Strategy for Security
Question 1
Multilayered defense
A multilayered defense mechanism is a network security strategy, which uses different elements to secure the operations of the user within an organization (AKram et al., 2019). Through this platform of a managed service provider, clients enjoy the best services; thus, the organization has a competitive advantage. This strategy of offering the organization a multilayered security solution to clients should attain its objectives and goals. Multilayered Protection Strategy includes detection, identification, and intervention has various issues. The approach aims to address the cybersecurity problems, which is a concern for many companies across the globe today.
Advantages of Multilayered defense
A layered security strategy is a response to today’s cyber threat landscape. Rather than merely waiting for attacks to hit endpoints, layered security takes a holistic view of cyber defense, accounting for a multitude of vectors that deliver modern malware, and recognizing the importance of network and end-user security.
- It reduces the risk of cyber-attacks.
Each layer of protection is more complicated than the previous, reduces the ability of the hacker to maneuver as they work their way through the level of defense mechanisms.
- Improving Cyber Security’s Effectiveness
It reduces false positives that prevent your company from maintaining interaction with legitimate contacts while at the same time helping you to improve your visibility.
- Multilayered defense offers the right defense at the right time.
Threats are detected in real-time, eliminating any threat posed to the system. Besides, it blocks any trial by unauthenticated access to the system.
- It also guards against ascendant malware, attacks from an email attachment and DNS-level security to defend against threats from the network level.
Disadvantages of Multilayered defense
Multilayered security has unintended shortcomings and makes an organization less secure (Kolarov, 2020).
- Complexity
Different security system requires diverse expertise and the larger the organization, the more the likelihood of conflict. With each security system focusing on its task, this can cause interferences with other groups of organization operations
- User pushbacks
The user of the security systems might fight back the scheme. For example, if an organization decides to use different credential for each security system. Users might defeat the system by using the same credential on every system.
- Integration
These multilayers security systems do not have the same data taxonomy. Trying to correlate these datasets create some gaps. It also takes more time to respond to false negatives and false positives.
Question 2
Advantages of using Kerberos
- Faster authentication.
The Kerberos protocol has a unique facilitating system that provides faster authentication.
- Mutual authentication.
The client authenticates the service that is responsible for the resource and that service
- Unlike many alternative authentication mechanisms, Kerberos is based entirely on open Internet standards.
- User passwords are never sent across the network, encrypted or in plain text. Secret keys are only passed through the system in an encrypted form.
- Authentication is reusable and durable. Users need to authenticate to Kerberos only once.
- As a side-effect of the dual-key encryption scheme used in the Kerberos model, a service-session key is generated which constitutes a shared secret between a particular client system and a specific service.
Disadvantages of using Kerberos
- The Kerberos authentication model is vulnerable to brute-attacks against the KDC.
Entire authentication is dependent on the trustworthiness of the KDC.
- Since Kerberos uses a mutual authentication model, it is necessary for both client machines and service providers to be designed with Kerberos authentication in mind.
- Kerberos was designed for use with single-user client systems.
- In Kerberos IV, all encryption is done using the DES algorithm. While DES was considered “unbreakable.”
References
Korolov, M. (2020). The dark side of layered security. Retrieved 29 April 2020, from https://www.csoonline.com/article/3004856/the-dark-side-of-layered-security.html
Akram, K., Banu, G., Basthikodi, M., & Faizabadi, A. R. (2019). Defense Mechanism Using Multilayered Approach and SQL Injection Methods for Web-Based Attacks.