Australian Security and Intelligence Conference 2012
DOI: 10.4225/75/57a034ccac5cd
|View full text |Cite
|
Sign up to set email alerts
|

Defence in depth, protection in depth and security in depth: A comparative analysis towards a common usage language

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…It should be noted that the total delay time of the whole system should be measured from the point of detection. Measures should be designed to preclude the possibility of an insider using the barriers to delay response to malicious activity such as sabotage [8,18].…”
Section: Delay Time Of Security Barriersmentioning
confidence: 99%
See 1 more Smart Citation
“…It should be noted that the total delay time of the whole system should be measured from the point of detection. Measures should be designed to preclude the possibility of an insider using the barriers to delay response to malicious activity such as sabotage [8,18].…”
Section: Delay Time Of Security Barriersmentioning
confidence: 99%
“…Authors create and modify their definition of security according to their subject of study. A multiplicity of definitions and perspectives on security can lead to several misinterpretations and misguidance in setting the required level of security [8]. It is therefore recommended that a quantitative approach is used to assess the security of an object.…”
Section: Introductionmentioning
confidence: 99%