Research paper

User Generated

wnpxM

Computer Science

ucm

Description

write a research paper that explains how defense-in-depth and awareness are complimentary techniques to detect emerging threats and strengthen countermeasures.

List of sources must be in APA format, and MUST cite reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper.

Reference two (2) peer-reviewed articles or papers that support THESIS statement.

At least 500 words in length (but NOT longer than 1000 words).

Paper has Thesis statement, Introduction, Content, proper organizing, Citation format, Conclusion.

No plagiarism Please..!!

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go hun!

Running Head: DEFENSE IN DEPTH

1

Defense in Depth
Instructor
Class
Date
Name

DEFENSE IN DEPTH

2
Defense in Depth

The integration of an organization using two different methods of security provides
increased security as opposed to adopting only one approach. The defense of depth has been
taken extremely seriously by organizations to increase the chances of detecting emerging threats
while strengthening their countermeasures. The advancements in technology and the moving
from analog to digital space has provided vast opportunities in advanced protocols relating to the
exponential growth of the organization’s security. Defense-in-depth and awareness techniques
combined provides organizations increased alerts to security detection. According to the text in
chapter 10, situational awareness is the real-time understanding of how an organization relates to
its security risk posture and requires many elements (Amoroso, 2012). Those elements consist of
the security infrastructure, network and computing architecture, business environment, global
threats, and hardware/software profiles. Defense in depth and awareness is known as a cybersecurity strategy that entails the different components utilized in the protection of data and
becomes essential for the security of the organization’s strength.
The defense mechanisms and techniques work in ways that if one fails, there is another to
cover the risks detected immediately. Using this strategy helps build the strength of the overall
security levels concerning the system while effectively working to resolve the security attacks in
the process (Luo, 2016). There is not a security measure or task that becomes more complex than
those working to detect the ongoing attacks occurring. The mechanisms used for these situations
should be comprehensive in nature to determine the risk level of the threat (Amoroso, 2012). The
digital world has dramatically increased how threats are mitigated and how risks can evolve.
There is a great need to ensure that the risks associated with the attacks are incorporated with
layers of security protection and strategies to enforce and address the defense.

DEFENSE IN DEPTH

3

There are many threats, such as the Botnet, DDoS, SQL injections, and Cross-site
scripting, which requires many in-depth techniques to be incorporated to ensure protection to the
system is given and effective. Also, there are other types of threats such as hijacking and
credential reuse that has developed new methods over time towards the attack in which is applied
(Jang-Jaccard & Nepal, 2014). Further in-depth awareness and techniques can stall these attacks
from occurring with the proper layers of protection involving numerous security risk programs.
Programs such as intel...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags