Professional Documents
Culture Documents
Student name:
Institution Affiliation:
all levels and across multiple devices. Several strategies can be used to block and delay a threat
by neutralizing it. In this paper, we are going to discuss the layered security approach and how it
The layered approach uses several components to protect your operations with a number
of security measure levels. Each component has a backup to counter flaws in security defenses.
Each layer focuses on a specific area where malware could attack. They work collectively to
protect a network from security breaching thereby improving network safety by stopping
intruders (Oehme, 2010). Unlike a single security solution it is safe to use a layered approach.
Industrial Control Systems(ICS) entails provision of heating, electricity, fuel and people
transportation and lastly, water drinking. It plays a crucial role in the normal daily routine of a
society. It involves using multi-layered security systems that show how important the system is.
zones (Ahemd, 2017). This demonstrates the layered approach that provides extra protection.
You need more than one single security solutions or program to protect a given network.
By use of a layered network, additional protection is provided. Several layers work together to
protect and prevent intruders from interfering with the network security by each layer focusing
on specific part that a virus could attack (Aydos, 2019). An example of it is the use of different
The perimeter and intrusion defense systems implement the use of firewalls, end-user
protection, email encryption and filtering, web filtering, data encryption, mobile security and
3
mobile device management to create a layered approach system (Kim, 2020). This prevents an
In conclusion, a layered approach prevents injections into the network that might cause
References
Ahemd, M. M., Shah, M. A., & Wahid, A. (2017, April). IoT security: A layered approach for
Aydos, M., Vural, Y., & Tekerek, A. (2019). Assessing risks and threats with layered approach
Kim, B. J., & Lee, S. W. (2020). Understanding and recommending security requirements from
Software, 169, 110695.
Kim, B. J., & Lee, S. W. (2016, December). Analytical study of cognitive layered approach for
understanding security requirements using problem domain ontology. In 2016 23rd Asia-
Nema, A., Tiwari, B., & Tiwari, V. (2016, March). Improving accuracy for intrusion detection
through layered approach using support vector machine with feature reduction.