SlideShare a Scribd company logo
1 of 22
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-
b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 1/5
%46
%5
SafeAssign Originality Report
Summer 2020 - Emerging Threats & Countermeas (IT… • Final
research paper/project/assignment
%51Total Score: High risk
Vikeshkumar Dipakkumar Desai
Submission UUID: e2f632c2-fdcf-616b-51d7-5a4eb8187331
Total Number of Reports
1
Highest Match
51 %
Document8.docx
Average Match
51 %
Submitted on
06/21/20
03:48 PM PDT
Average Word Count
1,276
Highest: Document8.docx
%51Attachment 1
Institutional database (5)
Student paper Student paper Student paper
Student paper Student paper
Internet (3)
lplanet hack-ed wikipedia
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,276
Document8.docx
1 3 4
2 5
7 6 8
1 Student paper 3 Student paper 4 Student paper
Running head: DEFENSE-IN-DEPTH AND AWARENESS
TECHNIQUES
1
Running head: DEFENSE-IN-DEPTH AND AWARENESS
TECHNIQUES
4
Defense-in-Depth and Awareness Techniques
Vikesh Desai
University of Cumberlands
Defense-in-Depth and Awareness Techniques
Awareness is one of the essential aspects in most of the
organization, which requires a high magnitude to address
comprehensively in all sections.
The depth in defense is more paramount to ensure that the
organizations are comprehensively and effectively protect their
system from the cyber-
attack activities. The most crucial strategy to deploy is two
strategic systems that enhance the high degree of security
instead of implementing one
security system. Various organizations have taken into account
the defense in depth very crucial. Still, the organizations
demanded to incorporate
their awareness through the provision of comprehensive
educations to the employees and the workers in the
organizations concerning the vital
measures that should be taken into account to curb security
issues and develop holistic values taken into account. Most of
the organizations are
known not to take the awareness as pressing issues that demand
high consideration for the process of protecting and enhancing
the security to be
tight. For any organization to protect their system from the
cybercrime attack, they need to embrace situational awareness
so that they can compre-
hensively develop strategic interventions that enable them to
improve and assist in the detection of the up and coming threats
as well as the
1
1
1
1
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport?attemptId=6d3212a4-
b0a4-44b2-afd8-
56ae47ca2c6b&course_id=_116194_1&download=true&include
Deleted=true&print=true&force=true
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-
b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 2/5
Source Matches (23)
strengthens that countermeasures the cybercrime activities. To
mention is that the defense in depth is a very strategic
intervention that illustrates a
more vital mechanism used to secure the information data. It is
essential to acknowledge that the defensive tool works in such a
manner that if one
fails, then another would pick up to cover the situation of the
other with very immediate effect. The strategy is critical since
it is advance the com-
prehensive security of the degree of the system layout and
efficiently resolves the cybersecurity attack in the event (Luo,
2016)[endnoteRef:3267]. It
is essential to accept that the digital world has to surpass us
with various positive effects in our daily lives. With that whole
idea, it simplifies the way
that we conduct our business, stay, tend to socialize with each
other, and more so the aspect of human life. [3267: Luo, X.
(2016). Security pro-
tection to an industrial control system based on Defense-in-
Depth strategy. WIT Transactions on Engineering Sciences,
113, 19-27.]
On the other hand, modern digitalization still poses acute multi-
person attacks. It is, therefore, essential to ensure that it
provides a very compre-
hensive high level of protection through the intervention of the
high level of strategies intended to completely address the risks
that can occur in
the organizations as well. Furthermore, the defense in depth
comes at this particular moment. Sensitively, the argument in-
depth advanced
through the combination of the different security measures,
which includes in the malware scanners, data encryptions as
well as the firewall to fill
up the loopholes that come as a result when using single
security as one the solution. The use of the defense in depth is
one of the essential as-
pects that can use in all element juts from the ITC individual
who uses the laptops in the inns on the extensive internet of the
thousands of users.
Through the research studies, the companies can never be
secured through the single security solution because whenever
the problem is solved,
there is so much probability of many risks to occur, which can
hardly manage. The organizations need to develop many
security features that seek
to address the persistent security issues as well as the risks.
This aspect entails the integrity of data analysis, network
security controls, as well
as the behavior analysis antivirus software. The network
