The Defense In Depth model represents holistic protection across an enterprise by identifying needed security controls and components at each conceptual layer of the enterprise.
This is a modified Defense In Depth model because it contains a specific Threat Layer for essential threat operations and analysis.
The security controls listed at each layer are only samples of the types that may be needed
The Cyber Kill Chain is recognized as an effective tool to understand the phases or steps a hacker uses to infiltrate a business.
While the phases are typically associated with malware types of attacks, the general phases and attack methodologies depicted in the Cyber Kill Chain are reflective of many cyber attacks.
By understanding the attack phases pursued by a hacker, business can begin to antici
By mapping the alignment between the phases of the Cyber Kill Chain to the layers of Defense In Depth model, we can see where logically and physically security controls are needed to block a hacker's phased actions and thwart the entire attack.
Livermore Cybersecurity
Copyright © 2024 Livermore Cybersecurity - All Rights Reserved.
Powered by GoDaddy
Do you understand the benefits and risks of Artificial Intelligence? Contact us and we can help you understand how to utilize AI and safely and securely.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.