6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 1/5
%46
%5
SafeAssign Originality Report
Summer 2020 - Emerging Threats & Countermeas (IT… • Final research paper/project/assignment
%51Total Score: High risk
Vikeshkumar Dipakkumar Desai
Submission UUID: e2f632c2-fdcf-616b-51d7-5a4eb8187331
Total Number of Reports
1
Highest Match
51 %
Document8.docx
Average Match
51 %
Submitted on
06/21/20
03:48 PM PDT
Average Word Count
1,276
Highest: Document8.docx
%51Attachment 1
Institutional database (5)
Student paper Student paper Student paper
Student paper Student paper
Internet (3)
lplanet hack-ed wikipedia
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,276
Document8.docx
1 3 4
2 5
7 6 8
1 Student paper 3 Student paper 4 Student paper
Running head: DEFENSE-IN-DEPTH AND AWARENESS TECHNIQUES
1
Running head: DEFENSE-IN-DEPTH AND AWARENESS TECHNIQUES
4
Defense-in-Depth and Awareness Techniques
Vikesh Desai
University of Cumberlands
Defense-in-Depth and Awareness Techniques
Awareness is one of the essential aspects in most of the organization, which requires a high magnitude to address comprehensively in all sections.
The depth in defense is more paramount to ensure that the organizations are comprehensively and effectively protect their system from the cyber-
attack activities. The most crucial strategy to deploy is two strategic systems that enhance the high degree of security instead of implementing one
security system. Various organizations have taken into account the defense in depth very crucial. Still, the organizations demanded to incorporate
their awareness through the provision of comprehensive educations to the employees and the workers in the organizations concerning the vital
measures that should be taken into account to curb security issues and develop holistic values taken into account. Most of the organizations are
known not to take the awareness as pressing issues that demand high consideration for the process of protecting and enhancing the security to be
tight. For any organization to protect their system from the cybercrime attack, they need to embrace situational awareness so that they can compre-
hensively develop strategic interventions that enable them to improve and assist in the detection of the up and coming threats as well as the
1
1
1
1
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=6d3212a4-b0a4-44b2-afd8-56ae47ca2c6b&course_id=_116194_1&download=true&includeDeleted=true&print=true&force=true
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 2/5
Source Matches (23)
strengthens that countermeasures the cybercrime activities. To me.
2. 06/21/20
03:48 PM PDT
Average Word Count
1,276
Highest: Document8.docx
%51Attachment 1
Institutional database (5)
Student paper Student paper Student paper
Student paper Student paper
Internet (3)
lplanet hack-ed wikipedia
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,276
Document8.docx
1 3 4
2 5
7 6 8
1 Student paper 3 Student paper 4 Student paper
3. Running head: DEFENSE-IN-DEPTH AND AWARENESS
TECHNIQUES
1
Running head: DEFENSE-IN-DEPTH AND AWARENESS
TECHNIQUES
4
Defense-in-Depth and Awareness Techniques
Vikesh Desai
University of Cumberlands
Defense-in-Depth and Awareness Techniques
Awareness is one of the essential aspects in most of the
organization, which requires a high magnitude to address
comprehensively in all sections.
The depth in defense is more paramount to ensure that the
organizations are comprehensively and effectively protect their
system from the cyber-
attack activities. The most crucial strategy to deploy is two
strategic systems that enhance the high degree of security
instead of implementing one
security system. Various organizations have taken into account
the defense in depth very crucial. Still, the organizations
demanded to incorporate
their awareness through the provision of comprehensive
educations to the employees and the workers in the
organizations concerning the vital
measures that should be taken into account to curb security
issues and develop holistic values taken into account. Most of
4. the organizations are
known not to take the awareness as pressing issues that demand
high consideration for the process of protecting and enhancing
the security to be
tight. For any organization to protect their system from the
cybercrime attack, they need to embrace situational awareness
so that they can compre-
hensively develop strategic interventions that enable them to
improve and assist in the detection of the up and coming threats
as well as the
1
1
1
1
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport?attemptId=6d3212a4-
b0a4-44b2-afd8-
56ae47ca2c6b&course_id=_116194_1&download=true&include
Deleted=true&print=true&force=true
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-
b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 2/5
Source Matches (23)
strengthens that countermeasures the cybercrime activities. To
mention is that the defense in depth is a very strategic
5. intervention that illustrates a
more vital mechanism used to secure the information data. It is
essential to acknowledge that the defensive tool works in such a
manner that if one
fails, then another would pick up to cover the situation of the
other with very immediate effect. The strategy is critical since
it is advance the com-
prehensive security of the degree of the system layout and
efficiently resolves the cybersecurity attack in the event (Luo,
2016)[endnoteRef:3267]. It
is essential to accept that the digital world has to surpass us
with various positive effects in our daily lives. With that whole
idea, it simplifies the way
that we conduct our business, stay, tend to socialize with each
other, and more so the aspect of human life. [3267: Luo, X.
(2016). Security pro-
tection to an industrial control system based on Defense-in-
Depth strategy. WIT Transactions on Engineering Sciences,
113, 19-27.]
