Defense in depth is a security concept that uses multiple layers of protection to secure data. It involves people, technology, and operations, and was established by the US National Security Agency. The approach aims to slow down and detect attacks, and includes encryption, firewalls, and password protection.
Defense in depth is an information technology (IT) security concept that involves the use of multiple layers of security to keep information safe. This does not refer to the use of any particular software program, but is a “best practice” methodology that can be used as a guideline for securing a system. There are three basic components to using this approach: people, technology and operations, and securing all three creates a strong overlap in security. Defense in depth is based on a military concept where staggered defense layers can be used to slow down the advance of the opposition.
The idea behind a defense in depth approach to IT security is that multiple layers of protection should be used to protect data. This means that while a virus scanner can be an effective way to keep out malicious software, it should also be paired with a firewall program, sensitive data should be encrypted and password-protected, and users should be educated on best practices. Defense in depth practices were established by the US National Security Agency (NSA) to protect computer systems from possible attacks.
There are three major components to building a defense in depth system, which are the people who have access to the system, the technology used, and the operations or management of that system. People include not only employees of a company, who may be allowed access to sensitive data, but also those who may want to attack a company and gain access to information illegally. Employees should be taught best practices and a strong security presence should be considered to reinforce the importance of people as a component of IT security.
The actual technology used in a system is also vital to creating a defense in depth approach to security. This means that the software must be trusted and verified by reputable third parties who have tested the software. Levels of technological security should be established, including encryption, firewalls, data access monitoring systems and password protection of terminals. The operations involved in this type of project are also vital, as effective management of people and technology is the only way to ensure that these systems are in place and used correctly.
Defense in depth is designed not only to better protect information, but also to slow down and detect attacks on a business or agency. This approach recognizes that an attack is a matter of “when” not “if,” so the system is designed to create a layered defense to slow down an attack. Since an attack takes longer to complete, other systems can be used to detect it. This allows a business or agency to not only secure data, but also identify and take action against attackers who attempt to access that data illegally.
Protect your devices with Threat Protection by NordVPN