Book description
Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it requires a framework for developing and maintaining a system that is proactive. The book is based
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Foreword
- Preface
- Acknowledgements
-
Part 1: Introduction
- Security Architecture
- Chapter 1: The Meaning of Security
- Chapter 2: The Meaning of Architecture
- Chapter 3: Security Architecture Model
- Chapter 4: Case Study
-
Chapter 5: A Systems Approach
- The Role of Systems Engineering
- Why a Systems Approach?
- What Does the Systems Approach Make You Do?
- The Need for Systems Engineering in Security Architectures
- Some Basic Concepts
- The Control System Concept
- Using the Systems Approach in Security Architecture
- Case Study
- Advanced Modelling Techniques
- To Summarise: A Systems Approach
- Chapter 6: Measuring Return on Investment in Security Architecture
- Chapter 7: Using This Book as a Practical Guide
-
Chapter 8: Managing the Security Architecture Programme
- Selling the Benefits of Security Architecture
- Getting Sponsorship and Budget
- Building the Team
- Getting Started: Fast Track™ Workshops
- Programme Planning and Management
- Collecting the Information You Need
- Getting Consensus on the Conceptual Architecture
- Architecture Governance and Compliance
- Architecture Maintenance
- Long-Term Confidence of Senior Management
- To Summarise: Managing the Security Architecture Programme
-
Part 2: Strategy and Planning
- Strategy and Planning
- Contextual Security Architecture
- Conceptual Security Architecture
-
Chapter 9: Contextual Security Architecture
- Business Needs for Information Security
- Security As a Business Enabler
- Digital Business
- Operational Continuity and Stability
- Safety-Critical Dependencies
- Business Goals, Success Factors and Operational Risks
- Operational Risk Assessment
- Business Processes and Their Need for Security
- Organisation and Relationships Affecting Business Security-Needs
- Location Dependence of Business Security Needs
- Time Dependency of Business Security Needs
- To Summarise: Contextual Security Architecture
-
Chapter 10: Conceptual Security Architecture
- Conceptual Thinking
- Business Attributes Profile
- Control Objectives
- Security Strategies and Architectural Layering
- Security Entity Model and Trust Framework
- Security Domain Model
- Security Lifetimes and Deadlines
- Assessing the Current State of your Security Architecture
- To Summarise: Conceptual Security Architecture
-
Part 3: Design
- Design
- Logical Security Architecture
- Physical Security Architecture
- Component Security Architecture
-
Chapter 11: Logical Security Architecture
- Business Information Model
- Security Policies
- Security Services
- Application and System Security Services
- Security Management Services
- Entity Schema and Privilege Profiles
- Security Domain Definitions and Associations
- Security Processing Cycle
- Security Improvements Programme
- To Summarise: Logical Security Architecture
- Chapter 12: Physical Security Architecture
- Chapter 13: Component Security Architecture
-
Part 4: Operations
- Operations
- Operational Security Architecture
- Style of Part 4
-
Chapter 14: Security Policy Management
- The Meaning of Security Policy
- Structuring the Content of a Security Policy
- Policy Hierarchy and Architecture
- Corporate Security Policy
- Policy Principles
- Information Classification
- System Classification
- CA and RA Security Policies
- Application System Security Policies
- Platform Security Policies
- Network Security Policies
- Other Infrastructure Security Policies
- Security Organisation and Responsibilities
- Security Culture Development
- Outsourcing Strategy and Policy Management
- To Summarise:
- Chapter 15: Operational Risk Management
- Chapter 16: Assurance Management
-
Chapter 17: Security Administration and Operations
- Introduction to Security Management and Administration
- Managing the People
- Managing Physical and Environmental Security
- Managing ICT Operations and Support
- Access Control Management
- Compliance Management
- Security-Specific Operations
- Managed Security Services
- Product Evaluation and Selection
- Business Continuity Management
- To Summarise:
- Appendix A: List of Acronyms
- Index
Product information
- Title: Enterprise Security Architecture
- Author(s):
- Release date: November 2005
- Publisher(s): CRC Press
- ISBN: 9781498759908
You might also like
book
Practical Cybersecurity Architecture
Plan and design robust security architectures to secure your organization's technology landscape and the applications you …
book
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application …
book
Practical Cybersecurity Architecture - Second Edition
Plan, design, and build resilient security architectures to secure your organization's hybrid networks, cloud-based workflows, services, …
book
Zero Trust Security: An Enterprise Guide
Understand how Zero Trust security can and should integrate into your organization. This book covers the …