Building Information Security Layer by Layer