HOME

TheInfoList



OR:

A defence in depth uses multi-layered protections, similar to redundant protections, to create a reliable system despite any one layer's unreliability.


Examples

The term defence in depth is now used in many non-military contexts.


Fire prevention

A defence in depth strategy to fire prevention does not focus all the resources only on the prevention of a fire; instead, it also requires the deployment of fire alarms, extinguishers, evacuation plans, mobile rescue and fire-fighting equipment and even nationwide plans for deploying massive resources to a major blaze. Defense-in-depth is incorporated into fire protection regulations for nuclear power plants. It requires preventing fires, detecting and extinguishing fires that do occur, and ensuring the capability to safely shutdown.


Engineering

Defence in depth may mean engineering which emphasizes redundancy – a system that keeps working when a component fails – over attempts to design components that will not fail in the first place. For example, an
aircraft An aircraft ( aircraft) is a vehicle that is able to flight, fly by gaining support from the Atmosphere of Earth, air. It counters the force of gravity by using either Buoyancy, static lift or the Lift (force), dynamic lift of an airfoil, or, i ...
with four engines will be less likely to suffer total engine failure than a single-engined aircraft no matter how much effort goes into making the single engine reliable.
Charles Perrow Charles Bryce Perrow (February 9, 1925 – November 12, 2019), or Chick Perrow was an American sociologist and a leading figure of organizational sociology. He spent most of his career at SUNY Stony Brook and Yale University as a professor of ...
, author of ''
Normal accidents ''Normal Accidents: Living with High-Risk Technologies'' is a 1984 book by Yale sociologist Charles Perrow, which analyses complex systems from a sociological perspective. Perrow argues that multiple and unexpected failures are built into society ...
'', wrote that sometimes redundancies backfire and produce less, not more reliability. This may happen in three ways: First, redundant safety devices result in a more complex system, more prone to errors and accidents. Second, redundancy may lead to shirking of responsibility among workers. Third, redundancy may lead to increased production pressures, resulting in a system that operates at higher speeds, but less safely.


Nuclear

In
nuclear engineering Nuclear engineering is the engineering discipline concerned with designing and applying systems that utilize the energy released by nuclear processes. The most prominent application of nuclear engineering is the generation of electricity. Worldwide ...
and
nuclear safety Nuclear safety is defined by the International Atomic Energy Agency (IAEA) as "The achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the ...
, all safety activities, whether organizational, behavioural or equipment related, are subject to layers of overlapping provisions, so that if a failure should occur it would be compensated for or corrected without causing harm to individuals or the public at large. Defence in depth consists in a hierarchical deployment of different levels of equipment and procedures in order to maintain the effectiveness of physical barriers placed between radioactive materials and workers, the public or the environment, in normal operation, anticipated operational occurrences and, for some barriers, in accidents at the plant. Defence in depth is implemented through design and operation to provide a graded protection against a wide variety of transients, incidents and accidents, including equipment failures and human errors within the plant and events initiated outside the plan.


Existential risk mitigation

Defense in depth is a useful framework for categorizing
existential risk A global catastrophic risk or a doomsday scenario is a hypothetical event that could damage human well-being on a global scale, endangering or even destroying Modernity, modern civilization. Existential risk is a related term limited to even ...
mitigation measures into three layers of defense: # ''Prevention'': Reducing the probability of a catastrophe occurring in the first place. Example: Measures to prevent outbreaks of new highly-infectious diseases. # ''Response'': Preventing the scaling of a catastrophe to the global level. Example: Measures to prevent escalation of a small-scale nuclear exchange into an all-out nuclear war. # ''Resilience'': Increasing humanity's resilience (against extinction) when faced with global catastrophes. Example: Measures to increase food security during a nuclear winter. Human extinction is most likely when all three defenses are weak, that is, "by risks we are unlikely to prevent, unlikely to successfully respond to, and unlikely to be resilient against".


Information security

Likewise, in
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
/
Information Assurance Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and data transmission, transmission of information. Information assurance includes protection of the data integrity, inte ...
defence in depth represents the use of multiple
computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
techniques to help mitigate the risk of one component of the defence being compromised or circumvented. An example could be
anti-virus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
installed on individual
workstations A workstation is a special computer designed for technical or scientific applications. Intended primarily to be used by a single user, they are commonly connected to a local area network and run multi-user operating systems. The term ''workstat ...
when there is already virus protection on the
firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spre ...
s and
server Server may refer to: Computing *Server (computing), a computer program or a device that provides requested information for other programs or devices, called clients. Role * Waiting staff, those who work at a restaurant or a bar attending custome ...
s within the same environment. Different security products from multiple vendors may be deployed to defend different potential
vector Vector most often refers to: * Euclidean vector, a quantity with a magnitude and a direction * Disease vector, an agent that carries and transmits an infectious pathogen into another living organism Vector may also refer to: Mathematics a ...
s within the
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics ...
, helping prevent a shortfall in any one defence leading to a wider failure; also known as a "layered approach".


See also

* Defense in depth (military strategy) *
Defence-in-depth (Roman military) Defence-in-depth is the term used by American political analyst Edward Luttwak (born 1942) to describe his theory of the defensive strategy employed by the Late Roman army in the third and fourth centuries AD. Luttwak's ''Grand Strategy of the Rom ...


References

{{Reflist Safety engineering