logo

Defense in Depth and Awareness

Rubric for a research paper that includes criteria for thesis statement, introduction, content, organization, and citation format.

5 Pages742 Words248 Views
   

Added on  2023-05-29

About This Document

This research paper aims to discuss the major strategies of awareness and defense in depth for detecting the developing threats and reinforce the countermeasures. The recent technologies with the introduction of advanced protocols and AI has transformed the analog space into digital space and achieved substantial growth.

Defense in Depth and Awareness

Rubric for a research paper that includes criteria for thesis statement, introduction, content, organization, and citation format.

   Added on 2023-05-29

ShareRelated Documents
Running head: DEFENSE IN DEPTH AND AWARENESS
DEFENSE IN DEPTH AND AWARENESS
Name of student:
Name of university:
Author’s note:
Defense in Depth and Awareness_1
1
Introduction
This research paper aims to discuss the major strategies of awareness and defense in
depth for detecting the developing threats and reinforce the countermeasures. The recent
technologies with the introduction of advanced protocols and AI has transformed the analog
space into digital space and achieved substantial growth. However, there are several threats
that are connected to the innovative technologies and this can affect the National
Infrastructure of any nation as the cost of the risks that are connected with the technologies
can be mitigated by spending significant amount of money on the defense technologies.
As the common people do not possess any real awareness of all the measures and the
threats for identifying the issues of cyber security, these people are not able in undertaking
the appropriate steps for dealing with the threats. This research paper intends in making the
people aware about some of the threats that can be critical and the enhanced methods for
cautiously handle any situation of cybercrime with some probable methods of counteracting
against these threats.
Discussion
Majority of the threats like the DDoS, Botnet, SQL injection, Cross-site scripting are
the types of attacks that can be dealt with some advanced technologies. With the help of
machine learning, Natural Language Processing and speech recognition, phishing emails or
any other innovative techniques of attacks can be prevented. Additionally, some of the
session hijack and the reuse of credentials are the types of attacks where the attacker
generates innovative techniques every single time, as per requirement. As an instance, when
the New York times was targeted for cyber-attack, the major theft from the database was the
theft of social security numbers and the mitigation technique that was used to minimise the
damage of the attack was the use of several analytical tools. These tools helped in identifying
Defense in Depth and Awareness_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Security Risks and Risk Mitigation Approaches : Report
|7
|2906
|188

SIT719.3 Keeping Data Private | Deakin University
|12
|2766
|94

Self-Defending Networks: Protecting Company Resources
|8
|1666
|96

Healthcare Networks: Technologies, Devices, Recent Developments, Importance of Security, and Mitigation Techniques
|7
|278
|396

Project Dissertation Proposal: Next Generation Cybertrap
|12
|4471
|188

Awareness and Defense in Depth
|6
|870
|70