Security Defence System – Blog My Dissertation Consulting Company


The fundamental security principles that govern security defenses include layering, limiting, diversity, obscurity, and simplicity (Aalberts, 2016). Layering involves taking care of the comprehensive protection of the security systems such that the defenses available are more than one. Even though the vulnerability of each security defense is limited once an attacker cracks it, having multiple layers guarantees a hard time for them (Austin & Lu, 2020). Limiting ensures that users are only limited to a certain portion of details in a particular task. Minimized access provides limited chances of carrying out a computer attack (Aalberts, 2016). As far as diversity is concerned, every user is forced to use a combination of different techniques to have access to every other security layer. This defense strategy exposes an attacker who is not witty enough to implore his skills in penetrating several security layers with unique and different techniques (Aalberts, 2016). Obscurity only means that the security defense system is built in such a way that outsiders are made unaware of what is going on inside (Austin & Lu, 2020). Finally, we have simplicity which advocates for a security system that is not only simple for users to conveniently access their materials but also makes it hard to create bypasses for attackers (Rochester, 2018). Additionally, simple security means less work for the defense professionals ensuring they are not exposed to any vulnerabilities.

Looking at the current state of my computer, I have only managed to set up a security defense system that embarrassed the principles of layering, diversity, and obscurity. From the home screen to frequently used websites, software, files, and folders, I have a unique combination of passwords. This act was motivated after getting hacked twice and all my details used for ransomware. Fortunately, with these features, I have not had any issues with computer attackers for quite some time now. Since I am the only user, I have not set up any limiting features as well as embracing the simplicity principle. Regardless, I am working towards adopting a technology that embraces all the five principles of security defense allowing me to share my computer with my most trusted school peers without being in harm’s way.  Nevertheless, I think the front camera of the computer can be placed in an undetectable manner and also have internal self-recording software that allows attackers’ gimmicks to be traced and stopped.

References

 Aalberts, C. (2016). The five principles of European political communication. Governance and Security Issues of the European Union, 93-107. https://doi.org/10.1007/978-94-6265-144-9_6

Austin, G., & Lu, W. (2020). Five years of cyber security education reform in China. Cyber Security Education, 173-193. https://doi.org/10.4324/9780367822576-11

Rochester, J. M. (2018). Improving international security. Fundamental Principles of International Relations, 233-257. https://doi.org/10.4324/9780429500299-10






Order Now! Order Now!