logo

Defense in Depth and Awareness

   

Added on  2023-05-29

5 Pages742 Words248 Views
 | 
 | 
 | 
Running head: DEFENSE IN DEPTH AND AWARENESS
DEFENSE IN DEPTH AND AWARENESS
Name of student:
Name of university:
Author’s note:
Defense in Depth and Awareness_1

1
Introduction
This research paper aims to discuss the major strategies of awareness and defense in
depth for detecting the developing threats and reinforce the countermeasures. The recent
technologies with the introduction of advanced protocols and AI has transformed the analog
space into digital space and achieved substantial growth. However, there are several threats
that are connected to the innovative technologies and this can affect the National
Infrastructure of any nation as the cost of the risks that are connected with the technologies
can be mitigated by spending significant amount of money on the defense technologies.
As the common people do not possess any real awareness of all the measures and the
threats for identifying the issues of cyber security, these people are not able in undertaking
the appropriate steps for dealing with the threats. This research paper intends in making the
people aware about some of the threats that can be critical and the enhanced methods for
cautiously handle any situation of cybercrime with some probable methods of counteracting
against these threats.
Discussion
Majority of the threats like the DDoS, Botnet, SQL injection, Cross-site scripting are
the types of attacks that can be dealt with some advanced technologies. With the help of
machine learning, Natural Language Processing and speech recognition, phishing emails or
any other innovative techniques of attacks can be prevented. Additionally, some of the
session hijack and the reuse of credentials are the types of attacks where the attacker
generates innovative techniques every single time, as per requirement. As an instance, when
the New York times was targeted for cyber-attack, the major theft from the database was the
theft of social security numbers and the mitigation technique that was used to minimise the
damage of the attack was the use of several analytical tools. These tools helped in identifying
Defense in Depth and Awareness_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents