The Importance Of Defense In Depth

Improved Essays
a) Defense in Depth is the multi layer approach to security. Defense in Depth is one of the major parts of the security architecture. In order to achieve this one organization must implement multiple layers of security controls and safeguards represented in policy, training and education, and technology. Policy is important since it prepares the organization to handle attack proper way, and in combination with technology and training and education can provide a proper defense. Training and education is particularly important when it comes to social engineering and internal (employee) mistakes that can lead to attacks. Technology on the other hand is the main operation layer of Defense in Depth approach since it can detect the attack and also …show more content…
In order to address security incidents that may occur one organization needs to have Mitigate control strategy, also known as Contingency strategy. This strategy has the goal to reduce the impact of the vulnerability exploitation by properly plan and prepare for it. As a part of contingency strategy organization has to prepare three types of plans: Incident Response Plan (IRP), Disaster Recovery Plan (DRP), and Business Continuity Plan (BCP). Incident Response Plan (IRP) consist of actions that takes place while the incident is still in progress. This is the immediate response, and is usually done as soon as the incident is detected. IRP has details of what should be done, who is responsible, and what should be documented. IRP helps the organization to take coordinated actions in situations where incident occurs. This planning process is associated with the identification, classification, response, and recovery from an incident. If the incident escalades or is disastrous, then the organization needs to use Disaster Recovery Plan (DRP). This is the most common of all three, since it revolves around restoring systems after the disastrous incident already occurred. DRP is the planning process associated with the preparation for and recovery from a disaster, whether natural or man-made. DRP include preparation for recovery, strategies to limit losses, and detailed steps to follow after the disaster. This plan also allows organization to take coordinated, planned actions in these types of situation explained

Related Documents

  • Great Essays

    Technical leaders on the project team also prepare essential support and input to the risk assessment. Risk mitigation strategies are most effective when they are developed by those responsible for their implementation. All project supervisory personnel should actively participate in developing mitigation plans. RISK-BASED MANAGEMENT APPROACH Most Parsons projects face a near constant barrage of risks, many of them could harmfully impact the outcome of a project. and it is hard to identify, prioritize, and manage these risks, the project manager performance can be compromised.…

    • 1365 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Project Management Guru

    • 1556 Words
    • 7 Pages

    When you compare planned risk to actual risk, it is easier to identify room for improvement. Identify trends: variances can be ‘point in time’ or they can be trends. If we are consistently experiencing the same risks (trends), we can identify and solve the root of the issue. According to Project Management Guru (2012), two reasons why comparing planned risk to actual risk performance should be an iterative process include: i) Timely response: comparing planned risk to actual risk performance should be performed iteratively so that risks are looked at more closely so that potential problems can be identified timely and corrective action can be taken to control the project evolution. ii) Ever changing: the project risk is constantly changing.…

    • 1556 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Introduction In order for you to plan for security. You must first conduct a full risk assessment. The whole point of security planning is to develop some security polices so that you can implement some controls that will help to prevent the risks to your systems from becoming a reality. This paper will discuss some cybersecurity strategies and other various frameworks. It will also analyze the change control process and identification needed for security for the specific business fields.…

    • 1045 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Sector owners are responsible for their property, people and information through risk assessment and preventive measures. Operational changes, firewalls, secondary communications, training, response plans and security system upgrades are all examples of preventive measures. In order to maintain resilience these measures must be steadily maintained, and with the help of the Buffer Zone Protection Program it is possible. The Buffer Zone Protection Program to help strengthen the nation’s critical infrastructure against risks associated with potential terrorist attacks…

    • 1443 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Risk Management Benefits

    • 1288 Words
    • 5 Pages

    Benefits of Risk Management Risk management is a vital part of homeland security. It is used to determine the true credibility of a threat against the United States. It helps assist administration in determining what damage could be done to people or assets and also help create a plan which would be used to mitigate damage should a threat be carried out (Raymond, 2002). Risk management is all about prioritizing threats according to how credible they are also what kind of damage they may do. Risk management is a complicated process requiring a vast amount of understanding before being able to critique threats successfully.…

    • 1288 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Project managers must realize that internal risks can occur at any phase within a project and can impact the performance, budget, scope, time, and resources of an endeavor (Vaidyanathan, 2013). A PMO should adopt a proactive and integrative approach within the organization’s risk management process. The purpose of implementing the risk management process is to prioritize hazards in order to enable the organization to adapt quickly to variation, elevate the capability to identify risks, correct safety and quality issues, and identify problematic policies and processes (Beauchamp-Akatova & Curran, 2013). Along with correctly assessing potential risks, a PMO should also distinguish the risk attitudes of the organization, as well as the stakeholders of the project (Project Management Institute, 2013). The risk tolerance and threshold of an organization or stakeholder will determine the best course of action if to accept, mitigate, transfer, or avoid the risk (Project Management Institute, 2013).…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    C Analyze risks Identifying the mechanism that deal with the recognized risks and measure their strength. Based on this assessment, considering the risks in terms of possibility and significance, and the present risk level. Risk analysis is the procedure of defining and analyzing the threats to personals, organization and government agencies posed by potential natural or human-caused adverse events. A risk analysis aids to integrate security program with the company 's goals and requirements. It also helps the company to assign a suitable budget for an effective security program and its components.…

    • 1790 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    These assessments are created to help companies be proactive and help prevent threats. As the consultant, I will conduct the assessment and determines how probable it is that a specific risk may happen. A formal report will be given to explain the consequences of each risk present. The risks will also be rated based on the likelihood of the event and the severity of it. This will…

    • 709 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Center should be established whenever there is any incident that disturbs the major functioning of an organization. Both organizations provide important features to the recovery process. With proper support amongst each other they can develop effective Incident Action Plans and communicate them into the field while exchanging pertinent information amongst the many organizations involved in the process making the most effective process. The Boston Marathon Terror attack presents a good example of both agency being utilized for the recovery. The after-Action Report for the responding shares that a unified Command could be established quickly.…

    • 1391 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    To protect my company assets from cyber threats/attacks many things must be taken into consideration because there is always a deeper internal issue in what we believe is secure. Risk assessment and risk management are both very important parts of planning to create a safe, secure work environment to protect my employees and company both on the inside and outside of the company. I would assure that my company conducts a risk assessment periodically. This helps to see what has failed in the past versus what improvements and corrective actions have been made to present day. Comparing and contrasting the effects of failures also helps to determine if the current improvement fall into the same category.…

    • 700 Words
    • 3 Pages
    Improved Essays