DiD & DoD 2

docx

School

Harvard University *

*We aren’t endorsed by this school

Course

2

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

3

Uploaded by ColonelEnergy6151

Report
1 Discussion; Defense in Depth and Depth in Defense Student’s name Affiliation Professor’s name Course Date
2 Difference Between DiD and DoD Cyber security experts often speak of "defense-in-depth," also known as "security-in- depth," to describe an approach that uses multiple tiers of protection to keep data safe. Security agencies reduce vulnerability, minimize threats, and lower risk by employing many levels of defense. To put it another way, if an attacker is able to bypass one layer of defense, a defense-in- depth strategy increases the likelihood that they will be stopped by another layer of defense ( Papakonstantinou et al., 2020) . On the other hand, defenses are said to have depth in their construction when they priorities the fortification of particular layers rather than the entire system (DoD). Depth in Defense puts a lot of faith in the idea that a single layer can protect the higher ones from attack. The DoD is looking for a security system that is both effective against cyber threats and easy to implement and keep up with. Both approaches have their advantages and disadvantages. Since Defense in Depth acknowledges that no single layer of protection is flawless hence all layers need to be strengthened, however, it may be more complex to establish and maintain. In depth in defense, it may be easier to implement and administer a single layer of protection, but that doesn't mean it can prevent all threats. Reply The conversation is in-depth and provides illuminating insights on both the DoD and the DiD. Although I acknowledge that both of these systems have advantages and disadvantages, the DiD method has always been my top choice because it offers the most comprehensive protection. If one layer were to fail, the integrity of the system as a whole would still be maintained by layers higher up. I agree with the points presented in the discussion as both the systems have their strength and weaknesses. Which method is best is context-dependent, meaning it depends on the nature of
3 the use case and the threats present. Combining the two methods is commonly advised for the highest level of safety. Reference Papakonstantinou, N., Linnosmaa, J., Bashir, A. Z., Malm, T., & Van Bossuyt, D. L. (2020, January). Early combined safety-security Defense in Depth assessment of complex systems. In 2020 Annual Reliability and Maintainability Symposium (RAMS) (pp. 1-7). IEEE.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help