You are on page 1of 4

1

Layered Approach to Security

Student name:

Institution Affiliation:

Submission Due Date:


2

Layered Security Approach

Layered security approach is related to defense-in-depth that is crucial to protect data at

all levels and across multiple devices. Several strategies can be used to block and delay a threat

by neutralizing it. In this paper, we are going to discuss the layered security approach and how it

provides security to a network.

The layered approach uses several components to protect your operations with a number

of security measure levels. Each component has a backup to counter flaws in security defenses.

Each layer focuses on a specific area where malware could attack. They work collectively to

protect a network from security breaching thereby improving network safety by stopping

intruders (Oehme, 2010). Unlike a single security solution it is safe to use a layered approach.

Industrial Control Systems(ICS) entails provision of heating, electricity, fuel and people

transportation and lastly, water drinking. It plays a crucial role in the normal daily routine of a

society. It involves using multi-layered security systems that show how important the system is.

It is segmented with overlapping structures and non-secures services placed in demilitarized

zones (Ahemd, 2017). This demonstrates the layered approach that provides extra protection.

You need more than one single security solutions or program to protect a given network.

By use of a layered network, additional protection is provided. Several layers work together to

protect and prevent intruders from interfering with the network security by each layer focusing

on specific part that a virus could attack (Aydos, 2019). An example of it is the use of different

communication protocol between different parts of the network.

The perimeter and intrusion defense systems implement the use of firewalls, end-user

protection, email encryption and filtering, web filtering, data encryption, mobile security and
3

mobile device management to create a layered approach system (Kim, 2020). This prevents an

organizations network from external attacks.

In conclusion, a layered approach prevents injections into the network that might cause

leaking of confidential data. This is strengthened more by use of VPNs.


4

References

Ahemd, M. M., Shah, M. A., & Wahid, A. (2017, April). IoT security: A layered approach for

attacks & defenses. In 2017 international conference on Communication Technologies

(ComTech) (pp. 104-110). IEEE.

Aydos, M., Vural, Y., & Tekerek, A. (2019). Assessing risks and threats with layered approach

to Internet of Things security. Measurement and Control, 52(5-6), 338-353.

Kim, B. J., & Lee, S. W. (2020). Understanding and recommending security requirements from

problem domain ontology: A cognitive three-layered approach. Journal of Systems and

Software, 169, 110695.

Kim, B. J., & Lee, S. W. (2016, December). Analytical study of cognitive layered approach for

understanding security requirements using problem domain ontology. In 2016 23rd Asia-

Pacific Software Engineering Conference (APSEC) (pp. 97-104). IEEE.

Nema, A., Tiwari, B., & Tiwari, V. (2016, March). Improving accuracy for intrusion detection

through layered approach using support vector machine with feature reduction.

In Proceedings of the ACM Symposium on Women in Research 2016 (pp. 26-31).

You might also like