In this paper, the author will dive into the motivation behind "Defense in Depth" and a different layered approach to ensure the security of an information infrastructure. Furthermore, different counter measures to protect the integrity of the information system from both internal and external attacks will be analyzed.
Considering the recent cyber-attacks around the world it is understandable that organizations are considering ways to prevent, mitigate and control their information infrastructure against both internal and external attacks. The concept of Defense in Depth (DiD) revolves around using various methods to protect information systems (layered Defense) that work together in a coordinated manner to protect a network from an attack. Although, it is difficult to guarantee the total protection of a system from eternal attacks, using different counter measures can mitigate these threats to the integrity of the information system. Defense in Depth entails the use of holistic strategies to analyze and identify potential attack surfaces to secure the information system from both internal and external threats.
Inhaltsverzeichnis (Table of Contents)
- Abstract
- Introduction
- Physical Security
- Access Control, Authentication, and Password Security
- Authentication
- Intrusion Detection and Prevention System
- Summary
- References
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This paper delves into the concept of Defense in Depth (DiD), a multi-layered security approach designed to protect information systems from various internal and external threats. The paper examines the rationale behind DiD and explores different layered strategies to secure information infrastructure.
- The importance of Defense in Depth in mitigating security risks
- Different layers of security measures to protect information systems
- Countermeasures to protect information system integrity from internal and external attacks
- The significance of physical security in information system protection
- The role of access control, authentication, and password security in safeguarding information systems
Zusammenfassung der Kapitel (Chapter Summaries)
- Abstract: This section introduces the concept of Defense in Depth, highlighting its significance in mitigating security risks in information systems. It emphasizes the layered approach to security, where multiple defense mechanisms work together to protect against threats.
- Introduction: This chapter explores the growing need for robust security measures in today's digital landscape, referencing recent cyberattacks and data breaches. It introduces the concept of Defense in Depth and its importance in protecting information systems against internal and external threats.
- Physical Security: This chapter discusses the importance of physical security as a crucial layer of defense for information systems. It explores various physical security countermeasures, including access control cards, laptop locks, and OS hardening, to prevent unauthorized access and protect sensitive data.
- Access Control, Authentication, and Password Security: This section delves into the principles of access control, emphasizing its role in restricting access to systems and data. It discusses different types of access control, including role-based, discretionary, and mandatory access control, and their importance in ensuring information system security.
Schlüsselwörter (Keywords)
Key terms and concepts explored in this text include: Defense in Depth (DiD), information security, layered security, physical security, access control, authentication, password security, intrusion detection and prevention systems, cyberattacks, data breaches, internal and external threats, countermeasures, information infrastructure, security risks, and mitigation strategies.
- Arbeit zitieren
- Oluwagbenga Afolabi (Autor:in), 2017, The Concept of Defense in Depth, München, GRIN Verlag, https://www.grin.com/document/541096