2012 7th International Conference on System of Systems Engineering (SoSE) 2012
DOI: 10.1109/sysose.2012.6384127
|View full text |Cite
|
Sign up to set email alerts
|

Advancing the defense in depth model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
38
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(38 citation statements)
references
References 11 publications
0
38
0
Order By: Relevance
“…2 which should be managed properly. Defense in depth base on layered architecture, every layer has its own implementation and management such as in network layer every OSI layer must be considered and secured; hence produces overhead for administrators [14], [15].…”
Section: Defense In Depthmentioning
confidence: 99%
“…2 which should be managed properly. Defense in depth base on layered architecture, every layer has its own implementation and management such as in network layer every OSI layer must be considered and secured; hence produces overhead for administrators [14], [15].…”
Section: Defense In Depthmentioning
confidence: 99%
“…Evaluating the Defense in Depth strategy in terms of current threats will provide additional insight into the key aspects of the strategy [5]. Automated attacks occur almost constantly against any public-facing service; however, these attacks lack sophistication as they often are carried out by a program rather than a live, skilled person [6].…”
Section: Defense In Depthmentioning
confidence: 99%
“…While the defense in depth methodology should be applied to all assets equally, many practitioners clustered defenses at the perimeter [9]. Advances in the practice of defense in depth have led to a more comprehensive security deployment [5].…”
Section: Defense In Depthmentioning
confidence: 99%
See 2 more Smart Citations