Defense in Depth – A user’s perspective
We are surrounded by personal digital devices everywhere we go. Due to this prevalence, Cyber threats also abound. This is why we need to take our personal information security seriously in order to keep up with our daily activities without disruptions.
Defense in depth also termed layered security is a principle where different measures are put in place at different layers or levels to protect an asset from cyber threats. The aim is t reduce risks to the barest minimum.

With respect to this write-up, asset refers to anything of value which when disrupted, causes some kind of loss to the owner. It ranges from the physical device to the data stored on these devices.
Defense in depth is usually employed by businesses and corporate network infrastructure. A single individual user can however take cues from this principle to stay protected.
Use genuine software
Unfortunately, many people fail in this respect. Using pirated software means you are unable to access the developer’s server to receive updates and patches for vulnerabilities. This opens your system’s doors to harmful threats. By using genuine software, you benefit from a stable system and are assured of the latest patches on your application whenever a vulnerability is identified.
Operating System and software Update
Always ensure that your system is updated with the latest patches. These updates are released mostly to fix vulnerabilities which when exploited may cause varying levels of harm to the user. Microsoft Windows 10 for instance releases security updates regularly to keep your system secure.
Antivirus and Endpoint Protection
An antivirus is a software application that protects your device from malware. Modern antiviruses now come with more than just detecting and eliminating viruses. By using optimized algorithms for Microsoft updates installations automatically. Always ensure that your antivirus is always updated to provide you optimal and up-to-date protection from the latest malware.
Active Firewall
Your first point of protection is your firewall. Just like how a fence wall protects intruders from entering your house, a firewall prevents intruders from entering your PC from a network. Ensure it is always on and avoid software installations that ask you to turn it off.
Password Protection
For many years, users have been advised to use strong passwords for their logins. This cannot be overemphasized enough even to this day. As an extra security measure, where applicable, always make use of multi-factor authentication.
User Access Control
Whenever a user installs an operating system, the default user is automatically the administrator. For Microsoft windows, anything done in the profile of this user is effective with the blessings of the administrator. This is different in Linux where you need to login to a root shell or use sudo to perform some actions.
With this level of privilege, a remote hacker who has gained access to your system has the same authority as you, who is the administrator of your system. This gives the attacker a leeway to install executables without you noticing. The user access control setting on your computer is there to protect you from this. Search for it in your windows search bar and drag the bar to the top like in the image below. When you do this, you are given an extra alert so you are sure of what is happening on your device.

Guest Account
In cases where someone borrows your computer, you depend on your trust for this person to do the right thing. Not to sound paranoid, you should have a guest account on your computer with restrictions. When that is done, you don’t have to worry about sharing your password with the person you are sharing your computer with. With a guest account, any guest requires your approval to perform highly privileged actions.
Fix Human Weakness
As mentioned above, cyber threats abound, and humans are said to be the weakest in any security infrastructure. When you have all the best technology but fail to do your part as a human, everything crumbles. A lot of attacks happen through payloads delivered via phishing emails. Email anti-viruses and spam filters may miss some of these malicious emails. This is where your diligence comes to play. Before you click any link from any email, be careful where that link is taking you to. Be extra careful when asked to enter some credentials into that site. Think before your click any link, even when it comes from a trusted contact.
All the measures listered above are summarised in the image below

Stay safe
Defense in Depth – A user’s perspective Read More »