This is the best way to protect the system but also very difficult to implement. In this each system is hardened and is monitored thus acting like an island and it defends itself against the attacks. Even if one of the network is compromised it won’t affect the other networks. In this method internal networks are less susceptible to be compromised. With this system it can also detect hack attempts from the compromised systems