security controls must involve analyzing the traffic of the
network. The more important as-
pect to note is that the firewall in any way does not permit
unauthorized the system to access to a particular network as
well as grant or deter the
access according to the reputable security standards. It implies
that the antivirus software is essential for the virus as well as
malware protec-
tion. The very vital of the antivirus software entails the role to
ensure that they analyze and evaluate the suspicious activities
and allow the compre-
hensive security of the existing network. With this, it implies
that each file on the system poses a checksum. The checksum is
the mathe-
matical representation of a particular file, displaying how
frequently it used, and the source and as well detect the viruses
and the malicious codes
inserted (Lee, 2016)[endnoteRef:27908]. The solution of data
security is very vital and useful for the determination of the IP
source address to make
sure they are comprehensively supported and trusted sources.
However, the behavioral analysis can only be activated if no
security and mea-
sure adopted, such as when the firewall fails, for that reason, its
performance more direct control that shall eliminate the
violation procedures.
2
1
1
1
3
1 3
1
[27908: Lee, J., Bagheri, B., & Jin, C. (2016). Introduction to
cyber manufacturing. Manufacturing Letters, 8, 11-15.]
Still, the defense-in-depth strategy does not count whenever the
awareness has not been incorporating as a strategy to determine
the emerging is-
sues and strengthen the countermeasures. The many people in
the world see the internet as a secure platform for socializing,
the research, and this
occurs with them not knowing that the internet has got a variety
of daily attacks (Bada, 2014)[endnoteRef:24559]. the
cyberattack, as well as the se-
curity breaches, are ever-increasing challenges in many
companies or organizations, and they pose severe adverse
penalties. Minimizing such risks
entails comprehensive rules and regulation within the
organizations or the companies to effectively enhance the
security culture through the educa-
tion of the workers concerning the essential elements of the
cyber-attack as well as the security breaches. A firm should as
well ensure values
and the security awareness of behavioral characters at various
levels to ensure that risks are sufficiently understood. [24559:
Bada, M., & Sasse,
A. (2014). Cybersecurity awareness campaigns: Why do they
fail to change behavior.]
Small, P. E. (2011). Defense in Depth: An Impractical Strategy
for a Cyber World. SANS Institute, 1-22. Retrieved July 29,
2018[endnoteRef:24097] [24097: Small, P. E. (2011). Defense
in Depth: An Impractical Strategy for a Cyber World. SANS
Institute, 1-22.
Retrieved July 29, 2018]
The defense is depth as a policy requirement that, with layered
defense, could improve the security of the system. During this
case, an invader
agrees on one of the layers of security, the additional segment
that restricts them from entering significant assets of any
company, buys some time
for the security personnel of the organization to respond to the
attack. This current study challenges the legitimacy of the
concept of defense of
depth strategy and terms it an Impractical approach for the new
cyber world. While one could formerly sweep alongside the
author’s hypothesis, it
is fascinating to view it from the author’s prospect and
critically view the concept itself. The author recommends that
the defense of depth was a
policy acquired for military combat, enforcing an attacker to
spend a lot of resources to get within the initial layers of
protection. One can agree with
the author on this: it was undoubtedly a craft developed by the
military for a real-world physical battle. Extrapolating and
changing similar notions
in the cyber world is not a bad idea as the writer would like to
propose in the article. The author also claims that the defense of
depth is a repetitive
strategy and is unsustainable in this period of cyber innovation.
References
1 1
4
1
5 4
6 7
6 7 8
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-
b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 3/5
Student paper 100%
Student paper 100%
Student paper 100%
Student paper 100%
Student paper 100%
Student paper 100%
Student paper 69%
Student paper 84%
Student paper 67%
1
Student paper
DEFENSE-IN-DEPTH AND AWARE-
NESS TECHNIQUES
Original source
Defense-in-Depth and Awareness
Techniques
1
Student paper
DEFENSE-IN-DEPTH AND AWARE-
NESS TECHNIQUES
Original source
Defense-in-Depth and Awareness
Techniques
1
Student paper
Defense-in-Depth and Awareness
Techniques
Original source
Defense-in-Depth and Awareness
Techniques
1
Student paper
University of Cumberlands Defense-
in-Depth and Awareness Techniques
Original source
University of Cumberlands Defense-
in-Depth and Awareness Techniques
2
Student paper
Security protection to an industrial
control system based on Defense-in-
Depth strategy.
Original source
Security protection to an industrial
control system based on Defense-in-
Depth strategy
1
