(.mil/.gov ONLY) Attacks on DoD systems have expanded from simple wiretaps and viruses to session hijacks and trojan horses, and the types and sophistication of these attacks are constantly evolving. In response to these threats, DoD response has also evolved. In recognition of the growing threat and complexity of this problem, DoD developed the defense in depth strategy to protect its networks and information systems. This report describes the impact of evolving technology on the defense in depth strategy. The execution of the strategy requires a significant number of different security and networking technologies. This report focuses on examining the trends and giving an overview of the relevant technologies. This report reviews the defense in depth strategy and discusses its implementation in the Defense Information Infrastructure (DII). Key elements of the strategy and current implementation of the strategy are discussed. How to Obtain a Hardcopy: Contact the CSIAC at firstname.lastname@example.org. How to Obtain a PDF: The PDF for this document is currently not available online. Please contact the CSIAC email@example.com.
- Cyber Security… the Virtual Frontier Journal Article
- New Report: Into the Gray Zone: The Private Sector and Active Defense Against Cyber Threats Digest Article
- After Criticism, US Defense Department Will Implement New Encryption Standards Next Year Digest Article
- CryptoLocker: Surviving a Ransomware Attack CSIAC Webinar
- DoD Modeling and Simulation (M&S) Catalog CSIAC Webinar