Muutke küpsiste eelistusi

E-raamat: Enterprise Security Architecture: A Business-Driven Approach

(Consultant, Anaesthesia and Critical Care Medicine, City Hospital, Birmimgham, UK)
  • Formaat: 608 pages
  • Ilmumisaeg: 15-Nov-2005
  • Kirjastus: CMP Books
  • Keel: eng
  • ISBN-13: 9781498759908
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 68,89 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 608 pages
  • Ilmumisaeg: 15-Nov-2005
  • Kirjastus: CMP Books
  • Keel: eng
  • ISBN-13: 9781498759908
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This work presents a framework for developing enterprise security architecture. The Sherwood Applied Business Security Architecture (SABSA) model is generic and defines a process for architecture development, with each solution unique to the individual business. Security architecture issues are related to business requirements using charts, graphs, and real business situations. The audience for the book includes both technical security personnel and business managers. Sherwood is affiliated with Royal Holloway College, University of London, UK. Annotation ©2006 Book News, Inc., Portland, OR (booknews.com)

'Destined to be a classic work on the topic, Enterprise Security Architecture fills a real void in the knowledge base of our industry. In a comprehensive, detailed treatment, Sherwood, Clark and Lynas rightly emphasize the business approach and show how

Security is too important to be left in the hands of just one department or employee -- it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software -- it requires a framework for developing and maintaining a system that is proactive.

