Write a research paper outlining the defense in depth model’s five tiers.Show your understanding of Defense-in-Depth by writing a 3 page APA formatted paper to a non-technical individual or audience. This paper will illustrate the use of a layered defense (implementation of controls) that help to protect organizational data from physical intrusion, environmental disruption or unintended or intentional user access that causes data loss.
Next, we will do the following: 1.) list your layers of defense starting from the physical set of controls to the most technical controls, almost like a target, where physical is the most outer ring and what you are trying to protect is on the most inner ring. 2.) Gather at least 20-30 different controls by control type that you feel will do the best at creating a layered defense. The best way to think of a layered defense is to think of a castle — a moat, drawbridge, castle walls, soldiers at strategic places… Control types can be thought of as detective, preventive, administrative, technical or more. Once you create your list of 20-30 controls list them in priority order from most protective to least protective 3.) Let’s test the strength of your suggested controls by taking the stand of an ill intended user and how they can get around each control. Finally.) Determine how strong your suggested controls are in keeping an attacker from going from the outer ring of your defense to the inner ring. Classify your list of controls and layered defense as one of the following: Very strong – attacker can’t advance very far; Strong – attacker advanced some, but controls kept system safe. Weak – attacker advanced to the inner layers, with resistance, but system is exposed. Needs help – Controls are listed but they don’t have an integrated impact – attacker had little opposition.