Information security is often approached by an organization from the top down, with a solitary measure at each level. For example, a company may attempt to secure the network level with a firewall, the server level with password authentication, and the personal computer (PC) level with virus scan...