Student paper
WIT Transactions on Engineering Sci-
ences, 113, 19-27.]
Original source
WIT Transactions on Engineering Sci-
ences, 113, 19-27
1
Student paper
Furthermore, the defense in depth
comes at this particular moment.
Original source
Defense in depth comes at this point
1
Student paper
This aspect entails the integrity of
data analysis, network security con-
trols, as well as the behavior analysis
antivirus software. The network se-
curity controls must involve analyz-
ing the traffic of the network.
Original source
Elements include data integrity
analysis, network security controls,
and behavior analysis antivirus soft-
ware Network security controls in-
volve analyzing the traffic of a
network
3
Student paper
It implies that the antivirus software
is essential for the virus as well as
malware protection.
Original source
Antivirus software is significant for
virus and malware protection
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-
b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 4/5
Student paper 63%
Student paper 72%
Student paper 65%
Student paper 100%
Student paper 85%
Student paper 67%
Student paper 100%
1
Student paper
With this, it implies that each file on
the system poses a checksum.
Original source
Each file on a system has a
checksum
3
Student paper
The checksum is the mathematical
representation of a particular file,
displaying how frequently it used,
and the source and as well detect
the viruses and the malicious codes
inserted (Lee, 2016)
[endnoteRef:27908].
Original source
A checksum refers to a mathemati-
cal representation of a particular file,
showing how frequently it was uti-
lized, its source, and is also used to
detect viruses and malicious code
(Lee, 2016)
1
Student paper
However, the behavioral analysis can
only be activated if no security and
measure adopted, such as when the
firewall fails, for that reason, its per-
formance more direct control that
shall eliminate the violation
procedures.
Original source
The behavioral analysis will only be
activated if no security measures are
adopted, such as when the firewall
fails
1
Student paper
Lee, J., Bagheri, B., & Jin, C.
Original source
Lee, J., Bagheri, B., & Jin, C
1
Student paper
Introduction to cyber manufacturing.
Manufacturing Letters, 8, 11-15.]
Still, the defense-in-depth strategy
does not count whenever the aware-
ness has not been incorporating as a
strategy to determine the emerging
issues and strengthen the counter-
measures. The many people in the
world see the internet as a secure
platform for socializing, the re-
search, and this occurs with them
not knowing that the internet has
got a variety of daily attacks (Bada,
2014)[endnoteRef:24559].
Original source
Introduction to cyber manufacturing
Manufacturing Letters, 8, 11-15
However, the depth in defense strat-
egy is not effective if awareness is
not included as a strategy to identify
emerging issues and strengthen
countermeasures Most people in the
world see the Internet as a secure
platform for socializing and re-
search, without realizing that there is
a variety of daily attacks (Bada, 2014)
4
Student paper
A firm should as well ensure values
and the security awareness of be-
havioral characters at various levels
to ensure that risks are sufficiently
understood.
Original source
A firm should also develop security
awareness values and behaviors at
different levels of the organization to
ensure that the risks are properly
understood
1
Student paper
Bada, M., & Sasse, A.
Original source
Bada, M., & Sasse, A
6/21/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4-
b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 5/5
Student paper 64%
Student paper 100%
hack-ed 100%
lplanet 80%
hack-ed 100%
lplanet 80%
wikipedia 74%
5
Student paper
Cybersecurity awareness campaigns:
Original source
Building cybersecurity awareness
4
Student paper
Why do they fail to change
behavior.]
Original source
Why do they fail to change behavior
6
Student paper
Defense in Depth:
Original source
Defense in Depth
7
Student paper
An Impractical Strategy for a Cyber
World.
Original source
Defense in Depth - An Impractical
Strategy for a Cyber World
6
Student paper
Defense in Depth:
Original source
Defense in Depth
7
Student paper
An Impractical Strategy for a Cyber
World.
Original source
Defense in Depth - An Impractical
Strategy for a Cyber World
8
Student paper
Retrieved July 29, 2018]
Original source
Retrieved 2018-09-29
Assessment Rubric for the Research Project
Student:
Paper Title:
Mechanics:
• ______ Virtually free of grammatical and typographical errors
• ______ Neat and scholarly presentation
Content:
• ______ Identifies and provides appropriate details on all the
components of
the project
• _______ Met content requirement
• _______ Demonstrates scholarly research skills
• _______ Documents sources accurately and appropriately
• _______ Citation format IAW APA Manual 6th Edition
• _______ Writes in a sustained, logical, coherent, and
scholarly manner
Legend: E = Outstanding
G = Good
S = Satisfactory
U = Unsatisfactory
Comments:
6212020 Originality Reporthttpsucumberlands.blackboar.docx

