The post Defense in Depth (DiD) is a property of College Pal
College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper
For this Discussion Board, please complete the following:
The design of Defense in Depth (DiD) means much more in computer science than traditional medieval warfare. Moats and walls used to slow down the enemy so archers could make the attack much more difficult. The invention of the trebuchet meant that armies could attack from nearly 1,000 feet away. Computers were once a device of local use, but networking and the Internet mean that enemies can attack from anywhere in the world.
Spheres of use and protection (Whitman & Mattord, 2021, pp. 113-114) demonstrate that DiD is a much more comprehensive approach to information security than just stalling or making it hard for someone to break into a system. It is important for us to understand how people interact with information, systems, networks, and the Internet to create a comprehensive, overlapping information security approach.
Review the following resources to help you with this assignment:
Sophos integrates its firewall with Active Directory – https://docs.sophos.com/nsg/sophos-firewall/18.0/Help/en-us/webhelp/onlinehelp/index.html
Google discusses its own recommendations of AD and firewall integration – https://cloud.google.com/managed-microsoft-ad/docs/firewalls
Business leaders provide their perspective on using administrative controls (policies and procedures) to help secure the sphere of protection around their company information – https://www.csoonline.com/article/3263738/9-policies-and-procedures-you-need-to-know-about-if-youre-starting-a-new-security-program.html
Think about your company or a place you have worked and the information they collected (internally and from customers). Think about 3 components of the sphere of protection from the sphere of use, and answer the following:
What is 1 piece of information from the scenario that you feel is critical to that organization?
How would 1 element from each component of the sphere of protection be used in each of the spheres of use (information, systems, network, Internet). Describe how it would protect the information you identified.
How do these security solutions interact, overlap, or support each other in DiD?
The post Defense in Depth (DiD) appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper