An Investigation Into the Application of Defence In Depth Theory to Electronic Information Protection

ABSTRACT

This paper discusses an investigation into the application of traditional Defense in Depth theory to digital electronic information protection. Defense in Depth is firstly discussed in a physical security context, where deterrence, detection, delay and response are shown to be achieved by psychological, electronic, physical and procedural barriers. The Electronic Information Attack Model is then proposed, which comprises a hierarchical structure defining different aspects of electronic information and ways of attacking its confidentiality, integrity and availability. The final component then proposes that the four Defense in Depth functions can provide electronic information protection by layering barriers at various levels in the Electronic Information Attack Model.


AUTHORS

Security Consultant and Writer

Andrew Lester graduated from Edith Cowan University, Western Australia with a Bachelor of Science in Security and a Bachelor of Engineering in Communication Systems. In recent years, Andrew has worked at the Police Scientific Development Branch in the UK, the Australian Institute of Criminology, Edith Cowan University, Senstar-Stellar Corporation in Canada, and has also engaged in numerous consulting activities.

Associate Professor, Security Science, School of Engineering and Mathematics, Edith Cowan University
Western Australia

Clifton Smith is the Associate Professor, Security Science in the School of Engineering and Mathematics, Edith Cowan University, Perth, Western Australia. Professor Smith conducts research in IT security, ballistics and biometric imaging, and security education, and he has developed the professional security programmes of Bachelor of Science (Security), Master of Science (Security Science), and Doctor of Philosophy (Security Science).

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com