1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
defense in depth (DiD)
uses several defensive security controls to protect the data, applications, and network
a layer of defense
applies security at all levels within the network
data and applications
host
network
physical environment
is designed to slow down the attack- uses the military approach
works in a way that if one security control fails, the next one would take over
uses administrative, physical, and technical controls
how it gets implemented
outermost layer- policies and procedures (audits, etc)
next layer- physical security (cameras, fences, bollards)
network security (firewall, IPS, IDS, sandboxing, alerts)
host security (patching, antivirus updates, access controls on data)
innermost layer- data and application security (encryption)
due care
a security risk management concept that involves taking reasonable steps to protect an organization’s information assets from identified risks and vulnerabilites. AKA ordinary care or reasonable care
Defense in Depth- another definition
aka layered defense
using the least privilege and DiD principles is a function of “due care”
should be systematically planned and designed with an outward-in or inward-out approach
can be applied to physical security or technical controls
can technically be deployed physically or virtually
can be a single appliance with multiple integrated engines