Chat with us, powered by LiveChat Defense in Depth (DiD) - Essayabode

Defense in Depth (DiD)

Order Instructions

For this Discussion Board, please complete the following:

 

The design of Defense in Depth (DiD) means much more in computer science than traditional medieval warfare. Moats and walls used to slow down the enemy so archers could make the attack much more difficult. The invention of the trebuchet meant that armies could attack from nearly 1,000 feet away. Computers were once a device of local use, but networking and the Internet mean that enemies can attack from anywhere in the world.

 

Spheres of use and protection (Whitman & Mattord, 2021, pp. 113-114) demonstrate that DiD is a much more comprehensive approach to information security than just stalling or making it hard for someone to break into a system. It is important for us to understand how people interact with information, systems, networks, and the Internet to create a comprehensive, overlapping information security approach.

 

Review the following resources to help you with this assignment:

 

Sophos integrates its firewall with Active Directory – https://docs.sophos.com/nsg/sophos-firewall/18.0/Help/en-us/webhelp/onlinehelp/index.html

Google discusses its own recommendations of AD and firewall integration – https://cloud.google.com/managed-microsoft-ad/docs/firewalls

Business leaders provide their perspective on using administrative controls (policies and procedures) to help secure the sphere of protection around their company information – https://www.csoonline.com/article/3263738/9-policies-and-procedures-you-need-to-know-about-if-youre-starting-a-new-security-program.html

Think about your company or a place you have worked and the information they collected (internally and from customers). Think about 3 components of the sphere of protection from the sphere of use, and answer the following:

What is 1 piece of information from the scenario that you feel is critical to that organization?

How would 1 element from each component of the sphere of protection be used in each of the spheres of use (information, systems, network, Internet). Describe how it would protect the information you identified.

How do these security solutions interact, overlap, or support each other in DiD?

 

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?