Foreword xv
Preface xvii
Benefits xvii
The Evolution of Information Security xvii
Information Security Literature xviii
How to Use This Book xviii
About the SABSA® Model xx
Relationship to Other Methods, Models and Standards xxi
And Finally xxi
Acknowledgements xxiii
Part 1: Introduction
1(166)
Security Architecture
2(1)
The Meaning of Security
3(14)
The Cultural Legacy: Business Prevention
3(1)
Measuring and Prioritising Business Risk
4(1)
Information Security as the Enabler of Business
5(5)
Adding Value to the Core Product
10(2)
Empowering the Customers
12(2)
Protecting Relationships and Leveraging Trust
14(2)
To Summarise: What Does `Security' Mean?
16(1)
The Meaning of Architecture
17(16)
The Origins of Architecture
17(1)
Managing Complexity
18(1)
Information Systems Architecture
19(4)
Enterprise Security Architecture
23(2)
Why Architectures Sometimes Fail to Deliver Benefit - and How to Avoid that Fate
25(4)
Security Architecture Needs a Holistic Approach
29(1)
To Summarise: What Does Architecture Mean?
30(3)
Security Architecture Model
33(12)
The SABSA® Model
33(4)
The Architect's View
37(1)
The Designer's View
38(1)
The Builder's View
38(1)
The Tradesman's View
39(1)
The Facilities Manager's View
40(1)
The Inspector's View
40(1)
The SABSA® Matrix
41(1)
Detailed SABSA® Matrix for the Operational Layer
42(1)
To Summarise: The Security Architecture Model
43(2)
Case Study
45(10)
Intergalactic Banking and Financial Services Inc
45(1)
Interviews at IBFS
46(8)
To Summarise: IBFS Inc
54(1)
A Systems Approach
55(24)
The Role of Systems Engineering
55(1)
Why a Systems Approach?
56(1)
What Does the Systems Approach Make You Do?
57(1)
The Need for Systems Engineering in Security Architectures
58(1)
Some Basic Concepts
59(2)
The Control System Concept
61(1)
Using the Systems Approach in Security Architecture
62(1)
Case Study
63(5)
Advanced Modelling Techniques
68(9)
To Summarise: A Systems Approach
77(2)
Measuring Return on Investment in Security Architecture
79(32)
What Is Meant by `Return on Investment'?
79(1)
Why Do You Need Metrics?
80(1)
The Security Management Dashboard
81(2)
The Balanced Scorecard Approach
83(4)
Business Drivers and Traceability
87(2)
Business Attributes and Metrics
89(9)
Setting Up a Metrics Framework
98(2)
Maturity Models Applied to Security Architecture
100(11)
Using This Book as a Practical Guide
111(26)
Using the SABSA® Model to Define a Development Process
112(1)
Strategy and Concept Phase
113(5)
Design Phase
118(13)
Implementation Phase
131(2)
Manage and Measure Phase
133(1)
To Summarise: How to Use This Book as a Practical Guide
134(3)
Managing the Security Architecture Programme
137(30)
Selling the Benefits of Security Architecture
139(9)
Getting Sponsorship and Budget
148(1)
Building the Team
149(3)
Getting Started: Fast Track™ Workshops
152(4)
Programme Planning and Management
156(1)
Collecting the Information You Need
156(5)
Getting Consensus on the Conceptual Architecture
161(1)
Architecture Governance and Compliance
162(1)
Architecture Maintenance
163(1)
Long-Term Confidence of Senior Management
164(1)
To Summarise: Managing the Security Architecture Programme
165(2)
Part 2: Strategy and Planning
167(118)
Strategy and Planning
168(1)
Contextual Security Architecture
168(1)
Conceptual Security Architecture
168(1)
Contextual Security Architecture
169(48)
Business Needs for Information Security
170(1)
Security As a Business Enabler
170(3)
Digital Business
173(5)
Operational Continuity and Stability
178(5)
Safety-Critical Dependencies
183(2)
Business Goals, Success Factors and Operational Risks
185(3)
Operational Risk Assessment
188(21)
Business Processes and Their Need for Security
209(2)
Organisation and Relationships Affecting Business Security Needs
211(1)
Location Dependence of Business Security Needs
212(1)
Time Dependency of Business Security Needs
213(1)
To Summarise: Contextual Security Architecture
214(3)
Conceptual Security Architecture
217(68)
Conceptual Thinking
218(1)
Business Attributes Profile
218(1)
Control Objectives
219(1)
Security Strategies and Architectural Layering
220(34)
Security Entity Model and Trust Framework
254(12)
Security Domain Model
266(9)
Security Lifetimes and Deadlines
275(8)
Assessing the Current State of your Security Architecture
283(1)
To Summarise: Conceptual Security Architecture
283(2)
Part 3: Design
285(122)
Design
286(1)
Logical Security Architecture
286(1)
Physical Security Architecture
286(1)
Component Security Architecture
287(2)
Logical Security Architecture
289(42)
Business Information Model
290(2)
Security Policies
292(2)
Security Services
294(15)
Application and System Security Services
309(4)
Security Management Services
313(7)
Entity Schema and Privilege Profiles
320(3)
Security Domain Definitions and Associations
323(5)
Security Processing Cycle
328(1)
Security Improvements Programme
329(1)
To Summarise: Logical Security Architecture
329(2)
Physical Security Architecture
331(46)
Business Data Model
332(9)
Security Rules, Practices and Procedures
341(1)
Security Mechanisms
342(19)
User and Application Security
361(3)
Platform and Network Infrastructure Security
364(10)
Control Structure Execution
374(1)
To Summarise: Physical Security Architecture
375(2)
Component Security Architecture
377(30)
Detailed Data Structures
377(4)
Security Standards
381(9)
Security Products and Tools
390(2)
Identities, Functions, Actions and ACLs
392(8)
Processes, Nodes, Addresses and Protocols
400(5)
Security Step-Timing and Sequencing
405(1)
To Summarise: Component Security Architecture
405(2)
Part 4: Operations
407(154)
Operations
407(1)
Operational Security Architecture
407(1)
Style of Part 4
407(2)
Security Policy Management
409(26)
The Meaning of Security Policy
409(1)
Structuring the Content of a Security Policy
410(1)
Policy Hierarchy and Architecture
411(2)
Corporate Security Policy
413(1)
Policy Principles
414(2)
Information Classification
416(1)
System Classification
417(2)
CA and RA Security Policies
419(1)
Application System Security Policies
420(2)
Platform Security Policies
422(1)
Network Security Policies
422(1)
Other Infrastructure Security Policies
423(1)
Security Organisation and Responsibilities
423(4)
Security Culture Development
427(2)
Outsourcing Strategy and Policy Management
429(4)
To Summarise
433(2)
Operational Risk Management
435(50)
Introduction to Operational Risk Management
435(4)
Regulatory Drivers for Operational Risk Management
439(7)
The Complexity of Operational Risk Management
446(5)
Approaches to Risk Assessment
451(4)
Managing Operational Risk
455(11)
Risk Mitigation
466(1)
Risk-Based Security Reviews
467(9)
Risk Financing
476(4)
The Risk Management Dashboard
480(2)
To Summarise
482(3)
Assurance Management
485(26)
Assurance of Operational Continuity
485(2)
Organisational Security Audits
487(5)
System Security Audits
492(2)
System Assurance Strategy
494(6)
Functional Testing
500(7)
Penetration Testing
507(3)
To Summarise
510(1)
Security Administration and Operations
511(50)
Introduction to Security Management and Administration
512(2)
Managing the People
514(3)
Managing Physical and Environmental Security
517(1)
Managing ICT Operations and Support
518(20)
Access Control Management
538(4)
Compliance Management
542(3)
Security-Specific Operations
545(1)
Managed Security Services
546(2)
Product Evaluation and Selection
548(2)
Business Continuity Management
550(8)
To Summarise
558(3)
Appendix A: List of Acronyms 561(8)
Index 569


Nicholas Sherwood