DiD & DoD 1

docx

School

Harvard University *

*We aren’t endorsed by this school

Course

1

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

3

Uploaded by ColonelEnergy6151

Report
1 Discussion; Defense in Depth and Depth in Defense Student’s name Affiliation Professor’s name Course Date
2 Difference Between DiD and DoD Defense in Depth (DiD) is a cyber-security technique that combines multiple levels of protection to protect highly sensitive data and information. Even if one line of defense against an assault is breached, another will replace it ( Rahman et al., 2020) . This multilayered approach enhances the overall security of the system while simultaneously addressing a wide variety of potential entry points. Defense in Depth, sometimes known as the "castle approach" is a security principle based on the premise that a structure's defenses are most effective when constructed in multiple layers. These security technologies and procedures have the potential to form the foundation of an effective "defense-in-depth" strategy. Firewalls are policies or hardware/software appliances that use access and rules to block network traffic. Combinations of IP address, media access control address, and port number are examples of items that can be managed by rules. While, Depth in Defense (DoD) strategy places more of an emphasis on maximizing the effectiveness of the protective levels that are already in place as opposed to adding new layers of defense. If one takes this approach, there is an assumption that a single, strong layer can thwart any and all threats. Therefore, DoD focus the strength of the entire system on a single layer. Personally, Defense in Depth is more effective as it ensures the entire system is efficient. Hence, failure in one system can be compensated by another system rather than facing destruction because the strongest layer that offered security is compromised as seen in DoD. Reply I agree with the points articulated in your discussion. You have brought out the concept of both the DoD and DiD system effectively, citing examples. However, I am of the opinion that
3 both the systems can be effective under different grounds considering the purpose intended. For example, one can opt for DoD because they are easy to manage and maintain compared to DOD. The discussion has been engineered towards effective understanding of the difference between DiD and DoD, a concept that has been effectively discussed. I would like to add an advantage of DiD, as that was also my choice of effective system. DiD provides the way for the use of a vast array of technologies and solutions, hence boosting the agility with which to face ever-changing security concerns. Reference Rahman, M. T., Rahman, M. S., Wang, H., Tajik, S., Khalil, W., Farahmandi, F., ... & Tehranipoor, M. (2020). Defense-in-depth: A recipe for logic locking to prevail. Integration , 72 , 39-57.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help