More Related Content

Similar to 6212020 Originality Reporthttpsucumberlands.blackboar.docx

HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...IJNSA Journal
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingYogeshIJTSRD
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedSecPod
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedSecPod
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESIJNSA Journal
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsJuniper Networks
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportJames Gachie
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report Steve Fantauzzo
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docxsleeperharwell
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksTrend Micro
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 

Similar to 6212020 Originality Reporthttpsucumberlands.blackboar.docx (20)

HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration Testing
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
 
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity ReportCisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
 
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 

More from BHANU281672

652020 Originality Reporthttpsblackboard.nec.eduweba.docx
652020 Originality Reporthttpsblackboard.nec.eduweba.docx652020 Originality Reporthttpsblackboard.nec.eduweba.docx
652020 Originality Reporthttpsblackboard.nec.eduweba.docxBHANU281672
 
61Identify the case study you selected. Explain whether the.docx
61Identify the case study you selected. Explain whether the.docx61Identify the case study you selected. Explain whether the.docx
61Identify the case study you selected. Explain whether the.docxBHANU281672
 
60CHAPTER THREEconsistent with the so-called performative app.docx
60CHAPTER THREEconsistent with the so-called performative app.docx60CHAPTER THREEconsistent with the so-called performative app.docx
60CHAPTER THREEconsistent with the so-called performative app.docxBHANU281672
 
6 pagesThe following sections are in the final consulting .docx
6 pagesThe following sections are in the final consulting .docx6 pagesThe following sections are in the final consulting .docx
6 pagesThe following sections are in the final consulting .docxBHANU281672
 
600 words needed1. What do we mean by the New Public Administr.docx
600 words needed1. What do we mean by the New Public Administr.docx600 words needed1. What do we mean by the New Public Administr.docx
600 words needed1. What do we mean by the New Public Administr.docxBHANU281672
 
6 peer responses due in 24 hours Each set of 2 responses wil.docx
6 peer responses due in 24 hours Each set of 2 responses wil.docx6 peer responses due in 24 hours Each set of 2 responses wil.docx
6 peer responses due in 24 hours Each set of 2 responses wil.docxBHANU281672
 
6 page paper onWhat is second language acquisition and why is .docx
6 page paper onWhat is second language acquisition and why is .docx6 page paper onWhat is second language acquisition and why is .docx
6 page paper onWhat is second language acquisition and why is .docxBHANU281672
 
600 Words1) Specify some of the ways in which human resource m.docx
600 Words1) Specify some of the ways in which human resource m.docx600 Words1) Specify some of the ways in which human resource m.docx
600 Words1) Specify some of the ways in which human resource m.docxBHANU281672
 
612020 Originality Reporthttpsucumberlands.blackboard.docx
612020 Originality Reporthttpsucumberlands.blackboard.docx612020 Originality Reporthttpsucumberlands.blackboard.docx
612020 Originality Reporthttpsucumberlands.blackboard.docxBHANU281672
 
61520, 256 PMGlobal Innovation and Intellectual Property.docx
61520, 256 PMGlobal Innovation and Intellectual Property.docx61520, 256 PMGlobal Innovation and Intellectual Property.docx
61520, 256 PMGlobal Innovation and Intellectual Property.docxBHANU281672
 
6 Developing Strategic and Operational PlansIngram Publish.docx
6 Developing Strategic and Operational PlansIngram Publish.docx6 Developing Strategic and Operational PlansIngram Publish.docx
6 Developing Strategic and Operational PlansIngram Publish.docxBHANU281672
 
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docxBHANU281672
 
6.2 What protocols comprise TLS6.3 What is the difference.docx
6.2 What protocols comprise TLS6.3 What is the difference.docx6.2 What protocols comprise TLS6.3 What is the difference.docx
6.2 What protocols comprise TLS6.3 What is the difference.docxBHANU281672
 
6.2 What protocols comprise TLS6.3 What is the difference bet.docx
6.2 What protocols comprise TLS6.3 What is the difference bet.docx6.2 What protocols comprise TLS6.3 What is the difference bet.docx
6.2 What protocols comprise TLS6.3 What is the difference bet.docxBHANU281672
 
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docxBHANU281672
 
5An American in IndiaWhat is my inheritance To what am .docx
5An American in IndiaWhat is my inheritance To what am .docx5An American in IndiaWhat is my inheritance To what am .docx
5An American in IndiaWhat is my inheritance To what am .docxBHANU281672
 
