Defense In Depth - An Impractical Strategy for a Cyber World

0 avg rating
( 0 ratings by Goodreads )
 
9781469934921: Defense In Depth - An Impractical Strategy for a Cyber World

This peer reviewed work addresses how Businesses and Information Technology Security Professionals have spent a tremendous amount of time, money and resources to deploy a Defense in Depth approach to Information Technology Security. Yet successful attacks against RSA, HB Gary, Booz, Allen & Hamilton, the United States Military, and many others are examples of how Defense in Depth, as practiced, is unsustainable and the examples show that the enemy cannot be eliminated permanently. A closer look at how Defense in Depth evolved and how it was made to fit within Information Technology is important to help better understand the trends seen today. Knowing that Defense in Depth, as practiced, actually renders the organization more vulnerable is vital to understanding that there must be a shift in attitudes and thinking to better address the risks faced in a more effective manner. Based on examples in this paper, a change is proposed in the current security and risk management models from the Defense in Depth model to Sustained Cyber-Siege Defense. The implications for this are significant in that there have to be transitions in thinking as well as how People, Process and Technology are implemented to better defend against a never ending siege by a limitless number and variety of attackers that cannot be eliminated. The suggestions proposed are not a drastic change in operations as much as how defenses area aligned, achieve vendor collaboration by applying market pressures and openly sharing information with each other as well as with federal and state agencies. By more accurately describing the problems, corporations and IT Security Professionals will be better equipped to address the challenges faced together.

"synopsis" may belong to another edition of this title.

Review:

Selected as a topic and speaker for The Hackers Conference 2013 in New Dehli.

"About this title" may belong to another edition of this title.

Buy New View Book
List Price: US$ 5.88
US$ 7.35

Convert Currency

Shipping: FREE
From United Kingdom to U.S.A.

Destination, Rates & Speeds

Add to Basket

Top Search Results from the AbeBooks Marketplace

1.

Prescott E Small
Published by Createspace, United States (2011)
ISBN 10: 1469934922 ISBN 13: 9781469934921
New Paperback Quantity Available: 10
Print on Demand
Seller:
The Book Depository
(London, United Kingdom)
Rating
[?]

Book Description Createspace, United States, 2011. Paperback. Book Condition: New. Language: English . Brand New Book ***** Print on Demand *****.This peer reviewed work addresses how Businesses and Information Technology Security Professionals have spent a tremendous amount of time, money and resources to deploy a Defense in Depth approach to Information Technology Security. Yet successful attacks against RSA, HB Gary, Booz, Allen Hamilton, the United States Military, and many others are examples of how Defense in Depth, as practiced, is unsustainable and the examples show that the enemy cannot be eliminated permanently. A closer look at how Defense in Depth evolved and how it was made to fit within Information Technology is important to help better understand the trends seen today. Knowing that Defense in Depth, as practiced, actually renders the organization more vulnerable is vital to understanding that there must be a shift in attitudes and thinking to better address the risks faced in a more effective manner. Based on examples in this paper, a change is proposed in the current security and risk management models from the Defense in Depth model to Sustained Cyber-Siege Defense. The implications for this are significant in that there have to be transitions in thinking as well as how People, Process and Technology are implemented to better defend against a never ending siege by a limitless number and variety of attackers that cannot be eliminated. The suggestions proposed are not a drastic change in operations as much as how defenses area aligned, achieve vendor collaboration by applying market pressures and openly sharing information with each other as well as with federal and state agencies. By more accurately describing the problems, corporations and IT Security Professionals will be better equipped to address the challenges faced together. Bookseller Inventory # APC9781469934921

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 7.35
Convert Currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, Rates & Speeds

2.

Prescott E Small
Published by Createspace, United States (2011)
ISBN 10: 1469934922 ISBN 13: 9781469934921
New Paperback Quantity Available: 10
Print on Demand
Seller:
The Book Depository US
(London, United Kingdom)
Rating
[?]

Book Description Createspace, United States, 2011. Paperback. Book Condition: New. Language: English . Brand New Book ***** Print on Demand *****. This peer reviewed work addresses how Businesses and Information Technology Security Professionals have spent a tremendous amount of time, money and resources to deploy a Defense in Depth approach to Information Technology Security. Yet successful attacks against RSA, HB Gary, Booz, Allen Hamilton, the United States Military, and many others are examples of how Defense in Depth, as practiced, is unsustainable and the examples show that the enemy cannot be eliminated permanently. A closer look at how Defense in Depth evolved and how it was made to fit within Information Technology is important to help better understand the trends seen today. Knowing that Defense in Depth, as practiced, actually renders the organization more vulnerable is vital to understanding that there must be a shift in attitudes and thinking to better address the risks faced in a more effective manner. Based on examples in this paper, a change is proposed in the current security and risk management models from the Defense in Depth model to Sustained Cyber-Siege Defense. The implications for this are significant in that there have to be transitions in thinking as well as how People, Process and Technology are implemented to better defend against a never ending siege by a limitless number and variety of attackers that cannot be eliminated. The suggestions proposed are not a drastic change in operations as much as how defenses area aligned, achieve vendor collaboration by applying market pressures and openly sharing information with each other as well as with federal and state agencies. By more accurately describing the problems, corporations and IT Security Professionals will be better equipped to address the challenges faced together. Bookseller Inventory # APC9781469934921

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 7.47
Convert Currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, Rates & Speeds

3.

