menu
{ "item_title" : "How to Defend Cyberspace? Future of Defense in Depth in an Offensive Minded World", "item_author" : [" Joseph L. Veit "], "item_description" : "Because of the perceived lack of capability to prevent attacks, some experts have called the current Defense in Depth strategy the new Maginot Line. There is a growing call advocating an offensive minded strategy for the overall cyber defense. However, even with an offensive minded strategy there are still vital areas that need basic protection. The Defense in Depth strategy and its core elements: People, Technology and Operations; must be re-evaluated to stay viable. In terms of People, user access and education and training programs must be continually evaluated to prevent misuse and mistakes from causing security breaches. In the technology area a host based approach that emphasizes technology such as virtualization is a critical change. As the network continues to evolve the IPv6 migration must be capitalized on and risk must be minimized during transition. Operationally we need to continue to seek standardization throughout the DOD under the NetOps construct. Many efforts have failed simply due to poor practice of securing the seams.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/1/28/833/498/1288334982_b.jpg", "price_data" : { "retail_price" : "13.95", "online_price" : "13.95", "our_price" : "13.95", "club_price" : "13.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
How to Defend Cyberspace? Future of Defense in Depth in an Offensive Minded World|Joseph L. Veit

How to Defend Cyberspace? Future of Defense in Depth in an Offensive Minded World

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Because of the perceived lack of capability to prevent attacks, some experts have called the current Defense in Depth strategy the new Maginot Line. There is a growing call advocating an offensive minded strategy for the overall cyber defense. However, even with an offensive minded strategy there are still vital areas that need basic protection. The Defense in Depth strategy and its core elements: People, Technology and Operations; must be re-evaluated to stay viable. In terms of People, user access and education and training programs must be continually evaluated to prevent misuse and mistakes from causing security breaches. In the technology area a host based approach that emphasizes technology such as virtualization is a critical change. As the network continues to evolve the IPv6 migration must be capitalized on and risk must be minimized during transition. Operationally we need to continue to seek standardization throughout the DOD under the NetOps construct. Many efforts have failed simply due to poor practice of securing the seams.

This item is Non-Returnable

Details

  • ISBN-13: 9781288334988
  • ISBN-10: 1288334982
  • Publisher: Biblioscholar
  • Publish Date: November 2012
  • Dimensions: 9.21 x 6.14 x 0.07 inches
  • Shipping Weight: 0.14 pounds
  • Page Count: 36

Related Categories

You May Also Like...

    1

BAM Customer Reviews