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docxBHANU281672
 
6 peer responses due in 18 hours Each set of 2 responses will ha.docx
6 peer responses due in 18 hours Each set of 2 responses will ha.docx6 peer responses due in 18 hours Each set of 2 responses will ha.docx
6 peer responses due in 18 hours Each set of 2 responses will ha.docxBHANU281672
 
5I.Observer Effects and Examiner BiasChisum and Turvey.docx
5I.Observer Effects and Examiner BiasChisum and Turvey.docx5I.Observer Effects and Examiner BiasChisum and Turvey.docx
5I.Observer Effects and Examiner BiasChisum and Turvey.docxBHANU281672
 

More from BHANU281672 (20)

652020 Originality Reporthttpsblackboard.nec.eduweba.docx
652020 Originality Reporthttpsblackboard.nec.eduweba.docx652020 Originality Reporthttpsblackboard.nec.eduweba.docx
652020 Originality Reporthttpsblackboard.nec.eduweba.docx
 
64c51786.docx
64c51786.docx64c51786.docx
64c51786.docx
 
61Identify the case study you selected. Explain whether the.docx
61Identify the case study you selected. Explain whether the.docx61Identify the case study you selected. Explain whether the.docx
61Identify the case study you selected. Explain whether the.docx
 
60CHAPTER THREEconsistent with the so-called performative app.docx
60CHAPTER THREEconsistent with the so-called performative app.docx60CHAPTER THREEconsistent with the so-called performative app.docx
60CHAPTER THREEconsistent with the so-called performative app.docx
 
6 pagesThe following sections are in the final consulting .docx
6 pagesThe following sections are in the final consulting .docx6 pagesThe following sections are in the final consulting .docx
6 pagesThe following sections are in the final consulting .docx
 
600 words needed1. What do we mean by the New Public Administr.docx
600 words needed1. What do we mean by the New Public Administr.docx600 words needed1. What do we mean by the New Public Administr.docx
600 words needed1. What do we mean by the New Public Administr.docx
 
6 peer responses due in 24 hours Each set of 2 responses wil.docx
6 peer responses due in 24 hours Each set of 2 responses wil.docx6 peer responses due in 24 hours Each set of 2 responses wil.docx
6 peer responses due in 24 hours Each set of 2 responses wil.docx
 
6 page paper onWhat is second language acquisition and why is .docx
6 page paper onWhat is second language acquisition and why is .docx6 page paper onWhat is second language acquisition and why is .docx
6 page paper onWhat is second language acquisition and why is .docx
 
600 Words1) Specify some of the ways in which human resource m.docx
600 Words1) Specify some of the ways in which human resource m.docx600 Words1) Specify some of the ways in which human resource m.docx
600 Words1) Specify some of the ways in which human resource m.docx
 
612020 Originality Reporthttpsucumberlands.blackboard.docx
612020 Originality Reporthttpsucumberlands.blackboard.docx612020 Originality Reporthttpsucumberlands.blackboard.docx
612020 Originality Reporthttpsucumberlands.blackboard.docx
 
61520, 256 PMGlobal Innovation and Intellectual Property.docx
61520, 256 PMGlobal Innovation and Intellectual Property.docx61520, 256 PMGlobal Innovation and Intellectual Property.docx
61520, 256 PMGlobal Innovation and Intellectual Property.docx
 
6 Developing Strategic and Operational PlansIngram Publish.docx
6 Developing Strategic and Operational PlansIngram Publish.docx6 Developing Strategic and Operational PlansIngram Publish.docx
6 Developing Strategic and Operational PlansIngram Publish.docx
 
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx
 
6.2 What protocols comprise TLS6.3 What is the difference.docx
6.2 What protocols comprise TLS6.3 What is the difference.docx6.2 What protocols comprise TLS6.3 What is the difference.docx
6.2 What protocols comprise TLS6.3 What is the difference.docx
 
6.2 What protocols comprise TLS6.3 What is the difference bet.docx
6.2 What protocols comprise TLS6.3 What is the difference bet.docx6.2 What protocols comprise TLS6.3 What is the difference bet.docx
6.2 What protocols comprise TLS6.3 What is the difference bet.docx
 
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx
 
5An American in IndiaWhat is my inheritance To what am .docx
5An American in IndiaWhat is my inheritance To what am .docx5An American in IndiaWhat is my inheritance To what am .docx
5An American in IndiaWhat is my inheritance To what am .docx
 
