[go: up one dir, main page]

0% found this document useful (0 votes)
216 views4 pages

Defense in Depth 1

Defense in depth is a defensive security model that uses layered security mechanisms to protect an organization's data and assets. It involves implementing multiple levels of security so that if one level fails, the next level will continue protecting the system. This multi-layered approach decreases the risk of network security threats getting through every level. Some examples of security layers include firewalls, antivirus software, malware detection, and access controls on internal networks and hosts. The main advantage is maximum protection through redundancy, while the main disadvantage is increased complexity in implementation and management of the multiple security layers.

Uploaded by

Tharun Burra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
216 views4 pages

Defense in Depth 1

Defense in depth is a defensive security model that uses layered security mechanisms to protect an organization's data and assets. It involves implementing multiple levels of security so that if one level fails, the next level will continue protecting the system. This multi-layered approach decreases the risk of network security threats getting through every level. Some examples of security layers include firewalls, antivirus software, malware detection, and access controls on internal networks and hosts. The main advantage is maximum protection through redundancy, while the main disadvantage is increased complexity in implementation and management of the multiple security layers.

Uploaded by

Tharun Burra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 4

DEFENSE IN DEPTH 1

Abstract

Although Defense in Depth is a concept used in military conditions, it can be applied in

network security as well. Data is the most valuable asset for an organization. Depth in Defense

is a defensive model to protect the physical assets of an organization. It is a well-known strategy

used by most of the organizations for using multilevel protection model.


DEFENSE IN DEPTH 2

Network Security

With the rapid growth in information technology the risk of cyber-attacks is gradually

increasing. Most of the systems are connected to internet via wired or wireless connections

where the transmission of data is at risk. Network security provides the protection for both

hardware and software of the organizations or individual users who are connected to internet. For

organizations that are using network need continues monitoring. Human monitoring is not

sufficient in such cases where virus is intruded into the network by hackers to breach the

confidential data. By giving multi layers of security to a network system this risk can be

triggered easily. Defense in Depth is a concept helps in designing multiple layers of security.

Defense in Depth

To protect the assets of an organization or to secure personal data, we apply multiple

layers of security. Defense in depth provides multi-level protection mechanism that

provides layered security tools. This defensive method decreases the risk of network

security threats. In case of any mechanism failure, the next security layer immediately

comes into action. In this era where everything is digitalized, there is high risk of network

attack. To prevent this we need security, unfortunately there is no single that could defend

different types of attacks. In these types of cases Defense in Depth Architecture is used.

Organizations or a personal computer cannot be protected by a single layer of security,

different elements security should be adopted such as Firewalls, Anti-virus, malware

scanners so that all the layers are protected. With the help of this method organizations can

track and monitor each individual so that important assets of the organization are secured.
DEFENSE IN DEPTH 3

Defense in Depth monitors and alerts the organizations from an emergency threat. For

example, depth in defense can be used in website protection by installing antivirus

software.

This software is trained to block the threats. And organizations set up firewalls which

gives multiple layers of security, any threat that intrudes the website has pass through

different stages of security.

Layered Security: We often confuse between both defense in depth and layered security are

e different, but layered security is a strategy of defense in depth architecture. Layered security is

not just implementing the same defense multiple times, its actually installing multiple layers of

security with different measures. The different measures of layer security are external network,

network parameter, internal network host, application including physical defenses. These tools

can detect the threat and slow down or can destroy the attack from the hackers. Before it reaches

the user, it has pass different layers of security measures. Although there are advantages and

disadvantages by following this approach.

Advantages: The advantage in this strategy is, it provides multiple layers of security where

incase of any security tool failure the other comes into action. It provides maximum protection to

the end user by providing different defensive security mechanisms.

Disadvantages: The main disadvantage of this method is difficulty to understand the different

layers. This method uses different mechanisms instead of one security tool. It makes simple tasks

complicated.
DEFENSE IN DEPTH 4

Reference(s)

Michael Coole. (2012). Depth in Defense.


https://www.researchgate.net/publication/
280571067_Defence_in_depth_protection_in_depth_and_security_in_depth_A_comparative_
analysis_towards_a_common_usage_language

David Kuipers.(2006)
https://core.ac.uk/download/pdf/71311909.pdf
Mark Fabro. (2006)
https://core.ac.uk/download/pdf/71311909.pdf

You might also like