Question

In: Computer Science

his week we will focus on security, and the building blocks. I would also describe it...

his week we will focus on security, and the building blocks.

I would also describe it this way, layers of security. When you build security you want layers, if someone is able to get past one layer you need another and so on.

What examples of security layers can you point out?

Solutions

Expert Solution

Security layers:

layered security is also known as layered defence, describes the practice of combining multiple mitigating security controls to protect resources and data.

Layered security(defence in depth) is one way we can best tackle some of these challenges.

Now a days security has became the something of prime essence not only two organisations but to individuals as well.

But unfortunately the continued in advancement in technology opens more organisations and people who use these Technologies to various risks.

Layered security involves using multiple layers of security controls to protect a system, device or infrastructure.

There are various security controls a few of which are listed below. The use of more than one of these controls constitutes Layered security.

1.Data centric security

2. Encryption

3. Firewalls ( hardware and software)

4. Hashing (passwords)

5. Intrusion detection systems (IDS)

6. Logging and auditing

7. Multi Factor authentication

8. Vulnerability scanners

It is worth nothing that layered security does not necessarily stop the attacker from system exploitation though in some instances it can ( depending on the expertise of the attacker, the system in question, the security control implemented on the system) but its main purpose is to slow down the attacker two give the organisation(victims) time to combat the breach.

In general defence in depth (Layered security ) is a concept of effective security postuer employing multiple tools and Different techniques to slow down an attackers.

For example consider your house, you have a lock on your door dogs fence and CCTV each of these provide a security layer.

For an example

one of the most popular service for remote access that is SSH

layered security implies implementing multiple layer of Defence mechanism to secure a service.

Here is how we can apply Layered security for SSH.

SSH runs at application layer and can be secured at multiple layers in the operating systems.

1. Port knocking : open up the ports on demand. With this technique we can open up the SSH port when REQUIRED.

knocked in Debian and fedora based distros can help you accomplish this. Specifying a Knock sequence of ports we can open and close the ports by instructing ip tables to modify rules on fly.

2. Using TCP wrappers.SSH offers support for TCP wrappers therefore providing one additional layer of security.

3. Using apt configurations for SSH such as using password less COMMUNICATION To the server, running SSH on a different port in contrast to running on the Standard 22 port limiting the SSH access to specific set of users OR GROUPS.


Related Solutions

Week 10: Premises Security Liability and Forensic Security Our focus is on liability that security managers...
Week 10: Premises Security Liability and Forensic Security Our focus is on liability that security managers may face in supervising effective security programs. Shielding the organization from lawsuits by avoiding inadequate security claims is part of the responsibility of security managers. Effective security planning can mitigate such risks. For our discussion this week, we consider a case involving the security assessment of a parking lot at a commercial establishment. These are areas are often found to have vulnerabilities in terms...
his week we focused on manufacturing costs, but selling, general, and administrative (SG&A) costs are also...
his week we focused on manufacturing costs, but selling, general, and administrative (SG&A) costs are also important. Using the company you selected for the discussion forum question, what specific types of SG&A costs would the company incur? How would these costs be considered in product costing? As portfolio activities are to be self-reflective, please make sure to connect the portfolio assignment to: Your personal experiences. Reflect on how this assignment topic is applicable to and will benefit you. Course readings...
Although the origins of life are unknown, we do know that the building blocks of life...
Although the origins of life are unknown, we do know that the building blocks of life are complex organic molecules. One of the first experiments to investigate the chemical origins of life was the Stanley-Urey experiment.    Describe the Stanley-Urey experiment and discuss it's findings. (5pts)
Describe (and elaborate) how skills as one of the Building Blocks of Competencies might be reflected...
Describe (and elaborate) how skills as one of the Building Blocks of Competencies might be reflected in the 5 specific themes of: values, cognition, interpersonal behaviors, valuing diversity, and change orientation?
This week we shift our focus to the role of the government and some difficult cases...
This week we shift our focus to the role of the government and some difficult cases where the markets might fail. Can you discuss what can cause this kind of market failure and how the Government intervenes?
Identify and describe the six major building blocks of financial statement analysis. What is the initial...
Identify and describe the six major building blocks of financial statement analysis. What is the initial step in applying the building blocks to analysis of financial statements? (300 words minimum)
Describe BUILDING BLOCKS OF STRATEGY for Dominos pizza where to describe operational Effectiveness, positing, trade-off, unique...
Describe BUILDING BLOCKS OF STRATEGY for Dominos pizza where to describe operational Effectiveness, positing, trade-off, unique activities, fit for your company
This week, we will focus on understanding the accounting/recording process. In our discussion you must first...
This week, we will focus on understanding the accounting/recording process. In our discussion you must first identify and discuss the steps in the recording process. Be sure to discuss what each step does and how it relates to the steps before and after it. Then, answer the following questions: Should business transactions credits and debits be recorded directly into the ledger accounts? What are the advantages of recording in the journal before posting transactions into the ledger?
This week we read the article, "building a better brain is within every student's power" by...
This week we read the article, "building a better brain is within every student's power" by Judy Willis. What did you think about the article? What did you learn? How are you going to use what you have learned to become a better student?
This week, we are focusing on World War I and the explosion of violence on a...
This week, we are focusing on World War I and the explosion of violence on a global stage. This is a period of fear, uncertainty, and turmoil that will greatly impact millions of individuals during this period. Consider how this war was interpreted at home and abroad! Questions to consider: 1. Many argue that many men, notably African American men, fought a war in Europe only to return to a fight at home. Why? What does this mean? 2. Did...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT