Description of Layered Security

1220 Words3 Pages

What is layered security? A method of adding different parts of security in order to either prevent or slow down attackers from entering an information system. Most times layered security is referred to defense in depth. A layered security system have things incorporated such as Firewalls, DMZ, antivirus, and Intrusion Detection Services. The list can be much longer. The purpose of a layered security system is to provide as much protection to the Information system as possible. No one can ever be sure how or when an attacker will attack, but layering the security measures on an information system will help keep it safe. Layered security measures are implemented in places such as big companies, school, and government facilities. At one point in time companies more afraid of thieves breaking and entering into their establishment implementing physical layered security, i.e. guards, motion detectors, sensors on windows, and so on and so on. Now a days the attackers are not breaking and entering they are entering the networks and retrieving sensitive information. Today have just one security measure in place is just not enough, so hence the layered security is so much more important. A basic example of a layered security system is one of a home security service such as “Norton, who provide services like an antivirus application, a firewall application, an anti-spam application, parental controls, and privacy controls.” (Perrin, 2008)

Firewalls

The firewall is commonly the first line of defense in the layered security structure. Also known as a broader sentry. “The firewall protects the internal network from unauthorized access from the internet, but also has the ability to protect internet from rogue users or applicatio...

... middle of paper ...

...erstanding Layered Security and Defense in Depth. Retrieved from techrepublic.com: http://www.techrepublic.com/blog/it-security/understanding-layered-security-and-defense-in-depth/703/

Schauland, D. (2014, February 16 ). In Computer Networking, What Is DMZ? Retrieved from www.wisegeek.org: http://www.wisegeek.org/in-computer-networking-what-is-dmz.htm

Shenk, J. (2013). Layered Security: Why It Works. SANS™ Institute.

Shinder, D. (2005, June 29). SolutionBase: Strengthen network defenses by using a DMZ. Retrieved from Techrepublic.com: http://www.techrepublic.com/article/solutionbase-strengthen-network-defenses-by-using-a-dmz/

Stewart, J. M. (2011). Network Security, Firewalls, and VPNs. Burlington: Jones & Bartlett Learning, LLC.

Tyson, J. (2001, April 6). How Encryption Works. Retrieved from howstufworks.com: http://computer.howstuffworks.com/encryption2.htm

More about Description of Layered Security

Open Document