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx
 
6 peer responses due in 18 hours Each set of 2 responses will ha.docx
6 peer responses due in 18 hours Each set of 2 responses will ha.docx6 peer responses due in 18 hours Each set of 2 responses will ha.docx
6 peer responses due in 18 hours Each set of 2 responses will ha.docx
 
5I.Observer Effects and Examiner BiasChisum and Turvey.docx
5I.Observer Effects and Examiner BiasChisum and Turvey.docx5I.Observer Effects and Examiner BiasChisum and Turvey.docx
5I.Observer Effects and Examiner BiasChisum and Turvey.docx
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

6212020 Originality Reporthttpsucumberlands.blackboar.docx

  • 1. 6/21/2020 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4- b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 1/5 %46 %5 SafeAssign Originality Report Summer 2020 - Emerging Threats & Countermeas (IT… • Final research paper/project/assignment %51Total Score: High risk Vikeshkumar Dipakkumar Desai Submission UUID: e2f632c2-fdcf-616b-51d7-5a4eb8187331 Total Number of Reports 1 Highest Match 51 % Document8.docx Average Match 51 % Submitted on
  • 2. 06/21/20 03:48 PM PDT Average Word Count 1,276 Highest: Document8.docx %51Attachment 1 Institutional database (5) Student paper Student paper Student paper Student paper Student paper Internet (3) lplanet hack-ed wikipedia Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 1,276 Document8.docx 1 3 4 2 5 7 6 8 1 Student paper 3 Student paper 4 Student paper
  • 3. Running head: DEFENSE-IN-DEPTH AND AWARENESS TECHNIQUES 1 Running head: DEFENSE-IN-DEPTH AND AWARENESS TECHNIQUES 4 Defense-in-Depth and Awareness Techniques Vikesh Desai University of Cumberlands Defense-in-Depth and Awareness Techniques Awareness is one of the essential aspects in most of the organization, which requires a high magnitude to address comprehensively in all sections. The depth in defense is more paramount to ensure that the organizations are comprehensively and effectively protect their system from the cyber- attack activities. The most crucial strategy to deploy is two strategic systems that enhance the high degree of security instead of implementing one security system. Various organizations have taken into account the defense in depth very crucial. Still, the organizations demanded to incorporate their awareness through the provision of comprehensive educations to the employees and the workers in the organizations concerning the vital measures that should be taken into account to curb security issues and develop holistic values taken into account. Most of
  • 4. the organizations are known not to take the awareness as pressing issues that demand high consideration for the process of protecting and enhancing the security to be tight. For any organization to protect their system from the cybercrime attack, they need to embrace situational awareness so that they can compre- hensively develop strategic interventions that enable them to improve and assist in the detection of the up and coming threats as well as the 1 1 1 1 https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport?attemptId=6d3212a4- b0a4-44b2-afd8- 56ae47ca2c6b&course_id=_116194_1&download=true&include Deleted=true&print=true&force=true 6/21/2020 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4- b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 2/5 Source Matches (23) strengthens that countermeasures the cybercrime activities. To mention is that the defense in depth is a very strategic
  • 5. intervention that illustrates a more vital mechanism used to secure the information data. It is essential to acknowledge that the defensive tool works in such a manner that if one fails, then another would pick up to cover the situation of the other with very immediate effect. The strategy is critical since it is advance the com- prehensive security of the degree of the system layout and efficiently resolves the cybersecurity attack in the event (Luo, 2016)[endnoteRef:3267]. It is essential to accept that the digital world has to surpass us with various positive effects in our daily lives. With that whole idea, it simplifies the way that we conduct our business, stay, tend to socialize with each other, and more so the aspect of human life. [3267: Luo, X. (2016). Security pro- tection to an industrial control system based on Defense-in- Depth strategy. WIT Transactions on Engineering Sciences, 113, 19-27.] On the other hand, modern digitalization still poses acute multi- person attacks. It is, therefore, essential to ensure that it provides a very compre- hensive high level of protection through the intervention of the high level of strategies intended to completely address the risks that can occur in the organizations as well. Furthermore, the defense in depth comes at this particular moment. Sensitively, the argument in- depth advanced through the combination of the different security measures, which includes in the malware scanners, data encryptions as well as the firewall to fill up the loopholes that come as a result when using single security as one the solution. The use of the defense in depth is one of the essential as- pects that can use in all element juts from the ITC individual
