Home » National Program Of Depth

National Program Of Depth

Cyber Attacks

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Protecting National Infrastructure, 1st ed.

page1image996030256page1image996250640page1image996648112

Chapter 6

Depth

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

page1image996197168

Copyright © 2012, Elsevier Inc.
All Rights Reserved 1

page1image996673664page2image1039975824

Introduction

  • Anylayerofdefensecanfailatanytime,thusthe
    introduction of defense in depth
  • Aseriesofprotectiveelementsisplacedbetweenan
    asset and the adversary
  • Theintentistoenforcepolicyacrossallaccesspoints

page2image1040014112

Copyright © 2012, Elsevier Inc.
All rights Reserved 2

page2image1040020352

Chapter 6 – Depth

page3image1039965776

Fig. 6.1 – General defense in depth schema

page3image1040045392page3image1040045728

Copyright © 2012, Elsevier Inc.
All rights Reserved 3

page3image1040051952

Chapter 6 – Depth

page4image1039989376

Effectiveness of Depth

  • Quantifyingtheeffectivenessofalayereddefenseis often difficult
  • Effectivenessisbestdeterminedbyeducatedguesses
  • Thefollowingarerelevantforestimating
    effectiveness
    – Practical experience
    – Engineering analysis
    – Use-case studies
    – Testing and simulation

page4image1040103968

Copyright © 2012, Elsevier Inc.
All rights Reserved 4

page4image1040110208

Chapter 6 – Depth

page5image1040070672

Fig. 6.2 – Moderately effective single layer of protection

page5image1040133552page5image1040133888

Copyright © 2012, Elsevier Inc.
All rights Reserved 5

page5image1040140048

Chapter 6 – Depth

page6image1040154816

Effectiveness of Depth
• Whenalayerfails,wecanconcludeitwaseither

flawed or unsuited to the target environment

• Nolayeris100%effective—thegoalofmakinglayers “highly” effective is more realistic

page6image1085285088

Copyright © 2012, Elsevier Inc.
All rights Reserved 6

page6image1085291296

Chapter 6 – Depth

page7image1040074672

Fig. 6.3 – Highly effective single layer of protection

page7image1085316592page7image1085316928

Copyright © 2012, Elsevier Inc.
All rights Reserved 7

page7image1085323120

Chapter 6 – Depth

page8image1040071808

Fig. 6.4 – Multiple moderately effective layers of protection

page8image1085349344page8image1085349680

Copyright © 2012, Elsevier Inc.
All rights Reserved 8

page8image1085355840

Chapter 6 – Depth

page9image1085338048

Layered Authentication

  • Anationalauthenticationsystemforeverycitizen would remove the need for multiple passwords, passphrases, tokens, certificates, and biometrics that weaken security
  • Singlesign-on(SSO)wouldaccomplishthis authentication simplification objective
  • However,SSOaccessneedstobepartofa multilayered defense

page9image1085408640

Copyright © 2012, Elsevier Inc.
All rights Reserved 9

page9image1085414880

Chapter 6 – Depth

page10image1082218656

Fig. 6.5 – Schema showing two layers of end-user authentication

page10image1082520816page10image1082521152

Copyright © 2012, Elsevier Inc.
All rights Reserved 10

page10image1082527376

Chapter 6 – Depth

page11image1085373104

Fig. 6.6 – Authentication options including direct mobile access

page11image1085439792page11image1085440128

Copyright © 2012, Elsevier Inc.
All rights Reserved 11

page11image1085446384

Chapter 6 – Depth

page12image1085381680

Layered E-Mail Virus and Spam Protection

  • Commercialenvironmentsareturningtovirtual,in- the-cloud solutions to filter e-mail viruses and spam
  • Tothatsecuritylayerisaddedfilteringsoftwareon individual computers
  • Antivirussoftwarehelpful,butuselessagainstcertain attacks (like botnet)

page12image1085496720

Copyright © 2012, Elsevier Inc.
All rights Reserved 12

page12image1085503024

Chapter 6 – Depth

page13image1085462848

Fig. 6.7 – Typical architecture with layered e-mail filtering

page13image1085527712page13image1085528048

Copyright © 2012, Elsevier Inc.
All rights Reserved 13

page13image1085534304

Chapter 6 – Depth

page14image1085549232

Layered Access Controls

• Layeringaccesscontrolsincreasessecurity

• Addtothisthelimitingofphysicalaccesstoassets

• Fornationalinfrastructure,assetsshouldbecovered by as many layers possible

– Network-based firewalls – Internal firewalls
– Physical security

page14image1085581312

Copyright © 2012, Elsevier Inc.
All rights Reserved 14

page14image1085587616

Chapter 6 – Depth

page15image1082868992

Fig. 6.8 – Three layers of protection using firewall and access controls

page15image1082881024page15image1082881360

Copyright © 2012, Elsevier Inc.
All rights Reserved 15

page15image1082887584

Chapter 6 – Depth

page16image1085556864

Layered Encryption

• Fiveencryptionmethodsfornationalinfrastructure protection

– Mobile device storage – Network transmission

– Secure commerce
– Application strengthening
– Server and mainframe data storage

page16image1085630656

Copyright © 2012, Elsevier Inc.
All rights Reserved 16

page16image1085636928

Chapter 6 – Depth

page17image1082967376

Fig. 6.9 – Multple layers of encryption

page17image1083018784page17image1083019120

Copyright © 2012, Elsevier Inc.
All rights Reserved 17

page17image1083015616

Chapter 6 – Depth

page18image1083105776

Layered Intrusion Detection

  • Thepromiseoflayeredintrusiondetectionhasnot been fully realized, though it is useful
  • Theinclusionofintrusionresponsemakesthe layered approach more complex
  • Therearethreeopportunitiesfordifferentintrusion detection systems to provide layered protection
    – In-band detection
    – Out-of-band correlation – Signature sharing

page18image1083154864

Copyright © 2012, Elsevier Inc.
All rights Reserved 18

page18image1083161168

Chapter 6 – Depth

page19image1083127392

Fig. 6.10 – Sharing intrusion detection information between systems

page19image1086348176page19image1086348512

Copyright © 2012, Elsevier Inc.
All rights Reserved 19

page19image1086354800

Chapter 6 – Depth

page20image1083010240

National Program of Depth

• Developingamultilayereddefensefornational infrastructure would require a careful architectural analysis of all assets and protection systems

– Identifying assets
– Subjective estimations
– Obtaining proprietary information – Identifying all possible access paths

page20image1083053296

Copyright © 2012, Elsevier Inc.
All rights Reserved 20

page20image1083059568

Chapter 6 – Depth

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat+1 763 309 4299EmailWhatsApp

We Can Handle your Online Class from as low as$100 per week