Research Paper on Defense in Depth and Awareness in Cybersecurity

Verified

Added on  2023/05/29

|5
|742
|248
Report
AI Summary
Document Page
Running head: DEFENSE IN DEPTH AND AWARENESS
DEFENSE IN DEPTH AND AWARENESS
Name of student:
Name of university:
Author’s note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
Introduction
This research paper aims to discuss the major strategies of awareness and defense in
depth for detecting the developing threats and reinforce the countermeasures. The recent
technologies with the introduction of advanced protocols and AI has transformed the analog
space into digital space and achieved substantial growth. However, there are several threats
that are connected to the innovative technologies and this can affect the National
Infrastructure of any nation as the cost of the risks that are connected with the technologies
can be mitigated by spending significant amount of money on the defense technologies.
As the common people do not possess any real awareness of all the measures and the
threats for identifying the issues of cyber security, these people are not able in undertaking
the appropriate steps for dealing with the threats. This research paper intends in making the
people aware about some of the threats that can be critical and the enhanced methods for
cautiously handle any situation of cybercrime with some probable methods of counteracting
against these threats.
Discussion
Majority of the threats like the DDoS, Botnet, SQL injection, Cross-site scripting are
the types of attacks that can be dealt with some advanced technologies. With the help of
machine learning, Natural Language Processing and speech recognition, phishing emails or
any other innovative techniques of attacks can be prevented. Additionally, some of the
session hijack and the reuse of credentials are the types of attacks where the attacker
generates innovative techniques every single time, as per requirement. As an instance, when
the New York times was targeted for cyber-attack, the major theft from the database was the
theft of social security numbers and the mitigation technique that was used to minimise the
damage of the attack was the use of several analytical tools. These tools helped in identifying
Document Page
2
the major gaps in the security and implemented security measures for preventing any future
attacks. A cyber crime model was created by Dr. Endsley and this model is a situational
awareness, which relies on the intelligent information fusion engine. Network based or host
based methods are used for detecting the threats in defense-in-depth. The API uses the
techniques that are host based detecting the suspicious codes that evades the impact of
packers, the polymorphic and the technology of defamation of the suspicious threat. The
Network Based Technique is the approach of Honeypot, which is a network based analysis,
actively & passively, the technique that is signature based, are commonly utilised for
detecting any kind of anomaly (McIlwraith, 2016). Furthermore, by utilising these techniques
and the models the people can be aware of the various stages with various factors that are
creating the threats and appropriate action can be taken.
Conclusion
The sector of the cyber security is a comprehensive area for conducting research and
apply security measures in the applications of security surveillance. The main aim of this
research is to provide an overview of methods of detection and the use of defense in depth for
awareness and apply it as a strategy to protect that critical resources on network of SCADA
and other subnets of process control. With the help of machine learning, Natural Language
Processing and speech recognition, the integrity of the spam emails that can contain the
methods of phishing or any other innovative techniques of attach can grow to the effective
and humanlike. The API uses the techniques that are host based detecting the suspicious
codes that evades the impact of packers, the polymorphic and the technology of defamation
of the suspicious threat.
Document Page
3
References
McIlwraith, A. (2016). Information security and employee behaviour: how to reduce risk
through employee education, training and awareness. Routledge.
Saleh, J. H., Haga, R. A., Favarò, F. M., & Bakolas, E. (2014). Texas City refinery accident:
Case study in breakdown of defense-in-depth and violation of the safety–
diagnosability principle in design. Engineering Failure Analysis, 36, 121-133.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]