  • 6. who uses the laptops in the inns on the extensive internet of the thousands of users. Through the research studies, the companies can never be secured through the single security solution because whenever the problem is solved, there is so much probability of many risks to occur, which can hardly manage. The organizations need to develop many security features that seek to address the persistent security issues as well as the risks. This aspect entails the integrity of data analysis, network security controls, as well as the behavior analysis antivirus software. The network security controls must involve analyzing the traffic of the network. The more important as- pect to note is that the firewall in any way does not permit unauthorized the system to access to a particular network as well as grant or deter the access according to the reputable security standards. It implies that the antivirus software is essential for the virus as well as malware protec- tion. The very vital of the antivirus software entails the role to ensure that they analyze and evaluate the suspicious activities and allow the compre- hensive security of the existing network. With this, it implies that each file on the system poses a checksum. The checksum is the mathe- matical representation of a particular file, displaying how frequently it used, and the source and as well detect the viruses and the malicious codes inserted (Lee, 2016)[endnoteRef:27908]. The solution of data security is very vital and useful for the determination of the IP source address to make sure they are comprehensively supported and trusted sources. However, the behavioral analysis can only be activated if no security and mea- sure adopted, such as when the firewall fails, for that reason, its
  • 7. performance more direct control that shall eliminate the violation procedures. 2 1 1 1 3 1 3 1 [27908: Lee, J., Bagheri, B., & Jin, C. (2016). Introduction to cyber manufacturing. Manufacturing Letters, 8, 11-15.] Still, the defense-in-depth strategy does not count whenever the awareness has not been incorporating as a strategy to determine the emerging is- sues and strengthen the countermeasures. The many people in the world see the internet as a secure platform for socializing, the research, and this occurs with them not knowing that the internet has got a variety of daily attacks (Bada, 2014)[endnoteRef:24559]. the cyberattack, as well as the se- curity breaches, are ever-increasing challenges in many companies or organizations, and they pose severe adverse penalties. Minimizing such risks entails comprehensive rules and regulation within the organizations or the companies to effectively enhance the security culture through the educa- tion of the workers concerning the essential elements of the cyber-attack as well as the security breaches. A firm should as
  • 8. well ensure values and the security awareness of behavioral characters at various levels to ensure that risks are sufficiently understood. [24559: Bada, M., & Sasse, A. (2014). Cybersecurity awareness campaigns: Why do they fail to change behavior.] Small, P. E. (2011). Defense in Depth: An Impractical Strategy for a Cyber World. SANS Institute, 1-22. Retrieved July 29, 2018[endnoteRef:24097] [24097: Small, P. E. (2011). Defense in Depth: An Impractical Strategy for a Cyber World. SANS Institute, 1-22. Retrieved July 29, 2018] The defense is depth as a policy requirement that, with layered defense, could improve the security of the system. During this case, an invader agrees on one of the layers of security, the additional segment that restricts them from entering significant assets of any company, buys some time for the security personnel of the organization to respond to the attack. This current study challenges the legitimacy of the concept of defense of depth strategy and terms it an Impractical approach for the new cyber world. While one could formerly sweep alongside the author’s hypothesis, it is fascinating to view it from the author’s prospect and critically view the concept itself. The author recommends that the defense of depth was a policy acquired for military combat, enforcing an attacker to spend a lot of resources to get within the initial layers of protection. One can agree with the author on this: it was undoubtedly a craft developed by the military for a real-world physical battle. Extrapolating and changing similar notions in the cyber world is not a bad idea as the writer would like to
  • 9. propose in the article. The author also claims that the defense of depth is a repetitive strategy and is unsustainable in this period of cyber innovation. References 1 1 4 1 5 4 6 7 6 7 8 6/21/2020 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4- b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 3/5 Student paper 100% Student paper 100% Student paper 100% Student paper 100% Student paper 100% Student paper 100% Student paper 69%
  • 10. Student paper 84% Student paper 67% 1 Student paper DEFENSE-IN-DEPTH AND AWARE- NESS TECHNIQUES Original source Defense-in-Depth and Awareness Techniques 1 Student paper DEFENSE-IN-DEPTH AND AWARE- NESS TECHNIQUES Original source Defense-in-Depth and Awareness Techniques 1 Student paper Defense-in-Depth and Awareness Techniques
