Defence in depth: Defence in depth - protecting the queen

  • Authors:
  • Philip Hunter

  • Affiliations:
  • -

  • Venue:
  • Network Security
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

IT networks may seem highly distributed, yet their great weakness is that in reality they depend on relatively few critical resources. For individual enterprise networks this means that critical services and information are both vulnerable to co-ordinated attacks on just a few core components such as application servers and databases. The concept of defence in depth has emerged as a model to insulate these key resources with protective layers whose interaction ensures that the total level of protection is considerably greater than the sum of its parts.