Skip to Content
Modern Defense in Depth
book

Modern Defense in Depth

by Stephen Gates
April 2019
Intermediate to advanced
52 pages
1h 7m
English
O'Reilly Media, Inc.
Content preview from Modern Defense in Depth

Chapter 2. Learning from Military Defense

In comparison to a modern military, the previous examples of protecting users and web applications have little, if any, similarity to the way a modern defense in depth (DiD) approach works in the context of warfare. For example, as one line of defense is attacked in the military, the other lines of defense downstream are adjusted by way of the internal threat intelligence gained to adequately shore up all defenses. There is a complete synergy that exists in the military lines of defense. Next, we look at the conventional definition of DiD as well as explore how a modern military operates in the context of integrated lines of defense.

Military Usage of Defense in Depth

DiD is a conventional military defense tactic that is being practiced today across many different industries. Traditionally, DiD provided a means of slowing down an attack against a target by using independent layers of protection, often called “lines of defense.” The standard, widely accepted definition is that DiD argues against using a single line of defense because the likelihood of failure is usually quite high. DiD accepts the notion that when one defensive line fails, another line will take its place and ensure that risks are kept to tolerable levels.

The main deficiency in the current DiD definition is that it calls for “independent lines of the defense,” which does not convey how a modern military operates. Today, lines of communication and intelligence overlay ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Cybersecurity – Attack and Defense Strategies - Third Edition

Cybersecurity – Attack and Defense Strategies - Third Edition

Yuri Diogenes, Dr. Erdal Ozkaya
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor

Publisher Resources

ISBN: 9781492050360