I used something like this once to show how small individual components of an information security architecture can create a formidable defense against cyber crime if they coordinate their activities well.
A larger image can be found on Ads of the World.