This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Strategy

Strategy for Security

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Strategy for Security

Question 1

Multilayered defense

A multilayered defense mechanism is a network security strategy, which uses different elements to secure the operations of the user within an organization (AKram et al., 2019). Through this platform of a managed service provider, clients enjoy the best services; thus, the organization has a competitive advantage. This strategy of offering the organization a multilayered security solution to clients should attain its objectives and goals. Multilayered Protection Strategy includes detection, identification, and intervention has various issues. The approach aims to address the cybersecurity problems, which is a concern for many companies across the globe today.

Advantages of Multilayered defense

A layered security strategy is a response to today’s cyber threat landscape. Rather than merely waiting for attacks to hit endpoints, layered security takes a holistic view of cyber defense, accounting for a multitude of vectors that deliver modern malware, and recognizing the importance of network and end-user security.

  1. It reduces the risk of cyber-attacks.

Each layer of protection is more complicated than the previous, reduces the ability of the hacker to maneuver as they work their way through the level of defense mechanisms.

  1. Improving Cyber Security’s Effectiveness

It reduces false positives that prevent your company from maintaining interaction with legitimate contacts while at the same time helping you to improve your visibility.

  • Multilayered defense offers the right defense at the right time.

Threats are detected in real-time, eliminating any threat posed to the system. Besides, it blocks any trial by unauthenticated access to the system.

  1. It also guards against ascendant malware, attacks from an email attachment and DNS-level security to defend against threats from the network level.

Disadvantages of Multilayered defense

Multilayered security has unintended shortcomings and makes an organization less secure (Kolarov, 2020).

  1. Complexity

Different security system requires diverse expertise and the larger the organization, the more the likelihood of conflict. With each security system focusing on its task, this can cause interferences with other groups of organization operations

  1. User pushbacks

The user of the security systems might fight back the scheme. For example, if an organization decides to use different credential for each security system. Users might defeat the system by using the same credential on every system.

 

  • Integration

These multilayers security systems do not have the same data taxonomy. Trying to correlate these datasets create some gaps. It also takes more time to respond to false negatives and false positives.

Question 2

Advantages of using Kerberos

  1. Faster authentication.

The Kerberos protocol has a unique facilitating system that provides faster authentication.

  1. Mutual authentication.

The client authenticates the service that is responsible for the resource and that service

  • Unlike many alternative authentication mechanisms, Kerberos is based entirely on open Internet standards.
  1. User passwords are never sent across the network, encrypted or in plain text. Secret keys are only passed through the system in an encrypted form.
  2. Authentication is reusable and durable. Users need to authenticate to Kerberos only once.
  3. As a side-effect of the dual-key encryption scheme used in the Kerberos model, a service-session key is generated which constitutes a shared secret between a particular client system and a specific service.

Disadvantages of using Kerberos

  1. The Kerberos authentication model is vulnerable to brute-attacks against the KDC.

Entire authentication is dependent on the trustworthiness of the KDC.

  1. Since Kerberos uses a mutual authentication model, it is necessary for both client machines and service providers to be designed with Kerberos authentication in mind.
  • Kerberos was designed for use with single-user client systems.
  1. In Kerberos IV, all encryption is done using the DES algorithm. While DES was considered “unbreakable.”

 

 

References

Korolov, M. (2020). The dark side of layered security. Retrieved 29 April 2020, from https://www.csoonline.com/article/3004856/the-dark-side-of-layered-security.html

Akram, K., Banu, G., Basthikodi, M., & Faizabadi, A. R. (2019). Defense Mechanism Using Multilayered Approach and SQL Injection Methods for Web-Based Attacks.

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask