CS 405 2-1 Journal Defense in Depth (DiD)

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

405

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by BailiffSpider1312

Report
Koehler Radder 05-13-2023 CS 405 2-1 Journal: Defense in Depth (DiD) How deep is too deep, and what’s the tradeoff? Defense in Depth is a cybersecurity strategy that uses multiple redundant layers of security to protect against unauthorized users. There is no set number of layers that should be used, I personally feel that it would depend on what needs to be protected. Implementing more layers can cost more money over time and also the more layers you have the harder it becomes to coordinate with each layer, maintenance also become more complex the more layers you have. What are some time, money, reputation, and operational considerations? The cost will be a big consideration. To create DiD security, corners cannot be cut, a lot of time and money will end up being put in to implement this strategy. It is important for the company implementing this strategy to have a strong reputation to ensure that the system is continuously maintained. DiD needs to be constantly updated and have regular scheduled maintenance to keep it operational. Higher security can be more costly but a breach in a company’s servers can cost so much more than the amount it takes to run a strong security strategy. What are some additional aspects of DiD that make it unique for each situation? The biggest aspect that makes DiD unique is the layers. Also called the castle approach it is similar to a medieval castle that would have multiple layers of defense like walls, moats,
drawbridges, ramparts, towers, and bastions. Like medieval castles, DiD has different layers to combat different issues, each layer deals with its own independent problem. Depending on the type of data being protected, the first line of defense may be different if you have an idea of what the most common attacks might hit the system. Analyzing all attacks that hit this kind of system will help narrow it down. This is a good way to find out what layers of defense is needed for the system the DiD is trying to protect.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help