Computing Defense In Depth

Defense in Depth (also known as layered security and layered defense) is an information assurance (IA) concept.

It uses multiple layers of security controls (defenses) placed throughout an information technology (IT) system. The multiple layers are not of the same security tool. It uses several different kinds of security with each protecting against a different security attack.

Computing Defense In Depth
A graphical representation of the onion model of Defense in Depth, a concept in Information Security.

Background

Defense in depth is originally a military strategy. It seeks to delay rather than prevent the advance of an attacker by yielding space to buy time. The National Security Agency (NSA) changed the concept to be a comprehensive approach to information and electronic security.

The placement of protection mechanisms, procedures and policies is intended to increase the dependability of an IT system. Multiple layers of defense can prevent espionage. They also prevent direct attacks against critical systems. In terms of computer network defense, defense in depth measures should not only prevent security breaches but also buy an organization time to detect and respond to an attack.

Onion model

Defense in depth has long been explained by using the onion as an example of the various layers of security. The outer layer contains the firewall. Middle layers contain various controls. The data is in the center protected by the other defenses.

A newer concept is the kill chain. Borrowed from the military it is a method of detecting and breaking an opponent's kill chain. Lockheed Martin adapted this concept to information security, using it as a method for modeling intrusions on a computer network.

Using more than one of the following layers constitutes defense in depth.

References

Other websites

Tags:

Computing Defense In Depth BackgroundComputing Defense In Depth Onion modelComputing Defense In Depth Related pagesComputing Defense In Depth Other websitesComputing Defense In DepthAttackInformation technologySecurity

🔥 Trending searches on Wiki Simple English:

ButtercupBelgiumBangladeshi takaTamannaah BhatiaNational Democratic AllianceJuneChester BenningtonSodom and GomorrahPantheraGod the FatherBlue Beetle (movie)(Everything I Do) I Do It for YouPrince (musician)Heera MandiWilliam ShakespeareHKazakhstanGeorge SorosTwo-nation theoryWhite House Press Secretary19th centuryFuture (rapper)LlanfairpwllgwyngyllKarisma KapoorHarrison SchmittMinecraftShah Abdul Latif BhittaiVertical barLight bulbCasey JohnsonPooja HegdeSoviet–Afghan WarList of counties in Georgia (U.S. state)Tulsi GabbardSilkwormIslamThe Pocket QueenCourtesanList of Asian pornographic actorsList of U.S. state mottosMike SmithTaylor SwiftCyprusList of cities in BrazilNortheastern United StatesDear Child (book)Jack StauberList of political ideologiesMarilyn MonroeJapanese languageTerrace farmingBill GatesAirplanePerihelionWaltz of the FlowersChristianityTurkish alphabetIt Must Have Been LoveOne-party stateReal Madrid CFOmanUnited States customary unitsYoko OnoThe Top 100 Crime Novels of All TimeList of districts of KeralaList of 100 greatest NHL players by The Hockey NewsList of English football teamsCatholicismCharminarJohn AbrahamCrabAphroditeNaomie OlindoList of cities in BelgiumGolden Edge🡆 More