5,99 €
Statt 9,99 €**
5,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar
payback
0 °P sammeln
5,99 €
Statt 9,99 €**
5,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
Als Download kaufen
Statt 9,99 €****
5,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar
payback
0 °P sammeln
Jetzt verschenken
Statt 9,99 €****
5,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
  • Format: PDF

Academic Paper from the year 2017 in the subject Computer Science - IT-Security, grade: A, Saint Leo University, language: English, abstract: In this paper, the author will dive into the motivation behind "Defense in Depth" and a different layered approach to ensure the security of an information infrastructure. Furthermore, different counter measures to protect the integrity of the information system from both internal and external attacks will be analyzed. Considering the recent cyber-attacks around the world it is understandable that organizations are considering ways to prevent, mitigate…mehr

Produktbeschreibung
Academic Paper from the year 2017 in the subject Computer Science - IT-Security, grade: A, Saint Leo University, language: English, abstract: In this paper, the author will dive into the motivation behind "Defense in Depth" and a different layered approach to ensure the security of an information infrastructure. Furthermore, different counter measures to protect the integrity of the information system from both internal and external attacks will be analyzed. Considering the recent cyber-attacks around the world it is understandable that organizations are considering ways to prevent, mitigate and control their information infrastructure against both internal and external attacks. The concept of Defense in Depth (DiD) revolves around using various methods to protect information systems (layered Defense) that work together in a coordinated manner to protect a network from an attack. Although, it is difficult to guarantee the total protection of a system from eternal attacks, using different counter measures can mitigate these threats to the integrity of the information system. Defense in Depth entails the use of holistic strategies to analyze and identify potential attack surfaces to secure the information system from both internal and external threats.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.