TITLE:
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
AUTHORS:
Lance Cleghorn
KEYWORDS:
Defense in Depth, Defense in Breadth; Network Defense; Security Architecture; Defense Methodology; Information Assurance
JOURNAL NAME:
Journal of Information Security,
Vol.4 No.3,
July
12,
2013
ABSTRACT:
The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information
security; this paper will address the shortcomings of early implementations. In
the last two years, many supporters of the defense in depth security
methodology have changed their allegiance to an offshoot method dubbed the
defense in breadth methodology. A substantial portion of this paper’s body will
be devoted to comparing real-world usage scenarios and discussing the flaws in
each method. A major goal of this publication will be to assist readers in
selecting a method that will best benefit their personal environment. Scenarios
certainly exist where one method may be clearly favored; this article will help
identify the factors that make one method a clear choice over another. This
paper will strive not only to highlight key strengths and weaknesses for the
two strategies listed, but also provide the evaluation techniques necessary
for readers to apply to other popular methodologies in order to make the most
appropriate personal determinations.