answersLogoWhite

0

Defense in depth is a concept where there are multiple layers of protection. An analogy would be the way a castle is defended. The first layer of defense could be clearing the area around the castle to prevent attackers from having anything to hide behind. The next layer might be a moat around the castle that would make getting to the castle wall difficult. The next layer might be a thick outer wall that is difficult to breach. Making the wall high would be another layer of protection, making it hard to go OVER the wall. Archers mounted on top of the wall would be another layer of protection. Providing arrow slits for the archers to shoot through would provide more protection for the archers and make them more effective at defending the castle. The castle might aslo contain an inner-keep that provides another layer of defense that would have to be breached in order to get to those inside.

In computers the defense-in-depth could be achieved by combining many different protections to build up to greater overall protection. If one defense is breached there are still other protections in place that can thwart the attack. Anti-virus software, firewalls, e-mail filters, security training, policies and proceedures, physical access limitations, system backups, system redundancy, contingency planning, and many other technical, policy, and procedure protections can be combined to provide good overall security for a computer system.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What is is a strategic imperative that can be accomplished through sea power Limit regional conflict?

Limit regional conflict Contribute to homeland defense in depth Win our nation's wars


Defense in Depth elements focus on what three areas?

An important principle of the Defense in Depth strategy is that achieving Information assurance requires a balanced focus on three primary elements: People, Technology and defense of the environment


What should happen By practicing Defense in Depth?

Maneuver to bring superior local forces to bear via the interior lines of communication, to absorb an initial attack and counterattack at the enemy's most vulnerable point.


What is the multipronged approach to network security called?

DiD - Defense in Depth


Which Army Regulation defines and mandates the Defense in Depth strategy?

AR 25-2Information Assurance (See AR 25-2 paragraph 1-1)Purpose:Defines and mandates the Defense in Depth strategy.


Army Regulation defines and mandates the Defense in Depth strategy?

AR 25-2Information Assurance (See AR 25-2 paragraph 1-1)Purpose:Defines and mandates the Defense in Depth strategy.


Which defense in depth layer involves the use of chokepoints?

Network. pg 374


Is defense lawyer that has been practicing for 30 years a great lawyer?

That fact alone is not a sufficient guarantee of it.


Which would not be a reason to implement Defense in Depth?

Security dollars are invested in a single solution


What is Massad Ayoob famous for?

Massad Ayoob is famous for his self defense techniques taught to law enforcement and citizens. Massad is also an accomplished author of over 1,000 books and articles on self defense training.


What is one of the four opportunities the offense has to do to gain ten or more yards?

This is accomplished by passing, running, penalty, and recovering what was once a turnover to the defense.


Defense in Depth (DiD) encompasses a physical and logical structure that requires a layering of security policies, procedures, and technology mechanisms to protect network resources, from the desktop?

People, operations and defense of the environment.