Defense in Depth 1
Defense in Depth 1
Abstract
network security as well. Data is the most valuable asset for an organization. Depth in Defense
Network Security
With the rapid growth in information technology the risk of cyber-attacks is gradually
increasing. Most of the systems are connected to internet via wired or wireless connections
where the transmission of data is at risk. Network security provides the protection for both
hardware and software of the organizations or individual users who are connected to internet. For
organizations that are using network need continues monitoring. Human monitoring is not
sufficient in such cases where virus is intruded into the network by hackers to breach the
confidential data. By giving multi layers of security to a network system this risk can be
triggered easily. Defense in Depth is a concept helps in designing multiple layers of security.
Defense in Depth
provides layered security tools. This defensive method decreases the risk of network
security threats. In case of any mechanism failure, the next security layer immediately
comes into action. In this era where everything is digitalized, there is high risk of network
attack. To prevent this we need security, unfortunately there is no single that could defend
different types of attacks. In these types of cases Defense in Depth Architecture is used.
scanners so that all the layers are protected. With the help of this method organizations can
track and monitor each individual so that important assets of the organization are secured.
DEFENSE IN DEPTH 3
Defense in Depth monitors and alerts the organizations from an emergency threat. For
software.
This software is trained to block the threats. And organizations set up firewalls which
gives multiple layers of security, any threat that intrudes the website has pass through
Layered Security: We often confuse between both defense in depth and layered security are
e different, but layered security is a strategy of defense in depth architecture. Layered security is
not just implementing the same defense multiple times, its actually installing multiple layers of
security with different measures. The different measures of layer security are external network,
network parameter, internal network host, application including physical defenses. These tools
can detect the threat and slow down or can destroy the attack from the hackers. Before it reaches
the user, it has pass different layers of security measures. Although there are advantages and
Advantages: The advantage in this strategy is, it provides multiple layers of security where
incase of any security tool failure the other comes into action. It provides maximum protection to
Disadvantages: The main disadvantage of this method is difficulty to understand the different
layers. This method uses different mechanisms instead of one security tool. It makes simple tasks
complicated.
DEFENSE IN DEPTH 4
Reference(s)
David Kuipers.(2006)
https://core.ac.uk/download/pdf/71311909.pdf
Mark Fabro. (2006)
https://core.ac.uk/download/pdf/71311909.pdf