preview

The Core Layers Of Defense

Better Essays

Internet of Things is a new technology that delivers communication among billions of smart devices via the Internet such as a smart car, vending machine, smart house, health system and business system, et cetera. Nearly 50 billion devices and sensors will be connected to the Internet by 2020 and most of them will perform their duties without having security. In addition, the critical missions of a massive interconnected device are security and interoperability. Hackers will use more complex tools and techniques to breach the network system. Hence, companies should establish strong security countermeasures and the best approach to provide better security by deploying a multilayer approach, which is called defense in depth. Defense in depth …show more content…

A good policy should be concerned with providing data confidentiality, integrity, availability, resource protections, and also should be audited periodically. An example of policy is encrypting critical data in order to send it via the Internet. The second part is procedures, which are details of the steps and documentations that explain how a particular function or job should be done. For instance, a detail instruction which tells how a particular program should be installed. The last part is the awareness and training which is very critical to take into consideration so as to employees protect the company’s information and inform the responsible staffs. Thus, all employees should be trained and aware of general security by providing them security training whenever it is necessary and educate them about cyber security.
The second approach of defense in depth is application security. Applications are programs which are used by users for multi-purpose tasks. Users directly interact with applications, such as internet browsing and using email; therefore, applications have more associated with security risk and vulnerability. Vulnerability is the weaknesses of a system which hackers may take advantage of and can compromise the system. There are a lot of ways to protect applications from intruders, such as vulnerability scanners, which are tools and programs used to detect vulnerability before the attacker compromises the system.

Get Access