  • 11. Original source Defense-in-Depth and Awareness Techniques 1 Student paper University of Cumberlands Defense- in-Depth and Awareness Techniques Original source University of Cumberlands Defense- in-Depth and Awareness Techniques 2 Student paper Security protection to an industrial control system based on Defense-in- Depth strategy. Original source Security protection to an industrial control system based on Defense-in- Depth strategy 1 Student paper WIT Transactions on Engineering Sci-
  • 12. ences, 113, 19-27.] Original source WIT Transactions on Engineering Sci- ences, 113, 19-27 1 Student paper Furthermore, the defense in depth comes at this particular moment. Original source Defense in depth comes at this point 1 Student paper This aspect entails the integrity of data analysis, network security con- trols, as well as the behavior analysis antivirus software. The network se- curity controls must involve analyz- ing the traffic of the network. Original source Elements include data integrity analysis, network security controls, and behavior analysis antivirus soft- ware Network security controls in- volve analyzing the traffic of a
  • 13. network 3 Student paper It implies that the antivirus software is essential for the virus as well as malware protection. Original source Antivirus software is significant for virus and malware protection 6/21/2020 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4- b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 4/5 Student paper 63% Student paper 72% Student paper 65% Student paper 100% Student paper 85% Student paper 67% Student paper 100%
  • 14. 1 Student paper With this, it implies that each file on the system poses a checksum. Original source Each file on a system has a checksum 3 Student paper The checksum is the mathematical representation of a particular file, displaying how frequently it used, and the source and as well detect the viruses and the malicious codes inserted (Lee, 2016) [endnoteRef:27908]. Original source A checksum refers to a mathemati- cal representation of a particular file, showing how frequently it was uti- lized, its source, and is also used to detect viruses and malicious code (Lee, 2016) 1
  • 15. Student paper However, the behavioral analysis can only be activated if no security and measure adopted, such as when the firewall fails, for that reason, its per- formance more direct control that shall eliminate the violation procedures. Original source The behavioral analysis will only be activated if no security measures are adopted, such as when the firewall fails 1 Student paper Lee, J., Bagheri, B., & Jin, C. Original source Lee, J., Bagheri, B., & Jin, C 1 Student paper Introduction to cyber manufacturing. Manufacturing Letters, 8, 11-15.] Still, the defense-in-depth strategy does not count whenever the aware- ness has not been incorporating as a
  • 16. strategy to determine the emerging issues and strengthen the counter- measures. The many people in the world see the internet as a secure platform for socializing, the re- search, and this occurs with them not knowing that the internet has got a variety of daily attacks (Bada, 2014)[endnoteRef:24559]. Original source Introduction to cyber manufacturing Manufacturing Letters, 8, 11-15 However, the depth in defense strat- egy is not effective if awareness is not included as a strategy to identify emerging issues and strengthen countermeasures Most people in the world see the Internet as a secure platform for socializing and re- search, without realizing that there is a variety of daily attacks (Bada, 2014) 4 Student paper A firm should as well ensure values and the security awareness of be- havioral characters at various levels to ensure that risks are sufficiently understood. Original source
  • 17. A firm should also develop security awareness values and behaviors at different levels of the organization to ensure that the risks are properly understood 1 Student paper Bada, M., & Sasse, A. Original source Bada, M., & Sasse, A 6/21/2020 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=6d3212a4- b0a4-44b2-afd8-56ae47ca2c6b&course_id=_… 5/5 Student paper 64% Student paper 100% hack-ed 100% lplanet 80% hack-ed 100% lplanet 80%
  • 18. wikipedia 74% 5 Student paper Cybersecurity awareness campaigns: Original source Building cybersecurity awareness 4 Student paper Why do they fail to change behavior.] Original source Why do they fail to change behavior 6 Student paper Defense in Depth: Original source Defense in Depth 7 Student paper
  • 19. An Impractical Strategy for a Cyber World. Original source Defense in Depth - An Impractical Strategy for a Cyber World 6 Student paper Defense in Depth: Original source Defense in Depth 7 Student paper An Impractical Strategy for a Cyber World. Original source Defense in Depth - An Impractical Strategy for a Cyber World 8 Student paper Retrieved July 29, 2018]
  • 20. Original source Retrieved 2018-09-29 Assessment Rubric for the Research Project Student: Paper Title: Mechanics: • ______ Virtually free of grammatical and typographical errors • ______ Neat and scholarly presentation Content: • ______ Identifies and provides appropriate details on all the components of the project • _______ Met content requirement
  • 21. • _______ Demonstrates scholarly research skills • _______ Documents sources accurately and appropriately • _______ Citation format IAW APA Manual 6th Edition • _______ Writes in a sustained, logical, coherent, and scholarly manner Legend: E = Outstanding G = Good S = Satisfactory U = Unsatisfactory Comments: