answersLogoWhite

0


Best Answer

The value of data is based on the perspective of the consumer and their objective. If we're talking data in support of warfighter data then the data will be stored where the warfighter can get to it with the least amount of disruption to their operation. If we're talking other data that supports the warfighter then that data might reside at any nunber of places. Additionally, there must be a consideration for raw data vs. product data; data that have been analyzed and produced as actionable. In any case, data for use by systems or people should be protected using a layered approach. At the information layer this means applying security directly to the information, at the infrastruture level this means protecting the information and how its transmitted from one point to another, and at the application layer it means making sure that those objective that access the data have the approriate level of credentials. Its also important to understand that protecting the data is not the only means for ensuring appropriate access. Advesaries will also attack our connections; not connection, no access to the data. So, the layed defense approach not only proetects the information but also protects the conntection between the consumer and the produces. When determining how best to apply Layered defense it is a good practice to use a profile approach. There are 3 profiles when using a layered defense, the Enablement Profile, the Defensive Profile, and Offensive Profile. If interested I can provide more details on what these are and how to apply them when developing a layered strategy.

Regards,

Rick

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Where does a layered network defense strategy put the most valuable data?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

The benefits of layered network architecture?

k


What is layered network?

A layered network, or a network layer, is the set up of how data is sent over a network. Each layer has it's own responsibility by either capturing the data or routing it to a computer on the network.


When was Servicemembers Legal Defense Network created?

Servicemembers Legal Defense Network was created in 1993.


Is the Oxford Educational Network accreditation valuable?

No.


Describe at least five key principles in the design of layered network architecture?

Principles are not advantages or disadvantages of the layered approach, principles are behind the layered approachPrinciples:Data transmission error free.Minimum time for route discovery.Communication between layers through primitives.Congestion control for minimum delays and retransmission.Minimum effort in replacing new layer in the existing network layers.


What is the result of British establishing a railroad network in India?

India became increasingly valuable to the British after they establish a railroad network there. India became increasingly valuable to the British after they establish a railroad network there.


What is a network strategy for an assembly line?

rephrase your question.


What includes all measures to detect unauthorized network activity?

Computer network defense


Includes all measures to detect unauthorized network activity?

Computer network defense


What is the network created by the US Department of Defense?

the internet.


What network was created by US department of defense?

ARPANET


Which phase of the Cisco Lifecycle Services strategy may prompt a network redesign if too many network problems and errors arise in the network?

optimize