Close

SPECIAL OFFER FOR OUR CLIENTS! CLICK TO ORDER WITH 5% DISCOUNT: CLICK TO ORDER WITH 5% DISCOUNT: FIRST5

Published: 14-12-2019

121 writers online

Disclaimer: This essay is not an example of the work done by the EssayPay© service. Samples of our experts work can be found here. All opinions and conclusions belong to the authors, who sent us this essay.
If you want to pay for essay for unique writing What is defense in depth?, just click Order button. We will write a custom essay on What is defense in depth? specifically for you!

What is defense in depth?

Defense in depth is the coordinated use of several safety countermeasures to defend the integrity of the info assets in an enterprise. The approach is based on the military principle that it is a lot more difficult for an enemy to defeat a complicated and multi-layered defense program than to penetrate a single barrier. Defense in depth minimizes the probability that the efforts of malicious hackers will succeed. A nicely-created strategy of this kind can also assist program administrators and security personnel identify individuals who try to compromise a personal computer, server, proprietary network or ISP (Net service provider).

If a hacker gains access to a system, defense in depth minimizes the adverse impact and offers administrators and engineers time to deploy new or updated countermeasures to avoid recurrence. Components of defense in depth contain antivirus computer software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to electronic countermeasures, physical protection of business internet sites along with complete and ongoing personnel education enhances the safety of important information against compromise, theft or destruction. Implementation:
  1. Network Controls

  2. Monitoring network visitors is the 1st line of defense. Firewalls can support with this, but for a more extensive safety solution an intrusion prevention system (IPS) ought to also be employed.
  3. Antivirus Software program

  4. Using antivirus computer software is crucial, but it’s not an all-inclusive remedy. It frequently relies heavily on signature-based detection that can be exploited by an intelligent attacker. Some antivirus applications also use heuristics that appear for suspicious activity. For instance, if a document tried to download an executable when opened, the antivirus program would halt the download and quarantine the file.
  5. Check File Reputation

  6. The reputation of a file deals with its frequency of use and the supply. Each and every file has a checksum, a mathematical representation of the file, that can be employed to verify against known viruses and block matches. It can also be used to locate how often a file shows up. If the incoming file is fully exclusive, it’s marked as suspicious, as it ought to be in circulation someplace else. It is also critical to verify the reputation of the file’s origin. Verify the IP address of either the sender or origin website and choose whether it is a trustworthy source.
  7. Analyze Behavior

  8. Network and file behaviors give insight into regardless of whether a breach is in progress or has currently occurred. By the time behavioral analysis comes into play, prevention has already failed and the new aim is detection. Initially this calls for an organization to develop a baseline for “normal” behavior. Algorithms can then use this baseline to detect anomalies such as higher-bandwidth traffic or extremely lengthy connections.
  9. Repair the Leak

  10. After an attack is detected, it’s crucial to shut it down swiftly. In addition to deleting malicious files the initial entry point of the attack requirements to be identified and repaired. Example Of Defense In Depth

    Assume an organization utilizes a defense in depth technique. This firm uses a firewall, a standard antivirus plan, and behavioral evaluation. An attacker creates a phishing attack and sends out a convincing email with a organization schedule attached in the form of a PDF. The e mail tends to make it past the firewall and ends up in the inbox of an unsuspecting employee. When the employee opens the PDF it begins to download a malicious executable file. Fortunately, the behavioral analysis tool notices the anomaly and sends up an alert regarding the file. Though the attack was effectively detected, there are 3 issues the organization could improve to quit the attack from occurring in the 1st location. 1st, the organization could use an IPS to offer an extra layer of network safety. Second, they could upgrade their antivirus application to 1 that employs heuristics. This way the file could be automatically dealt with alternatively of merely sending an alert. Third, and most crucial, the firm could offer you employee security training so that phishing attacks never succeed, even if they make it previous all of the filters.
Calculate your price
Pages
What are you waiting for?
Thousands of students choose us!
close

Sorry, copying is not allowed on our website. If you want a paper on this sample, we’ll created new for you.

Order Now

Order Now