On the other hand, modern digitalization still poses acute multi-
person attacks. It is, therefore, essential to ensure that it
provides a very compre-
hensive high level of protection through the intervention of the
high level of strategies intended to completely address the risks
that can occur in
the organizations as well. Furthermore, the defense in depth
comes at this particular moment. Sensitively, the argument in-
depth advanced
through the combination of the different security measures,
which includes in the malware scanners, data encryptions as
well as the firewall to fill
up the loopholes that come as a result when using single
security as one the solution. The use of the defense in depth is
one of the essential as-
pects that can use in all element juts from the ITC individual
6. who uses the laptops in the inns on the extensive internet of the
thousands of users.
Through the research studies, the companies can never be
secured through the single security solution because whenever
the problem is solved,
there is so much probability of many risks to occur, which can
hardly manage. The organizations need to develop many
security features that seek
to address the persistent security issues as well as the risks.
This aspect entails the integrity of data analysis, network
security controls, as well
as the behavior analysis antivirus software. The network
security controls must involve analyzing the traffic of the
network. The more important as-
pect to note is that the firewall in any way does not permit
unauthorized the system to access to a particular network as
well as grant or deter the
access according to the reputable security standards. It implies
that the antivirus software is essential for the virus as well as
malware protec-
tion. The very vital of the antivirus software entails the role to
ensure that they analyze and evaluate the suspicious activities
and allow the compre-
hensive security of the existing network. With this, it implies
that each file on the system poses a checksum. The checksum is
the mathe-
matical representation of a particular file, displaying how
frequently it used, and the source and as well detect the viruses
and the malicious codes
inserted (Lee, 2016)[endnoteRef:27908]. The solution of data
security is very vital and useful for the determination of the IP
source address to make
sure they are comprehensively supported and trusted sources.
However, the behavioral analysis can only be activated if no
security and mea-
sure adopted, such as when the firewall fails, for that reason, its
7. performance more direct control that shall eliminate the
violation procedures.
2
1
1
1
3
1 3
1
[27908: Lee, J., Bagheri, B., & Jin, C. (2016). Introduction to
cyber manufacturing. Manufacturing Letters, 8, 11-15.]
Still, the defense-in-depth strategy does not count whenever the
awareness has not been incorporating as a strategy to determine
the emerging is-
sues and strengthen the countermeasures. The many people in
the world see the internet as a secure platform for socializing,
the research, and this
occurs with them not knowing that the internet has got a variety
of daily attacks (Bada, 2014)[endnoteRef:24559]. the
cyberattack, as well as the se-
curity breaches, are ever-increasing challenges in many
companies or organizations, and they pose severe adverse
penalties. Minimizing such risks
entails comprehensive rules and regulation within the
organizations or the companies to effectively enhance the
security culture through the educa-
tion of the workers concerning the essential elements of the
cyber-attack as well as the security breaches. A firm should as
8. well ensure values
and the security awareness of behavioral characters at various
levels to ensure that risks are sufficiently understood. [24559:
Bada, M., & Sasse,
A. (2014). Cybersecurity awareness campaigns: Why do they
fail to change behavior.]
Small, P. E. (2011). Defense in Depth: An Impractical Strategy
for a Cyber World. SANS Institute, 1-22. Retrieved July 29,
2018[endnoteRef:24097] [24097: Small, P. E. (2011). Defense
in Depth: An Impractical Strategy for a Cyber World. SANS
Institute, 1-22.
Retrieved July 29, 2018]
The defense is depth as a policy requirement that, with layered
defense, could improve the security of the system. During this
case, an invader
agrees on one of the layers of security, the additional segment
that restricts them from entering significant assets of any
company, buys some time
for the security personnel of the organization to respond to the
attack. This current study challenges the legitimacy of the
concept of defense of
depth strategy and terms it an Impractical approach for the new
cyber world. While one could formerly sweep alongside the
author’s hypothesis, it
is fascinating to view it from the author’s prospect and
critically view the concept itself. The author recommends that
the defense of depth was a
policy acquired for military combat, enforcing an attacker to
spend a lot of resources to get within the initial layers of
protection. One can agree with
the author on this: it was undoubtedly a craft developed by the
military for a real-world physical battle. Extrapolating and
changing similar notions
in the cyber world is not a bad idea as the writer would like to
9. propose in the article. The author also claims that the defense of
depth is a repetitive
strategy and is unsustainable in this period of cyber innovation.
References
1 1
4
1
5 4
6 7
6 7 8
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-
b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 3/5
Student paper 100%
Student paper 100%
Student paper 100%
Student paper 100%
Student paper 100%
Student paper 100%
Student paper 69%
10. Student paper 84%
Student paper 67%
1
Student paper
DEFENSE-IN-DEPTH AND AWARE-
NESS TECHNIQUES
Original source
Defense-in-Depth and Awareness
Techniques
1
Student paper
DEFENSE-IN-DEPTH AND AWARE-
NESS TECHNIQUES
Original source
Defense-in-Depth and Awareness
Techniques
1
Student paper
Defense-in-Depth and Awareness
Techniques
11. Original source
Defense-in-Depth and Awareness
Techniques
1
Student paper
University of Cumberlands Defense-
in-Depth and Awareness Techniques
Original source
University of Cumberlands Defense-
in-Depth and Awareness Techniques
2
Student paper
Security protection to an industrial
control system based on Defense-in-
Depth strategy.
