Defense in depth is a concept where there are multiple layers of protection. An analogy would be the way a castle is defended. The first layer of defense could be clearing the area around the castle to prevent attackers from having anything to hide behind. The next layer might be a moat around the castle that would make getting to the castle wall difficult. The next layer might be a thick outer wall that is difficult to breach. Making the wall high would be another layer of protection, making it hard to go OVER the wall. Archers mounted on top of the wall would be another layer of protection. Providing arrow slits for the archers to shoot through would provide more protection for the archers and make them more effective at defending the castle. The castle might aslo contain an inner-keep that provides another layer of defense that would have to be breached in order to get to those inside.
In computers the defense-in-depth could be achieved by combining many different protections to build up to greater overall protection. If one defense is breached there are still other protections in place that can thwart the attack. Anti-virus software, firewalls, e-mail filters, security training, policies and proceedures, physical access limitations, system backups, system redundancy, contingency planning, and many other technical, policy, and procedure protections can be combined to provide good overall security for a computer system.
One antivirus engine could be deployed to the clients and an alternate antivirus engine could be deployed to the server.
One antivirus engine could be deployed to the clients and an alternate antivirus engine could be deployed to the server
Limit regional conflict Contribute to homeland defense in depth Win our nation's wars
Maneuver to bring superior local forces to bear via the interior lines of communication, to absorb an initial attack and counterattack at the enemy's most vulnerable point.
An important principle of the Defense in Depth strategy is that achieving Information assurance requires a balanced focus on three primary elements: People, Technology and defense of the environment
DiD - Defense in Depth
The Defense in Depth strategy is defined and mandated by Army Regulation 525-3, titled "Antiterrorism." This regulation provides guidelines and procedures for implementing antiterrorism measures, including the Defense in Depth strategy, to protect Army personnel, facilities, and resources from the threat of terrorism.
AR 25-2Information Assurance (See AR 25-2 paragraph 1-1)Purpose:Defines and mandates the Defense in Depth strategy.
Network. pg 374
That fact alone is not a sufficient guarantee of it.
Security dollars are invested in a single solution
People, operations and defense of the environment.
Massad Ayoob is famous for his self defense techniques taught to law enforcement and citizens. Massad is also an accomplished author of over 1,000 books and articles on self defense training.
This is accomplished by passing, running, penalty, and recovering what was once a turnover to the defense.