Journal of Information Security

Volume 4, Issue 3 (July 2013)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth

HTML  Download Download as PDF (Size: 268KB)  PP. 144-149  
DOI: 10.4236/jis.2013.43017    10,322 Downloads   19,406 Views  Citations
Author(s)

ABSTRACT

The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security; this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored; this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations.

Share and Cite:

L. Cleghorn, "Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth," Journal of Information Security, Vol. 4 No. 3, 2013, pp. 144-149. doi: 10.4236/jis.2013.43017.

Cited by

[1] The Cybersecurity Risk Estimation Engine: A Tool for Possibility Based Risk Analysis
Computers & Security, 2022
[2] Egida: Automated security configuration deployment systems with early error detection
Computers & Security, 2022
[3] The AI Family: The Information Security Managers Best Frenemy?
HICSS, 2022
[4] A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers
Computers & …, 2021
[5] Detecting cyber attacks in time: combining attack simulation with detection logic
2021
[6] Prediction, Detection, and Mitigation of DDoS Attacks Using HPCs: Design for a Safer Adaptive Infrastructure
2021
[7] Defense Mechanisms with Threat Intelligence Capabilities against Blended Threats
2021
[8] Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
2020
[9] Repensando la estrategia de defensa en profundidad. Incorporando capacidades claves para aprender y anticipar los movimientos del adversario digital
2020
[10] EVALUATION OF E-GOVERNMENT INFORMATION SECURITY USING THE DEFENSE IN DEPTH MODEL
2020
[11] Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study ()
2020
[12] Automating the Assessment of Networking and Security in Higher Education
2020
[13] Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
2020
[14] Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
2020
[15] EVALUASI KEAMANAN INFORMASI E-GOVERNMENT MENGGUNAKAN MODEL DEFENSE IN DEPTH
2020
[16] Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
Journal of Information Security, 2020
[17] Cloud and in-house datacenters: determinants of security innovations at the colleges of education, Ghana
2019
[18] A Comprehensive Cybersecurity Defense Framework for Large Organizations
2019
[19] Ransomware life cycle and how to combat it
2019
[20] Automating the Assessment of Network Security in Higher Education
2019
[21] Méthodologie d'ingénierie des exigences de sécurité réseau
2019
[22] Exploring the Strategies Network Security Managers Need to Protect Their Networks from Backdoor Intrusions
2018
[23] Exploring Strategies for Digital Security
2017
[24] Architecting Cyber Defense: A Survey of the Leading Cyber Reference Architectures and Frameworks
2017
[25] A Review on Online-Banking Security Models, Successes, and Failures
2017
[26] Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures?-a quantitative …
ProQuest Dissertations Publishing, 2017
[27] Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures?-a quantitative …
2017
[28] Embracing security in all phases of the software development life cycle: A Delphi study
ProQuest Dissertations Publishing, 2016
[29] An Assessment Methodology and Models for Cyber Systems
ProQuest Dissertations Publishing, 2016
[30] Design of an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) for the EIU Cybersecurity Laboratory
2016
[31] Layer Based Log Analysis for Enhancing Security of Enterprise Data Center: The Case of Ethiopian Education and Research Network
2015
[32] Network cybersecurity indicators: Determining cybersecurity indicators that accurately reflect the state of cybersecurity of a network
ProQuest Dissertations Publishing, 2015
[33] A Tale of Two Cities: Or How the Wrong Metaphors Lead to Less Security
2015
[34] Layer Based Log Analysis for Enhancing Security of Enterprise Data Center
Thesis, 2015
[35] Predictive modeling of complex cyberthreats with formal concept analysis
2015
[36] Layered Defense in Depth Model for IT Organizations
2014
[37] SCHOOL OF GRADUATE STUDIES COLLEGE OF NATURAL SCIENCE DEPARTMENT OF COMPUTER SCIENCE
Thesis, 2014
[38] School of Graduate Studies College of Natural Sciences Department of Computer Science
2014
[39] 矿山灾难纵深防御体系构建及实例分析
中国安全科学学报, 2013

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.