Original source
Security protection to an industrial
control system based on Defense-in-
Depth strategy
1
Student paper
WIT Transactions on Engineering Sci-
12. ences, 113, 19-27.]
Original source
WIT Transactions on Engineering Sci-
ences, 113, 19-27
1
Student paper
Furthermore, the defense in depth
comes at this particular moment.
Original source
Defense in depth comes at this point
1
Student paper
This aspect entails the integrity of
data analysis, network security con-
trols, as well as the behavior analysis
antivirus software. The network se-
curity controls must involve analyz-
ing the traffic of the network.
Original source
Elements include data integrity
analysis, network security controls,
and behavior analysis antivirus soft-
ware Network security controls in-
volve analyzing the traffic of a
13. network
3
Student paper
It implies that the antivirus software
is essential for the virus as well as
malware protection.
Original source
Antivirus software is significant for
virus and malware protection
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-
b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 4/5
Student paper 63%
Student paper 72%
Student paper 65%
Student paper 100%
Student paper 85%
Student paper 67%
Student paper 100%
14. 1
Student paper
With this, it implies that each file on
the system poses a checksum.
Original source
Each file on a system has a
checksum
3
Student paper
The checksum is the mathematical
representation of a particular file,
displaying how frequently it used,
and the source and as well detect
the viruses and the malicious codes
inserted (Lee, 2016)
[endnoteRef:27908].
Original source
A checksum refers to a mathemati-
cal representation of a particular file,
showing how frequently it was uti-
lized, its source, and is also used to
detect viruses and malicious code
(Lee, 2016)
1
15. Student paper
However, the behavioral analysis can
only be activated if no security and
measure adopted, such as when the
firewall fails, for that reason, its per-
formance more direct control that
shall eliminate the violation
procedures.
Original source
The behavioral analysis will only be
activated if no security measures are
adopted, such as when the firewall
fails
1
Student paper
Lee, J., Bagheri, B., & Jin, C.
Original source
Lee, J., Bagheri, B., & Jin, C
1
Student paper
Introduction to cyber manufacturing.
Manufacturing Letters, 8, 11-15.]
Still, the defense-in-depth strategy
does not count whenever the aware-
ness has not been incorporating as a
16. strategy to determine the emerging
issues and strengthen the counter-
measures. The many people in the
world see the internet as a secure
platform for socializing, the re-
search, and this occurs with them
not knowing that the internet has
got a variety of daily attacks (Bada,
2014)[endnoteRef:24559].
Original source
Introduction to cyber manufacturing
Manufacturing Letters, 8, 11-15
However, the depth in defense strat-
egy is not effective if awareness is
not included as a strategy to identify
emerging issues and strengthen
countermeasures Most people in the
world see the Internet as a secure
platform for socializing and re-
search, without realizing that there is
a variety of daily attacks (Bada, 2014)
4
Student paper
A firm should as well ensure values
and the security awareness of be-
havioral characters at various levels
to ensure that risks are sufficiently
understood.
Original source
17. A firm should also develop security
awareness values and behaviors at
different levels of the organization to
ensure that the risks are properly
understood
1
Student paper
Bada, M., & Sasse, A.
Original source
Bada, M., & Sasse, A
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-
b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 5/5
Student paper 64%
Student paper 100%
hack-ed 100%
lplanet 80%
hack-ed 100%
lplanet 80%
18. wikipedia 74%
5
Student paper
Cybersecurity awareness campaigns:
Original source
Building cybersecurity awareness
4
Student paper
Why do they fail to change
behavior.]
Original source
Why do they fail to change behavior
6
Student paper
Defense in Depth:
Original source
Defense in Depth
7
Student paper
19. An Impractical Strategy for a Cyber
World.
Original source
Defense in Depth - An Impractical
Strategy for a Cyber World
6
Student paper
Defense in Depth:
Original source
Defense in Depth
7
Student paper
An Impractical Strategy for a Cyber
World.
Original source
Defense in Depth - An Impractical
Strategy for a Cyber World
8
Student paper
Retrieved July 29, 2018]
20. Original source
Retrieved 2018-09-29
Assessment Rubric for the Research Project
Student:
Paper Title:
Mechanics:
• ______ Virtually free of grammatical and typographical errors
• ______ Neat and scholarly presentation
Content:
• ______ Identifies and provides appropriate details on all the
components of
the project
• _______ Met content requirement
21. • _______ Demonstrates scholarly research skills
• _______ Documents sources accurately and appropriately
• _______ Citation format IAW APA Manual 6th Edition
• _______ Writes in a sustained, logical, coherent, and
scholarly manner
Legend: E = Outstanding
G = Good
S = Satisfactory
U = Unsatisfactory
Comments: