How might the Defense-in-Depth approach to security be applied in a home network scenario? ​