Jump to content

Information for "Defense in depth (computing)"

Basic information

Display titleDefense in depth (computing)
Default sort keyDefense in depth (computing)
Page length (in bytes)5,119
Namespace ID0
Page ID7991195
Page content languageen - English
Page content modelwikitext
Indexing by robotsAllowed
Number of page watchers80
Number of page watchers who visited in the last 30 days2
Number of redirects to this page3
Counted as a content pageYes
Wikidata item IDQ11430672
Local descriptionConcept in information security
Central descriptionin information security, the placing of multiple layers of security controls throughout an IT system to provide redundancy in the event a security control fails
Page views in the past 30 days

Page protection

EditAllow all users (no expiry set)
MoveAllow all users (no expiry set)
View the protection log for this page.

Edit history

Page creatorAlephGamma (talk | contribs)
Date of page creation22:27, 17 November 2006
Latest editorPhotographyEdits (talk | contribs)
Date of latest edit14:24, 25 May 2025
Total number of edits199
Recent number of edits (within past 30 days)1
Recent number of distinct authors1

Page properties

Hidden categories (2)

This page is a member of 2 hidden categories (help):

Transcluded templates (31)

Pages transcluded onto the current version of this page (help):

Wikidata entities used in this page

External tools