Many strategies exist to secure computer systems. However, no single method is sufficient to repel all forms of attacks. In fact, even with every strategy implemented, there will still be imperfections and deficiencies in every secure network. However, the goal of defense in depth is to decrease...