Defense-in-Depth Limitations

An Investigation Into the Application of Defence In Depth Theory to Electronic Information Protection

ABSTRACT

This paper discusses an investigation into the application of traditional Defense in Depth theory to digital electronic information protection. Defense in Depth is firstly discussed in a physical security context, where deterrence, detection, delay and response are shown to be achieved by psychological, electronic, physical and procedural barriers. The Electronic Information Attack Model is then proposed, which comprises a hierarchical structure defining different aspects of electronic information and ways of attacking its confidentiality, integrity and availability. The final component then proposes that the four Defense in Depth functions can provide electronic information protection by layering barriers at various levels in the Electronic Information Attack Model.

Strategies for Combating Sophisticated Attacks

ABSTRACT

Industrial control systems (ICS) monitor and control the processes of public utility infrastructures that society depends on—the electric power grid, oil and gas pipelines, transportation and water facilities. Attacks that impact the operations of these critical assets could have devastating consequences. Yet, the complexity and desire to interconnect ICS components have introduced vulnerabilities and attack surfaces that previously did not exist. Cyber attacks are increasing in sophistication and have demonstrated an ability to cross over and create effects in the physical domain. Most notably, ICS associated with the critical infrastructure have proven susceptible to sophisticated, targeted attacks.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com