Summary: Defense In Depth

739 Words2 Pages

DEFENSE IN DEPTH
Defense-in-depth involves using multiple layers of controls to avoid having a single point of failure. Computer security involves using a combination of firewalls, passwords, and other preventive procedures to restrict access. Redundancy also applies to detective and corrective controls.

Major types of preventive controls used for defense in depth include:

 Authentication controls to identify the person or device attempting access.
 Authorization controls to restrict access to authorized users. These controls are implemented with an access control matrix and compatibility tests.
 Training to teach employees why security measures are important and teach them to use safe computing practices.
 Physical access controls to protect entry points to …show more content…

It works with the border router to filter information trying to enter or leave the organization.

Data is transmitted over the Internet in packets through a protocol called TCP/IP. A set of rules called an access control list (ACL) determines which packets are allowed in and which are dropped. Stateful packet filtering examines the header of each packet in isolation. Deep packet filtering examines the data in the body of a packet to provide more effective access control. Deep packet filtering is the heart of a new type of filter called intrusion prevention systems.

Internal firewalls can be used to segment different departments within an organization.

Web servers and email servers are placed in a separate network outside the corporate network referred to as the demilitarized zone.

Special attention must be paid to use of rogue modems by employees. Wireless access and dial-up modems require special security procedures.

Host and application hardening procedures involve the use of supplemental preventive controls on workstations, servers, printers, and other devices. Special attention should be paid to host configuration, user accounts, and software

Open Document