This research paper aims to discuss the major strategies of awareness and defense in depth for detecting the developing threats and reinforce the countermeasures. The recent technologies with the introduction of advanced protocols and AI has transformed the analog space into digital space and achieved substantial growth.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: DEFENSE IN DEPTH AND AWARENESS DEFENSE IN DEPTH AND AWARENESS Name of student: Name of university: Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 Introduction This research paper aims to discuss the major strategies of awareness and defense in depth for detecting the developing threats and reinforce the countermeasures. The recent technologies with the introduction of advanced protocols and AI has transformed the analog space into digital space and achieved substantial growth. However, there are several threats thatareconnectedtotheinnovativetechnologiesandthiscanaffecttheNational Infrastructure of any nation as the cost of the risks that are connected with the technologies can be mitigated by spending significant amount of money on the defense technologies. As the common people do not possess any real awareness of all the measures and the threats for identifying the issues of cyber security, these people are not able in undertaking the appropriate steps for dealing with the threats. This research paper intends in making the people aware about some of the threats that can be critical and the enhanced methods for cautiously handle any situation of cybercrime with some probable methods of counteracting against these threats. Discussion Majority of the threats like the DDoS, Botnet, SQL injection, Cross-site scripting are the types of attacks that can be dealt with some advanced technologies. With the help of machine learning, Natural Language Processing and speech recognition, phishing emails or any other innovative techniques of attacks can be prevented. Additionally, some of the session hijack and the reuse of credentials are the types of attacks where the attacker generates innovative techniques every single time, as per requirement. As an instance, when the New York times was targeted for cyber-attack, the major theft from the database was the theft of social security numbers and the mitigation technique that was used to minimise the damage of the attack was the use of several analytical tools. These tools helped in identifying
2 the major gaps in the security and implemented security measures for preventing any future attacks. A cyber crime model was created by Dr. Endsley and this model is a situational awareness, which relies on the intelligent information fusion engine. Network based or host based methods are used for detecting the threats in defense-in-depth. The API uses the techniques that are host based detecting the suspicious codes that evades the impact of packers, the polymorphic and the technology of defamation of the suspicious threat. The Network Based Technique is the approach of Honeypot, which is a network based analysis, actively & passively, the technique that is signature based, are commonly utilised for detecting any kind of anomaly (McIlwraith, 2016). Furthermore, by utilising these techniques and the models the people can be aware of the various stages with various factors that are creating the threats and appropriate action can be taken. Conclusion The sector of the cyber security is a comprehensive area for conducting research and apply security measures in the applications of security surveillance. The main aim of this research is to provide an overview of methods of detection and the use of defense in depth for awareness and apply it as a strategy to protect that critical resources on network of SCADA and other subnets of process control. With the help of machine learning, Natural Language Processing and speech recognition, the integrity of the spam emails that can contain the methods of phishing or any other innovative techniques of attach can grow to the effective and humanlike. The API uses the techniques that are host based detecting the suspicious codes that evades the impact of packers, the polymorphic and the technology of defamation of the suspicious threat.
3 References McIlwraith, A. (2016).Information security and employee behaviour: how to reduce risk through employee education, training and awareness. Routledge. Saleh, J. H., Haga, R. A., Favarò, F. M., & Bakolas, E. (2014). Texas City refinery accident: Casestudyinbreakdownofdefense-in-depthandviolationofthesafety– diagnosability principle in design.Engineering Failure Analysis,36, 121-133.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser