There are multiple things used for defense - a draw bridge, water (may be with crocodile), a heavy iron gate.
What are we defending against?
The castle shown about is used to defense against enemy attack. What about in the Information Security world? Who is the enemy?
You may say the enemy is the hacker. While this is true, the exact term used should be threats. Threat by itself is a subjective word. Threat can be remote, threat can be big or it can be small.
In the Information Security world, 3 terms are used together:
- Risk
- Threat
- Vulnerability
In fact there is a formula for these 3 terms:
Risk = Threat X Vulnerability
For example, when you kept your front door unlock it is a vulnerability but you live in a safe neighborhood your threat is low and thus your risk will not be high. On the other hand if you keep your front door unlock and you live in a high crime area then your risk is very high.
Note: Security is all about mitigation of risk. We can never be 100% secure. The objective of information security is to mitigate all know risk factor to the minimal.
Defense in Depth
Defense in Depth is a security best practice.I have heard the late CEO of Apple Inc Steve Jobs had a security guard to stay within a few feet of his laptop all the time when he is speaking at conferences. I am sure his laptop is both password protected and encrypted, adding another layer of defense will not hurt.
There are 4 kinds of Defense in Depth:
- Uniform Protection
- Protected Enclaves
- Information Centric
- Vector-Oriented
The easiest and most common form is uniform protection where all the resources or data are treated as equally important. With this approach, it is more vulnerable for malicious insider because everything is being treated as equal, an development engineer can gain access to the data in the HR department.
Protected Enclaves
With this approach, resources/data are segmented. It enforces the principle of least privilege so that user can only access what they need to access. So in this case a development engineer cannot gain access to the data in the HR department. The Pentagon has a classify network and a non classify network. One time I was there for on site support and since I did not have security clearance, I have to step out of the room when we debug the classify network and tell the guy that has security clearance to type in the debug command and he will have to ready the output for me. That was quite an experience debugging the classify network.
Information Centric
Data or asset are tagged with different values. We can envision an onion which has different layers. The most important asset will be in the center where more protection is deployed. Each layer has it own security implemented with this defense in depth concept.
image source: http://www.sentrillion.com/images/img_defense-in-depth.jpg
Vector-Oriented
This approach identify attack vector where the threat can be present. Similar to the Information centric approach but the emphasis is on the attach vector such as thumb drives, smartphone that can take pictures.
Role-base Access Control
While this is not usually looked at as a defense in depth model but in principle this is form having multiple ways of gaining access. With the data/resource segmented, after a user is logged into the system with the proper credential, the user is assigned a role and this role can be in a form of a access token is to determine what resource the user is able to access giving an additional level of access control. Microsoft's Kerberos and OpenStack uses this Role-base Access Control.
Related Post:
Information Security Basics Part 1: Security Models
Information Security Basics Part 3: Cryptography
Information Security Basics Part 4: Public Key Infrastructure (PKI)
Great Blog!!! Thanks for sharing with us... it is more useful for us..
ReplyDeletehadoop training in bangalore
big data courses in bangalore
hadoop training institutes in bangalore
Devops Training in Bangalore
Digital Marketing Courses in Bangalore
German Language Course in Madurai
Cloud Computing Courses in Coimbatore
Embedded course in Coimbatore
Security testing is must. Everybody wants security at every level of his working. as explained above failures are happened but if we test time to time then it will improve. So it depend on us how much we are serious about this.
ReplyDeleteMUSTI Dynamic Prevention of Invalid Object Initialization Attacks Project For CSE
Shape of the Cloak Formal Analysis of Clock Skew Based Intrusion Detection System in Controller Area Networks Project For CSE
Statistics Enhanced Direct Batch Growth Self Organizing Mapping for Efficient Dos Attack Detection Project For CSE
A Hand based Multi bio metrics via Deep Hashing Network and Bio metric Graph Matching. Project For CSE
A New Reversible Data Hiding in Encrypted Image Based on Multi Secret Sharing and Light weight Cryptographic Algorithms. Project For CSE
Achieving Maximum Distance Separable Private Information Retrieval Capacity With Linear Codes Project For CSE
Really good post.Thank you for sharing.
ReplyDeleteCloud System Integrators|Cloud Services Provider|Infrastructure as a Service|Digital Marketing|Cloud Security
Nice blog Post ! This post contains very informative and knowledgeable. oracle training in chennai
ReplyDeleteThanks you for sharing this unique useful information content with us. Really awesome work. keep on blogging.
ReplyDeleteartificial intelligence internship | best final year projects for cse | internship certificate online | internship for mba finance students | internship meaning in tamil
yurtdışı kargo
ReplyDeleteresimli magnet
instagram takipçi satın al
yurtdışı kargo
sms onay
dijital kartvizit
dijital kartvizit
https://nobetci-eczane.org/
BRN
salt likit
ReplyDeletesalt likit
dr mood likit
big boss likit
dl likit
dark likit
J8RG
مكافحة حشرات TWZKjkFYal
ReplyDelete