Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Defense in-Depth

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
The security approach whereby each system on the network is secured to the greatest possible degree. May be used in conjunction with firewalls. Using multiple systems to resist attackers. For example, if an external firewall is breached, an internal intrusion detection system can sound an alarm. If systems are breached and data can be stolen, keeping all vital records encrypted on disk and encrypted during transmission prevents attackers from using it even if they get it.
Published in Chapter:
Defending Information Networks in Cyberspace: Some Notes on Security Needs
Alberto Carneiro (Universidade Europeia, Portugal & Universidade Autónoma de Lisboa, Portugal)
DOI: 10.4018/978-1-4666-6324-4.ch020
Abstract
This chapter addresses some concerns and highlights some of the major problems affecting cyberspace. This chapter focuses on defensive attitudes and concerns pertaining to the cybersecurity issues. Section 1, “Facing Cyberspace Security,” opens the area of threats and the need of defensive attitudes. Section 2, “Remembering Internet Issues,” deals with known Internet problems in what concerns cybersecurity as a generic term. In –Section 3, “Defensive Cybersecurity,” the focus is on the need to add more defensive features to security policies. Section 4, “In Search of Better Solutions,” emphasizes the need to invest continuously in scientific research and the creation of more sophisticated processes in order to prevent new forms of attack and mitigate negative results.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR