121 writers online
If you want to pay for essay for unique writing What is defense in depth?, just click Order button. We will write a custom essay on What is defense in depth? specifically for you!
What is defense in depth?
If a hacker gains access to a system, defense in depth minimizes the adverse impact and offers administrators and engineers time to deploy new or updated countermeasures to avoid recurrence. Components of defense in depth contain antivirus computer software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to electronic countermeasures, physical protection of business internet sites along with complete and ongoing personnel education enhances the safety of important information against compromise, theft or destruction. Implementation:
- Network Controls
- Antivirus Software program
- Check File Reputation
- Analyze Behavior
- Repair the Leak
Monitoring network visitors is the 1st line of defense. Firewalls can support with this, but for a more extensive safety solution an intrusion prevention system (IPS) ought to also be employed.
Using antivirus computer software is crucial, but it’s not an all-inclusive remedy. It frequently relies heavily on signature-based detection that can be exploited by an intelligent attacker. Some antivirus applications also use heuristics that appear for suspicious activity. For instance, if a document tried to download an executable when opened, the antivirus program would halt the download and quarantine the file.
The reputation of a file deals with its frequency of use and the supply. Each and every file has a checksum, a mathematical representation of the file, that can be employed to verify against known viruses and block matches. It can also be used to locate how often a file shows up. If the incoming file is fully exclusive, it’s marked as suspicious, as it ought to be in circulation someplace else. It is also critical to verify the reputation of the file’s origin. Verify the IP address of either the sender or origin website and choose whether it is a trustworthy source.
Network and file behaviors give insight into regardless of whether a breach is in progress or has currently occurred. By the time behavioral analysis comes into play, prevention has already failed and the new aim is detection. Initially this calls for an organization to develop a baseline for “normal” behavior. Algorithms can then use this baseline to detect anomalies such as higher-bandwidth traffic or extremely lengthy connections.
After an attack is detected, it’s crucial to shut it down swiftly. In addition to deleting malicious files the initial entry point of the attack requirements to be identified and repaired. Example Of Defense In Depth
Assume an organization utilizes a defense in depth technique. This firm uses a firewall, a standard antivirus plan, and behavioral evaluation. An attacker creates a phishing attack and sends out a convincing email with a organization schedule attached in the form of a PDF. The e mail tends to make it past the firewall and ends up in the inbox of an unsuspecting employee. When the employee opens the PDF it begins to download a malicious executable file. Fortunately, the behavioral analysis tool notices the anomaly and sends up an alert regarding the file. Though the attack was effectively detected, there are 3 issues the organization could improve to quit the attack from occurring in the 1st location. 1st, the organization could use an IPS to offer an extra layer of network safety. Second, they could upgrade their antivirus application to 1 that employs heuristics. This way the file could be automatically dealt with alternatively of merely sending an alert. Third, and most crucial, the firm could offer you employee security training so that phishing attacks never succeed, even if they make it previous all of the filters.
Type: Free Essay Example
This material is not unique
Our experts help you to write plagiarism-free paper
Get plagiarism-free paper
Get plagiarism-free paper
Would you like to get an example of this paper?
Please write down your email to receive it right away