|
|
|
|
LEADER |
00000cam a22000007 4500 |
001 |
EBOOKCENTRAL_on1336406191 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
220903s1900 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d QGK
|d YDX
|d OCLCQ
|d SFB
|d OCLCF
|d OCLCO
|
019 |
|
|
|a 1340453789
|a 1415904301
|
020 |
|
|
|a 9781000794298
|
020 |
|
|
|a 1000794296
|
020 |
|
|
|a 8770225834
|
020 |
|
|
|a 9788770225830
|
020 |
|
|
|a 1003339387
|
020 |
|
|
|a 9781003339380
|
035 |
|
|
|a (OCoLC)1336406191
|z (OCoLC)1340453789
|z (OCoLC)1415904301
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Madsen, Tom.
|
245 |
1 |
0 |
|a Security Architecture - How and Why
|
260 |
|
|
|a Aalborg :
|b River Publishers,
|c 1900.
|
300 |
|
|
|a 1 online resource (471 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a River Publishers Series in Digital Security and Forensics Ser.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Intro -- Halftitle -- Security Architecture -- How & Why -- Title Page -- Security Architecture -- How & Why -- Contents -- Preface -- List of Figures -- List of Tables -- 1 Why Security? -- 1.1 Business Prevention -- 1.2 Measuring and Prioritizing Business Risk -- 1.3 Security as a Business Enabler -- 1.4 Empowering the Customers -- 1.5 Protecting Relationships -- 1.6 To Summarize -- 2 Why Architecture -- 2.1 Origins of Architecture -- 2.2 Managing Complexity -- 2.3 Information Systems Architecture -- 2.4 Architectures -- 2.4.1 Business Architecture -- 2.4.2 Information Architecture
|
505 |
8 |
|
|a 2.4.3 Applications Architecture -- 2.4.4 Infrastructure Architecture -- 2.4.5 Risk Management Architecture -- 2.4.6 Governance Architecture -- 2.5 Enterprise Security Architecture -- 2.6 Being a Successful Security Architect -- 2.7 Security Architecture Needs a Holistic Approach -- 2.8 What Does Architecture Mean? -- 3 Security Architecture Model -- 3.1 The SABSA Model -- 3.2 The Business View -- 3.3 The Architect's View -- 3.4 The Designer's View -- 3.5 The Builder's View -- 3.6 The Tradesman's View -- 3.7 The Facilities Manager's View -- 3.8 The Inspector's View
|
505 |
8 |
|
|a 3.9 The Security Architecture Model -- 4 Contextual Security Architecture -- 4.1 Business Needs for Information Security -- 4.2 Security as a Business Enabler -- 4.2.1 On-Demand Entertainment -- 4.2.2 Value-Added Information Services -- 4.2.3 Remote Process Control -- 4.2.4 Supply Chain Management -- 4.2.5 Research and Information Gathering -- 4.3 Digital Business -- 4.3.1 Online Banking -- 4.3.2 B2B -- 4.3.3 Online Government -- 4.4 Continuity and Stability -- 4.4.1 Revenue Generation -- 4.4.2 Customer Service -- 4.4.3 Reputation -- 4.4.4 Management Control -- 4.4.5 Operating Licenses
|
505 |
8 |
|
|a 4.4.6 Employee Confidence -- 4.4.7 Shareholder Confidence -- 4.4.8 Other Stakeholders -- 4.5 Safety-Critical Dependencies -- 4.5.1 Remote Communications to Safety-Critical Systems -- 4.5.2 Systems Assurance -- 4.6 Business Goals, Success Factors and Operational Risks -- 4.6.1 Brand Protection -- 4.6.2 Fraud Prevention -- 4.6.3 Loss Prevention -- 4.6.4 Business Continuity -- 4.6.5 Legal Obligations -- 4.7 Operational Risk Assessment -- 4.7.1 Risk/Threat Assessment -- 4.7.2 Threat Domains -- 4.7.3 Threat Categories -- 4.7.4 Risk Prioritization -- 4.8 SABSA Risk Assessment Method
|
505 |
8 |
|
|a 4.8.1 SABSA Risk Assessment Method: Step 1 -- 4.8.2 SABSA Risk Assessment Method: Step 2 -- 4.8.3 SABSA Risk Assessment Method: Step 3 -- 4.8.4 SABSA Risk Assessment Method: Step 4 -- 4.8.5 SABSA Risk Assessment Method: Step 5 -- 4.9 Business Processes and their Security -- 4.9.1 Business Interactions -- 4.9.2 Business Communications -- 4.9.3 Business Transactions -- 4.10 Organization and Relationships Impacting Security Needs -- 4.11 Location Dependence -- 4.11.1 The Global Village Marketplace -- 4.11.2 Remote Working -- 4.12 Time Dependency -- 4.12.1 Time-Related Business Drivers
|
500 |
|
|
|a 4.12.2 Time-Based Security
|
520 |
8 |
|
|a Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of Security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons, not least because having an architecture makes working with cyber security a much easier job, since we can now build on a, hopefully, solid foundation. Developing a security architecture is a daunting job, for almost anyone, and in a company that has not had a cyber security program implemented before, the job becomes even harder. The benefits of having a concrete cyber security architecture in place cannot be overstated! The challenge here is that a security architecture is not something that can stand alone, it absolutely must be aligned with the business in which is being implemented.This book emphasizes the importance, and the benefits, of having a security architecture in place. The book will be aligned with most of the sub frameworks in the general framework called SABSA, or Sherwood Applied Business Security Architecture. SABSA is comprised of several individual frameworks and there are several certifications that you can take in SABSA. Aside from getting a validation of your skills, SABSA as a framework focusses on aligning the Security Architecture with the business and its strategy. Each of the chapters in this book will be aligned with one or more of the components in SABSA, the components will be described along with the introduction to each of the chapters.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer architecture.
|
650 |
|
0 |
|a Business--Data processing.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Architecture.
|
650 |
|
7 |
|a Business
|x Data processing
|2 fast
|
650 |
|
7 |
|a Computer architecture
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
653 |
|
|
|a Mathematics
|
776 |
0 |
8 |
|i Print version:
|a Madsen, Tom.
|t Security Architecture - How and Why.
|d Aalborg : River Publishers, ©1900
|
830 |
|
0 |
|a River Publishers Series in Digital Security and Forensics Ser.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=29357121
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL7078878
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL29357121
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18104713
|
994 |
|
|
|a 92
|b IZTAP
|