Article Figure 1 Figure 2

Figure 2: Typical Layered Security Design