One small step for a man
One Giant leap for the mankind

There is no wealth like Knowledge
                            No Poverty like Ignorance
Journal of Emerging Trends in Computing and Information Sciences Logo

Journal of Emerging Trends in Computing and Information Sciences >> Call for Papers Vol. 8 No. 3, March 2017

Journal of Emerging Trends in Computing and Information Sciences

Defense-in-Depth: Layering Strategy

Full Text Pdf Pdf
Author Faisal Alghamdi
ISSN 2079-8407
On Pages 287-289
Volume No. 7
Issue No. 6
Issue Date July 1, 2016
Publishing Date July 1, 2016
Keywords Defense in depth, layering, strategy


Abstract

Industrial control systems form an important part of software applications which aids in facilitating the various operations in the crucial sectors of the industry. There has been a vast growth in issues with cyber security, which has negative impacts on the industrial control systems. This paper describes the direction and guidance to be used in developing and layering defense in depth strategies for the different organization using the control system networks. The different control networks should maintain a multitier information structure which requires accessing the facilities through the modem or data link. Also, access to the robust business environment requires several connections to the external internet, system domain, and other peer organizations. Across different private and public domains, there are many shared attributes that regard data communication and IT deployments in information infrastructures, for example in the control system domain. Many systems use the robust architectures in enhancing business and reducing costs where they increase the integration of business, control system networks, and the external environment. However, the integration of the multi-network strategies often brings about vulnerabilities thus reducing the organization skills and exposing mission-critical control systems to the cyber threats. Defense in Depth is an effective and efficient way of building an information security plan. It provides a framework for the organizational security needs.
Back

Seperator
    Journal of Computing | Call for Papers (CFP) | Journal Blog | Journal of Systems and Software | ARPN Journal of Science and Technology | International Journal of Health and Medical Sciences | International Journal of Economics, Finance and Management     
Copyrights
© 2015 Journal of Computing