Security at Multiple Layers
Application-specific (for instance, passwords for a
database program); Application (Proxy) Firewalls
SSL (TLS), Packet Filter Firewalls
IPsec, Packet Filter Firewalls
Point-to-Point Tunneling Protocol (PPTP), Layer 2
Tunneling Protocol (L2TP)
Physical locks on computers, Notebook Encryption