ipl-logo

Defense In Depth Strategy Paper

1427 Words6 Pages

In order to ensure that the Western Interconnection power grid computer network is properly secured, there needs to be strong defense-in-depth strategies in place. Although they may be strong defense-in-depth strategies, vulnerabilities may be present and used as an advantage point for hackers to gain access to the network. Defense-in-depth strategies will help create risk management to assess certain risks that may be proven as detrimental to a network. It will also add extra layers of protection to a network to fully ensure that the protected information remains protected. This process will make it harder for a hacker to gain full access to the network.
The main idea behind defense in depth is to manage risk with diverse defensive strategies, …show more content…

This outline is called defense-in-depth strategies. The main thesis of defense-in-depth is the layering of security controls within a computing environment to help slow down an attacker’s progress if access is gained and the network is dismantled or corrupted (K. Teitler, 2016). Defense-in-depth strategies will help expose any cyber threat or attacker if they should gain access to a secure network. The defense-in-depth strategy was created by the NSA and is very practical when it comes to finding information. The steps and processes that are taken for each system is to draw out any vulnerability that may be present. Each step has a different job that delivers different results than the rest. The NSA Information Assurance based defense-in-depth strategy is special training in different fields to identify vulnerabilities and the steps that need to be taken to strengthen network security (S. Lyngaas, 2016). The power grid needs to be monitored consistently because it has been found to be weak and susceptible to vulnerability when it comes to the term of digital security and the ever changing technology. The power grid is extremely weak in the terms of digital security. It needs to be strengthened in order to protect it. If the power grid is weak in digital security, then the chances of an attacker unleashing a digital attack and shutting down the power grid is inevitable. It has been an …show more content…

These layers must be done through a process called cryptography, which is the encryption of data and documents within the system. In order to add these layers to the defense network we need to use the cryptographic system. Cryptography is a science that applies complex mathematics and logic to design strong encryption methods. In order to achieve strong encryption, you have to hide the data’s meaning, which also requires intuitive leaps that allow creative application of known or new methods (G. Security Hacking, 2012). By adding these mathematical layers to a network, it creates a complicated yet sophisticated way of operating the network. A robot or hacker can’t do a task that a human can. That is why we have the CAPTCHA process we have to do when we are logging onto a secure server such as a bank account online. This is a simple yet effective way to prove a real identity instead of a cyber one. When adding layers to the defense network, there needs to be a series of encrypted files that provide extra security in the network. This will work wherever there has been a vulnerability discovered. However, not only do you add extra firewalls, you also add encrypted codes to formulate a defense strategy. In network applications, encryption can be applied in two different ways, between two hosts, link encryption or between two applications, end-to-end encryption. With either form

Open Document