Small, Prescott E.
ISBN 10: 1469934922 ISBN 13: 9781469934921
New Quantity Available: > 20
Print on Demand
Seller:
Pbshop
(Wood Dale, IL, U.S.A.)
Rating
[?]

Book Description 2011. PAP. Book Condition: New. New Book. Shipped from US within 10 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bookseller Inventory # IQ-9781469934921

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 3.49
Convert Currency

Add to Basket

Shipping: US$ 3.99
Within U.S.A.
Destination, Rates & Speeds

4.

Prescott Small
ISBN 10: 1469934922 ISBN 13: 9781469934921
New Paperback Quantity Available: > 20
Seller:
BuySomeBooks
(Las Vegas, NV, U.S.A.)
Rating
[?]

Book Description Paperback. Book Condition: New. 34 pages. This peer reviewed work addresses how Businesses and Information Technology Security Professionals have spent a tremendous amount of time, money and resources to deploy a Defense in Depth approach to Information Technology Security. Yet successful attacks against RSA, HB Gary, Booz, Allen and Hamilton, the United States Military, and many others are examples of how Defense in Depth, as practiced, is unsustainable and the examples show that the enemy cannot be eliminated permanently. A closer look at how Defense in Depth evolved and how it was made to fit within Information Technology is important to help better understand the trends seen today. Knowing that Defense in Depth, as practiced, actually renders the organization more vulnerable is vital to understanding that there must be a shift in attitudes and thinking to better address the risks faced in a more effective manner. Based on examples in this paper, a change is proposed in the current security and risk management models from the Defense in Depth model to Sustained Cyber-Siege Defense. The implications for this are significant in that there have to be transitions in thinking as well as how People, Process and Technology are implemented to better defend against a never ending siege by a limitless number and variety of attackers that cannot be eliminated. The suggestions proposed are not a drastic change in operations as much as how defenses area aligned, achieve vendor collaboration by applying market pressures and openly sharing information with each other as well as with federal and state agencies. By more accurately describing the problems, corporations and IT Security Professionals will be better equipped to address the challenges faced together. This item ships from multiple locations. Your book may arrive from Roseburg,OR, La Vergne,TN. Paperback. Bookseller Inventory # 9781469934921

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 10.56
Convert Currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, Rates & Speeds

5.

Small, Prescott E
Published by CreateSpace Independent Publishing Platform (2011)
ISBN 10: 1469934922 ISBN 13: 9781469934921
New Paperback Quantity Available: 10
Seller:
Ergodebooks
(RICHMOND, TX, U.S.A.)
Rating
[?]

Book Description CreateSpace Independent Publishing Platform, 2011. Paperback. Book Condition: New. Bookseller Inventory # INGM9781469934921

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 7.48
Convert Currency

Add to Basket

Shipping: US$ 4.99
Within U.S.A.
Destination, Rates & Speeds

6.

Small, Prescott E
Published by CreateSpace Independent Publishing Platform
ISBN 10: 1469934922 ISBN 13: 9781469934921
New PAPERBACK Quantity Available: > 20
Seller:
Russell Books
(Victoria, BC, Canada)
Rating
[?]

Book Description CreateSpace Independent Publishing Platform. PAPERBACK. Book Condition: New. 1469934922 Special order direct from the distributor. Bookseller Inventory # ING9781469934921

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 6.62
Convert Currency

Add to Basket

Shipping: US$ 7.00
From Canada to U.S.A.
Destination, Rates & Speeds

7.

Prescott E Small
Published by CreateSpace Independent Publishing Platform (2011)
ISBN 10: 1469934922 ISBN 13: 9781469934921
New Paperback Quantity Available: 1
Seller:
Ergodebooks
(RICHMOND, TX, U.S.A.)
Rating
[?]

Book Description CreateSpace Independent Publishing Platform, 2011. Paperback. Book Condition: New. Bookseller Inventory # DADAX1469934922

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 9.22
Convert Currency

Add to Basket

Shipping: US$ 4.99
Within U.S.A.
Destination, Rates & Speeds

8.

Small, Prescott E.
ISBN 10: 1469934922 ISBN 13: 9781469934921
New Quantity Available: > 20
Print on Demand
Seller:
Books2Anywhere
(Fairford, GLOS, United Kingdom)
Rating
[?]

Book Description 2011. PAP. Book Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Bookseller Inventory # IQ-9781469934921

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 3.50
Convert Currency

Add to Basket

Shipping: US$ 12.07
From United Kingdom to U.S.A.
Destination, Rates & Speeds