Evaluate your understanding of the way information flows to endpoint devices.
We'll cover the following...
List the order in which security controls information flows from the internet to a user's laptop. This represents how a defense in depth approach can prevent an attack.