Cyber Attacks
Protecting National Infrastructure, 1st ed.
Chapter 6
Depth
Copyright © 2012, Elsevier Inc.
All Rights Reserved 1
Introduction
Copyright © 2012, Elsevier Inc.
All rights Reserved 2
Chapter 6 – Depth
Fig. 6.1 – General defense in depth schema
Copyright © 2012, Elsevier Inc.
All rights Reserved 3
Chapter 6 – Depth
Effectiveness of Depth
Copyright © 2012, Elsevier Inc.
All rights Reserved 4
Chapter 6 – Depth
Fig. 6.2 – Moderately effective single layer of protection
Copyright © 2012, Elsevier Inc.
All rights Reserved 5
Chapter 6 – Depth
Effectiveness of Depth
• Whenalayerfails,wecanconcludeitwaseither
flawed or unsuited to the target environment
• Nolayeris100%effective—thegoalofmakinglayers “highly” effective is more realistic
Copyright © 2012, Elsevier Inc.
All rights Reserved 6
Chapter 6 – Depth
Fig. 6.3 – Highly effective single layer of protection
Copyright © 2012, Elsevier Inc.
All rights Reserved 7
Chapter 6 – Depth
Fig. 6.4 – Multiple moderately effective layers of protection
Copyright © 2012, Elsevier Inc.
All rights Reserved 8
Chapter 6 – Depth
Layered Authentication
Copyright © 2012, Elsevier Inc.
All rights Reserved 9
Chapter 6 – Depth
Fig. 6.5 – Schema showing two layers of end-user authentication
Copyright © 2012, Elsevier Inc.
All rights Reserved 10
Chapter 6 – Depth
Fig. 6.6 – Authentication options including direct mobile access
Copyright © 2012, Elsevier Inc.
All rights Reserved 11
Chapter 6 – Depth
Layered E-Mail Virus and Spam Protection
Copyright © 2012, Elsevier Inc.
All rights Reserved 12
Chapter 6 – Depth
Fig. 6.7 – Typical architecture with layered e-mail filtering
Copyright © 2012, Elsevier Inc.
All rights Reserved 13
Chapter 6 – Depth
Layered Access Controls
• Layeringaccesscontrolsincreasessecurity
• Addtothisthelimitingofphysicalaccesstoassets
• Fornationalinfrastructure,assetsshouldbecovered by as many layers possible
– Network-based firewalls – Internal firewalls
– Physical security
Copyright © 2012, Elsevier Inc.
All rights Reserved 14
Chapter 6 – Depth
Fig. 6.8 – Three layers of protection using firewall and access controls
Copyright © 2012, Elsevier Inc.
All rights Reserved 15
Chapter 6 – Depth
Layered Encryption
• Fiveencryptionmethodsfornationalinfrastructure protection
– Mobile device storage – Network transmission
– Secure commerce
– Application strengthening
– Server and mainframe data storage
Copyright © 2012, Elsevier Inc.
All rights Reserved 16
Chapter 6 – Depth
Fig. 6.9 – Multple layers of encryption
Copyright © 2012, Elsevier Inc.
All rights Reserved 17
Chapter 6 – Depth
Layered Intrusion Detection
Copyright © 2012, Elsevier Inc.
All rights Reserved 18
Chapter 6 – Depth
Fig. 6.10 – Sharing intrusion detection information between systems
Copyright © 2012, Elsevier Inc.
All rights Reserved 19
Chapter 6 – Depth
National Program of Depth
• Developingamultilayereddefensefornational infrastructure would require a careful architectural analysis of all assets and protection systems
– Identifying assets
– Subjective estimations
– Obtaining proprietary information – Identifying all possible access paths
Copyright © 2012, Elsevier Inc.
All rights Reserved 20
Chapter 6 – Depth
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more