Defense in Depth: An Impractical Strategy for a Cyber-World

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Defense in Depth: An Impractical Strategy for a Cyber-World by Prescott Small, Prescott Small
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Prescott Small ISBN: 9781465791894
Publisher: Prescott Small Publication: January 31, 2012
Imprint: Smashwords Edition Language: English
Author: Prescott Small
ISBN: 9781465791894
Publisher: Prescott Small
Publication: January 31, 2012
Imprint: Smashwords Edition
Language: English

Businesses and Information Technology Security Professionals have spent a tremendous amount of time, money and resources to deploy a Defense in Depth approach to Information Technology Security. Yet successful attacks against RSA, HB Gary, Booz, Allen & Hamilton, the United States Military, and many others are examples of how Defense in Depth, as practiced, is unsustainable and the examples show that the enemy cannot be eliminated permanently. A closer look at how Defense in Depth evolved and how it was made to fit within Information Technology is important to help better understand the trends seen today. Knowing that Defense in Depth, as practiced, actually renders the organization more vulnerable is vital to understanding that there must be a shift in attitudes and thinking to better address the risks faced in a more effective manner. Based on examples in this paper, a change is proposed in the current security and risk management models from the Defense in Depth model to Sustained Cyber-Siege Defense. The implications for this are significant in that there have to be transitions in thinking as well as how People, Process and Technology are implemented to better defend against a never ending siege by a limitless number and variety of attackers that cannot be eliminated. The suggestions proposed are not a drastic change in operations as much as how defenses area aligned, achieve vendor collaboration by applying market pressures and openly sharing information with each other as well as with federal and state agencies. By more accurately describing the problems, corporations and IT Security Professionals will be better equipped to address the challenges faced together.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Businesses and Information Technology Security Professionals have spent a tremendous amount of time, money and resources to deploy a Defense in Depth approach to Information Technology Security. Yet successful attacks against RSA, HB Gary, Booz, Allen & Hamilton, the United States Military, and many others are examples of how Defense in Depth, as practiced, is unsustainable and the examples show that the enemy cannot be eliminated permanently. A closer look at how Defense in Depth evolved and how it was made to fit within Information Technology is important to help better understand the trends seen today. Knowing that Defense in Depth, as practiced, actually renders the organization more vulnerable is vital to understanding that there must be a shift in attitudes and thinking to better address the risks faced in a more effective manner. Based on examples in this paper, a change is proposed in the current security and risk management models from the Defense in Depth model to Sustained Cyber-Siege Defense. The implications for this are significant in that there have to be transitions in thinking as well as how People, Process and Technology are implemented to better defend against a never ending siege by a limitless number and variety of attackers that cannot be eliminated. The suggestions proposed are not a drastic change in operations as much as how defenses area aligned, achieve vendor collaboration by applying market pressures and openly sharing information with each other as well as with federal and state agencies. By more accurately describing the problems, corporations and IT Security Professionals will be better equipped to address the challenges faced together.

More books from Application Software

Cover of the book Microsoft SQL Server T-SQL Fundamentals by Prescott Small
Cover of the book CRM in Real Time: Empowering Customer Relationships by Prescott Small
Cover of the book Applying Business Intelligence to Clinical and Healthcare Organizations by Prescott Small
Cover of the book Analyzing Computer Security by Prescott Small
Cover of the book More Excel Outside the Box by Prescott Small
Cover of the book 跟四大會計師事務所學做Excel圖表:如何規畫讓客戶一目了然的商業圖解報表 第二版 by Prescott Small
Cover of the book Ist Fernsehen jetzt ueberall? Ein amerikanisch-deutscher Vergleich über die Distribution von TV-Inhalten im Internet by Prescott Small
Cover of the book Unity 5 Game Optimization by Prescott Small
Cover of the book Hands-On GUI Application Development in Go by Prescott Small
Cover of the book QuickBooks 2005: The Missing Manual by Prescott Small
Cover of the book Designing and Building Security Operations Center by Prescott Small
Cover of the book PowerShell and Python Together by Prescott Small
Cover of the book Notwendigkeit der Modellierung von Unsicherheiten in Fernerkundung und digitaler Bildverarbeitung by Prescott Small
Cover of the book Discovering Partial Least Squares with JMP by Prescott Small
Cover of the book Microsoft PowerPoint 2010: The Unofficial Handbook by Prescott Small
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy