Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth

  • Cleghorn L
N/ACitations
Citations of this article
52Readers
Mendeley users who have this article in their library.

Abstract

The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security; this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored; this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations.

Cite

CITATION STYLE

APA

Cleghorn, L. (2013). Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth. Journal of Information Security, 04(03), 144–149. https://doi.org/10.4236/jis.2013.43017

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free