Discuss defense in depth.

What will be an ideal response?


The components and approaches to security should be arranged to provide layers of network defense. This layering approach to network security is often called defense in depth (DiD). The National Security Agency (NSA) originally designed DiD as a best practices strategy for achieving information assurance.
When beginning with an unprotected system, the first layer of defense added is always the most effective. As more layers are stacked on the first, potential attackers must successfully breach each layer to gain access to the next one. However, adding layers also adds increasing complexity for system administrators. Security enhancements must be balanced against the cost to maintain and monitor defenses. DiD does eventually reach a point where the cost of implementing additional security outweighs the potential benefits.

Computer Science & Information Technology

You might also like to view...

Index transparency:

a. Pixel can be transparent or not. b. Controls the degree of a pixel’s transparency. c. Prevents transparency entirely. d. Imposes transparency no matter what.

Computer Science & Information Technology

Legal documents presented for filing in court must be keyed on ____________________ paper.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The actual photographed resolution is known as the ______ resolution.

A. native B. original C. optical D. raw

Computer Science & Information Technology

Flow control statements cannot be used for parallel execution.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology