know what I am doing, I thought to post this question here to know ideas.
Thank you very much.
I also read this and this is true, but in my idea, I don't need to use stuff I don't need.
"It’s common in the information security field to refer to layered protection as defense in depth. This is a very important principle and refers to using several different types of defenses to accomplish the same goal. For example, you might use a firewall, intrusion detection system, honeypot, and router to monitor for and detect unauthorized intrusions to your network. It’s much more difficult for an attacker to successfully defeat all four of those diverse systems than to defeat one of them alone. Defense in depth is discussed in greater detail in Chapter 3."
Source: Information security illuminated book by Michael G. Solomon, Mike Chapple
Microsoft Edge's Enhanced Security Mode explained - gHacks Tech News
Microsoft Edge's Enhanced Security Mode explained - gHacks Tech News
I know layered protection is very good to have, but as a savvy user that I use common sense, and know what I am doing, I thought to post this question here to know ideas.
Thank you very much.
I also read this and this is true, but in my idea, I don't need to use stuff I don't need.
"It’s common in the information security field to refer to layered protection as defense in depth. This is a very important principle and refers to using several different types of defenses to accomplish the same goal. For example, you might use a firewall, intrusion detection system, honeypot, and router to monitor for and detect unauthorized intrusions to your network. It’s much more difficult for an attacker to successfully defeat all four of those diverse systems than to defeat one of them alone. Defense in depth is discussed in greater detail in Chapter 3."
Source: Information security illuminated book by Michael G. Solomon, Mike Chapple