An Investigation Into the Application of Defence In Depth Theory to Electronic Information Protection
ABSTRACT
This paper discusses an investigation into the application of traditional Defense in Depth theory to digital electronic information protection. Defense in Depth is firstly discussed in a physical security context, where deterrence, detection, delay and response are shown to be achieved by psychological, electronic, physical and procedural barriers. The Electronic Information Attack Model is then proposed, which comprises a hierarchical structure defining different aspects of electronic information and ways of attacking its confidentiality, integrity and availability. The final component then proposes that the four Defense in Depth functions can provide electronic information protection by layering barriers at various levels in the Electronic Information Attack Model.
AUTHORS
Security Consultant and Writer
Andrew Lester graduated from Edith Cowan University, Western Australia with a Bachelor of Science in Security and a Bachelor of Engineering in Communication Systems. In recent years, Andrew has worked at the Police Scientific Development Branch in the UK, the Australian Institute of Criminology, Edith Cowan University, Senstar-Stellar Corporation in Canada, and has also engaged in numerous consulting activities.
Associate Professor, Security Science, School of Engineering and Mathematics, Edith Cowan University
Western Australia
Clifton Smith is the Associate Professor, Security Science in the School of Engineering and Mathematics, Edith Cowan University, Perth, Western Australia. Professor Smith conducts research in IT security, ballistics and biometric imaging, and security education, and he has developed the professional security programmes of Bachelor of Science (Security), Master of Science (Security Science), and Doctor of Philosophy (Security Science).
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive