Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Computer Security – The Layered Approach, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Introduction
It was S. Harris that asserted that effective computer security required a layered approach. (S.Harris, 2012). Many people assume that a good firewall will protect the computer system from intrusion. The firewall is however merely one component of a broader strategy that needs to be adopted in order to provide more effective security. This concept is termed ‘layering’ or providing strength in depth. Companies will vary in their systems security approach but the following security layers are common:-
- Establish a security strategy and forming protection policies for the organization
- Provision of host system security
- Computer Security Auditing
- Provision of security over the router, particularly network access
- Firewalls
- Intrusion detection systems
- Incident response planning (Sans, 2012).
A multiple layered security plan will provide a greater deterrent to hackers and others who try to obtain unauthorised access to your system. No single policy or system can adequately provide protection of the organizations system. It is the deployment of a comprehensive security strategy that provides the optimum amount of protection.
PRO’s of Adopting a Layered Approach
Security Managers are responsible for the overarching strategy that provides coverage of these important assets. The duties can be classified into the following sub headings:
- Protection of the Assets : Includes recording of assets, insurance coverage of assets, secure environment of assets, and back-up of assets;
- Disaster Recovery: Disaster Recovery Plan ( emergency plan), Business Continuity Plan, security of secondary site;
- System Security : Access to the systems, Password protection, control of authorized users ( restrictions), security of information ( data vaults, secure back-up site);
- Corporate Security policy: Ensuring that corporate security policy measures are carried out and enforced.
Adopting a layered approach provides a more in depth means of protecting your data and computer assets. Particular items would include: levels of encryption, security and audit policies, password protection, ant-virus solutions, restriction of internet access, access recognition, appropriate firewall architecture. (Pfleeger, C.P. 2003)
CON’s of Adopting a Layered Approach
The most obvious being added layers of security increase costs and can be expensive. The damage of a sustained attack however can prove even more expensive. It also may require additional human resources to support the security team, again increasing costs. This can however be scaled in accordance with the size and needs of the business. More recently the threat of terrorism has been added to the Security Managers busy agenda. This was highlighted during the IRA terrorist campaign conducted on the square mile of London resulting in the blasts at Bishops gate (1993) and St. Mary’s Axe (1992). These caused severe disruption to many City Financial Institutions and resulted in considerable loss of life. Strategy now has to consider how the assets and people might be protected from such an attack. This has been broadened to consider the consequences of natural disasters that include such items as Fire, Flood, and Earthquakes etc.
References
Charles P. Pfleeger, S. L. (2003). Security in Computing. Saddle River NJ: Pearson Education.
S.Harris. (2012). CISSP al in one exam guide 6th ed. New York: McGraw Hill.
Sans. (2012, 1 7). Intrusion Detection FAQ. Retrieved from Sans: http://www.sans.org/security-resources/idfaq/layered_defense.php
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee