Layered Defense in Depth Model for IT Organizations

نویسنده

  • Azra Shamim
چکیده

Security methodologies are constantly changing and improving hence becoming a challenge for IT organization to keep their posture up-to-date and effective. It may be productive to examine different security postures to create and improve organization’s information security architecture. This paper discusses about defense in depth model and strategy to implement it effectively. Also fructification of each layer of model presents vast variety of implementation alternatives and adoptability according to the design and architecture of organization. Tactically, security is incomplete without proper assessment of assets, risks associated with them and policies to control these risks; the outermost layer of the model covers all these aspects. Well defined policies and procedures aid in designing best security practices for any organization. Security issues do not solve magically but administrators have to evaluate different methodologies to consider as best practice for their organization. Keywords—Defense in depth, Information Security Methodology, Network Defense, Network Security, Security Architecture,

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Layered Security Framework for Intrusion Prevention

Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Due to vulnerabilities in the network system, protecting network from malicious activities is prime concern today. It is important to analyse vulnerabilities and record them so that future attacks can be predicted. In this paper vulnerabilities which ex...

متن کامل

A Contextual Framework For Standards

This paper describes a layered approach to selection and use of open standards which is being developed to support development work within the UK higher and further educational communities. This approach reflects the diversity of the technical environment, the service provider's environment, user requirements and maturity of standards by separating contextual aspects; technical and non-technica...

متن کامل

Presentation of a Suitable Model for Knowledge Management Establishment in Sport Organizations: Delphi Classic Method

In today's increasingly competitive business environment, the use of knowledge to gain a competitive advantage is vital. However, despite the increasing number of studies on sport management in developed countries, few studies have explored knowledge management in sport organizations. This paper aims to propose a model through an in-depth investigation of the previous and current studies on kno...

متن کامل

Using a Layered Model to place EW in Context within the Information Sphere

In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and otherconstructs haveemerged. This paper proposes a threelayer model in an attemptto provide a new perspective on this discussion. Each layeris defined and the rolesand relationships between EW, IW...

متن کامل

Defense-In-Depth Revisited:

Defense-In-Depth [1] concepts for global information operations are physical boundary-centric. However, networkcentric operations are multidimensional, layered and often virtual. The interconnection of defensive operational elements, including the fixed and deployed base, runways, fighter planes, bombers, bombs, tankers, tents and individuals are logically and virtually connected. For this reas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014