Day 2 - Defense-in-Depth and Attacks Flashcards
2 - Defense-in-Depth and Attacks
- defense in depth
- access control and password management
- security policies
- critical controls
- malicious code and exploit mitigations
- advanced persistent threats
objectives of defense-in-depth
- risk = threat x vulnerabilities
- CIA triad
- strategies for defense-in-depth
- core security strategies
what is defense in depth (DiD)?
- any layer of protection may fail
- multiple levels of protection must be deployed
- measures must be across a wide range of controls
prevention is ideal, but detection is ?
a must
however, detection without response has minimal value
security deals with?
managing risk to your critical assets
risk is?
the probability of a threat crossing or touching a vulnerability
risk = threats x vulnerabilities
Key Focus of Risk
CIA triad
C - confidentiality
vs. Disclosure
Only shared among authorized persons or organizations
I - Integrity
vs. Alteration
Authentic and complete. Sufficiently accurate. Trustworthy and reliable.
A - Availability
vs. Destruction
Accessible when needed by those who need it
Prioritizing CIA
all are important, which one is important in your organization?
Confidentiality: pharmaceuticals and govt
Integrity: Financial institutions
Availability: e-commerce
Approaches to DiD
deploy measures to reduce, accept, or transfer risk
4 basic approaches:
1) uniform protection
2) protected enclaves
3) information centric
4) threat vector analysis
uniform protection -DiD
- most common DiD approach
- firewall, VPN, intrusion detection, antivirus, patching
- all parts of the organization receive equal protection
- treats all systems the same
protected enclaves DiD
- work groups that require additional protection are segmented from the rest of the organization
- restrict access to critical segments
- internal firewalls
- VLANs and ACLs
information-centric DiD
- identify critical assets and provide layered protection
- data is accessed by apps
- apps reside on hosts
- hosts operate on networks