Information security, sometimes shortened to infosec



Download 0,67 Mb.
Pdf ko'rish
bet14/35
Sana07.08.2021
Hajmi0,67 Mb.
#140828
1   ...   10   11   12   13   14   15   16   17   ...   35
Bog'liq
Information security - Wikipedia

Defense in depth

The 
onion model
 of defense in depth


Information security must protect
information throughout its lifespan, from
the initial creation of the information on
through to the final disposal of the
information. The information must be
protected while in motion and while at
rest. During its lifetime, information may
pass through many different information
processing systems and through many
different parts of information processing
systems. There are many different ways
the information and information systems
can be threatened. To fully protect the
information during its lifetime, each
component of the information
processing system must have its own


protection mechanisms. The building up,
layering on and overlapping of security
measures is called "defense in depth." In
contrast to a metal chain, which is
famously only as strong as its weakest
link, the defense in depth strategy aims
at a structure where, should one
defensive measure fail, other measures
will continue to provide protection.
[52]
Recall the earlier discussion about
administrative controls, logical controls,
and physical controls. The three types of
controls can be used to form the basis
upon which to build a defense in depth
strategy. With this approach, defense in
depth can be conceptualized as three


distinct layers or planes laid one on top
of the other. Additional insight into
defense in depth can be gained by
thinking of it as forming the layers of an
onion, with data at the core of the onion,
people the next outer layer of the onion,
and network security, host-based
security and application security forming
the outermost layers of the onion. Both
perspectives are equally valid, and each
provides valuable insight into the
implementation of a good defense in
depth strategy.

Download 0,67 Mb.

Do'stlaringiz bilan baham:
1   ...   10   11   12   13   14   15   16   17   ...   35




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2025
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish