Any policy, technology, or education used to deter, deny, disrupt, degrade, deceive or contain the compromise of information at any of the following levels: Data, Application, Host, Network, Physical.
Although there are many ways to get hacked, there are also many ways to stop a hacker in his tracks. By understanding the steps an attacker must go through in order to perform a major hack, a defender will understand the types of roadblocks to put up to stop or frustrate the hacker.
Put up roadblocks to stop the hacker at various levels: the network, the applications, the user accounts, the OS, and the database. If you’re a major organization, have policies and procedures that guide the technical defenses as well as employee procedures and business processes. And don’t forget to implement physical security, too!