DiD & DoD 2
docx
keyboard_arrow_up
School
Harvard University *
*We aren’t endorsed by this school
Course
2
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
3
Uploaded by ColonelEnergy6151
1
Discussion; Defense in Depth and Depth in Defense
Student’s name
Affiliation
Professor’s name
Course
Date
2
Difference Between DiD and DoD
Cyber security experts often speak of "defense-in-depth," also known as "security-in-
depth," to describe an approach that uses multiple tiers of protection to keep data safe. Security
agencies reduce vulnerability, minimize threats, and lower risk by employing many levels of
defense. To put it another way, if an attacker is able to bypass one layer of defense, a defense-in-
depth strategy increases the likelihood that they will be stopped by another layer of defense
(
Papakonstantinou et al., 2020)
. On the other hand, defenses are said to have depth in their
construction when they priorities the fortification of particular layers rather than the entire
system (DoD). Depth in Defense puts a lot of faith in the idea that a single layer can protect the
higher ones from attack. The DoD is looking for a security system that is both effective against
cyber threats and easy to implement and keep up with. Both approaches have their advantages
and disadvantages. Since Defense in Depth acknowledges that no single layer of protection is
flawless hence all layers need to be strengthened, however, it may be more complex to establish
and maintain. In depth in defense, it may be easier to implement and administer a single layer of
protection, but that doesn't mean it can prevent all threats.
Reply
The conversation is in-depth and provides illuminating insights on both the DoD and the
DiD. Although I acknowledge that both of these systems have advantages and disadvantages, the
DiD method has always been my top choice because it offers the most comprehensive protection.
If one layer were to fail, the integrity of the system as a whole would still be maintained by
layers higher up.
I agree with the points presented in the discussion as both the systems have their strength
and weaknesses. Which method is best is context-dependent, meaning it depends on the nature of
3
the use case and the threats present. Combining the two methods is commonly advised for the
highest level of safety.
Reference
Papakonstantinou, N., Linnosmaa, J., Bashir, A. Z., Malm, T., & Van Bossuyt, D. L. (2020,
January). Early combined safety-security Defense in Depth assessment of complex
systems. In
2020 Annual Reliability and Maintainability Symposium (RAMS)
(pp. 1-7).
IEEE.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help