Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Defense-in-Depth

Handbook of Research on Social and Organizational Liabilities in Information Security
Defense-in-depth is a layered security approach in which people, process, and technology are utilized to protect an organization’s assets.
Published in Chapter:
Creating a Security Education, Training, and Awareness Program
Nick Pullman (Citigroup, USA) and Kevin Streff (Dakota State University, USA)
DOI: 10.4018/978-1-60566-132-2.ch020
Abstract
Security training and awareness is often overlooked or not given sufficient focus in many organizations despite being a critical component of a layered defense. Organizations often purchase expensive hardware and software to help secure their organization, but fail to allocate resources to train employees who will install and configure the product. Similarly, organizations will devote many hours developing polices and procedures to protect sensitive information, but fail to allocate the appropriate resources to ensure awareness of those policies and procedures. This chapter discusses how to design, create, and implement a formal security education, training, and awareness (SETA) program as a component of a layered defense strategy.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Methodology for Cyber Security Risk Mitigation in Next Generation SCADA Systems
Strategy of using multiple security measures in several layers to protect the information system.
Full Text Chapter Download: US $37.50 Add to Cart
The Age of Ransomware: Understanding Ransomware and Its Countermeasures.
A layered approach to tackling security issues using different layers of defense.
Full Text Chapter Download: US $37.50 Add to Cart
A Socio-Technical Perspective
The process of architecting computer systems by laying various different types of controls from the outer-boundary to the core.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR