Muutke küpsiste eelistusi

E-raamat: Information Assurance Architecture

  • Formaat: 624 pages
  • Ilmumisaeg: 24-Jun-2008
  • Kirjastus: Auerbach
  • Keel: eng
  • ISBN-13: 9781040167243
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 74,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 624 pages
  • Ilmumisaeg: 24-Jun-2008
  • Kirjastus: Auerbach
  • Keel: eng
  • ISBN-13: 9781040167243
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book provides the security industry with a formal information assurance architecture that complements enterprise architecture, systems engineering, and enterprise life-cycle management. The framework provided here offers a reference model for the consideration of security in many contexts and from many perspectives. The book is primarily for security engineers, security architects, security management, and other security personnel with an interest in identifying and addressing business risk. It is also useful for enterprise architects and systems architects who desire to integrate information assurance in their solutions. Business managers, project managers, and program managers will find the book useful for understanding information assurance in the context of the enterprise, including concepts of business need, business fit, and business justification for information assurance. Readers should have at least an intermediate knowledge of information technology and information assurance. Author information is not given. Annotation ©2008 Book News, Inc., Portland, OR (booknews.com)

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information Assurance Architecture, Keith D. Willett draws on his over 25 years of technical, security, and business experience to provide a framework for organizations to align information assurance with the enterprise and their overall mission.

The Tools to Protect Your Secrets from Exposure

This work provides the security industry with the know-how to create a formal information assurance architecture that complements an enterprise architecture, systems engineering, and the enterprise life cycle management (ELCM). Information Assurance Architecture consists of a framework, a process, and many supporting tools, templates and methodologies. The framework provides a reference model for the consideration of security in many contexts and from various perspectives; the process provides direction on how to apply that framework. Mr. Willett teaches readers how to identify and use the right tools for the right job. Furthermore, he demonstrates a disciplined approach in thinking about, planning, implementing and managing security, emphasizing that solid solutions can be made impenetrable when they are seamlessly integrated with the whole of an enterprise.

Understand the Enterprise Context

This book covers many information assurance subjects, including disaster recovery and firewalls. The objective is to present security services and security mechanisms in the context of information assurance architecture, and in an enterprise context of managing business risk. Anyone who utilizes the concepts taught in these pages will find them to be a valuable weapon in the arsenal of information protection.

Author's Note xxiii
Preface xxvii
Acknowledgments xxix
Section I IA2
Foundational Concepts for IA2
3(10)
Introduction
3(1)
Objective
4(1)
Foundations of Successful Architecture
5(6)
Architecture Terminology
6(1)
Enterprise Architecture and Systems Architecture
7(1)
Information Assurance: A Working Definition
8(1)
Mission Integrity versus Mission Entropy
9(1)
Melding Architecture and Information Assurance
9(1)
Systems Engineering
10(1)
Ontologies, Taxonomies, and Hierarchies
11(1)
Context and Perspective
11(1)
Identify, Enumerate, Articulate, and Address
11(1)
Summary and Conclusion
12(1)
The IA2 Framework
13(36)
Introduction
13(1)
Objectives
14(1)
IA2 Framework Details
15(3)
IA2 Architectural Drivers
18(3)
Business Drivers
18(2)
Technical Drivers
20(1)
IA2 Views
21(6)
People
21(2)
Policy
23(1)
Business Process
23(1)
Systems and Applications
24(1)
Information or Data
25(1)
Infrastructure
25(1)
Intraorganizational/Interoganizational
26(1)
IA Core Principles
27(2)
IA2 Principles
29(1)
IA Compliance Requirements
30(3)
Aligning IA with ELCM
33(5)
Concept
35(1)
Architect
35(1)
Engineer
35(1)
Acquire/Develop
35(1)
Implement
36(1)
Test
36(1)
Deploy
36(1)
Train
37(1)
Operate and Maintain
37(1)
Retire
37(1)
IA2 Compliance Verification
38(2)
IA Compliance Verification: A Sample Resource
38(1)
IA Operations Cycle
38(2)
IA2 Line of Sight
40(8)
Business Requirements
41(1)
[ IA] Architecture
42(1)
[ IA] Concept of Operations (CONOPS)
42(1)
[ IA] Portfolio Management (PfM)
42(1)
[ IA] Enterprise Systems Engineering
43(1)
[ IA] Design
43(1)
IA Services
44(1)
IA Mechanisms
44(1)
Vendor Selection
44(1)
Product Selection
45(1)
Implementation
45(1)
Operations and Maintenance
45(1)
IA2 Implementation Taxonomy
46(1)
IA2 Implementation Taxonomy Examples
46(2)
Conclusion and Commentary
48(1)
The IA2 Process
49(20)
Introduction
49(1)
Objectives
50(1)
The IA2 Process
50(17)
Articulate the Intent
51(1)
Define What the Solution Is and What It Is for
51(6)
Commentary
57(1)
Define the Environment
57(1)
Define Where the Solution Resides
57(1)
Environment as Seen from the IA2F Views
58(1)
Define the Scope
58(1)
Establish the Connection of the Solution to Strategic Goals
58(4)
Identify Inputs to the IA2 (Influences and Dependencies)
62(1)
Define What You Need to Know
62(1)
Discovery of As-Is (Current Orgabnizational Posture)
62(1)
Document the Current State
62(1)
Analysis
63(1)
Evaluate the Current State
63(1)
Identify Outputs
64(1)
Define Expected Outcomes
64(2)
Produce Outputs
66(1)
Produce Expected Outcomes
66(1)
Summary of IA2 Process Phases
67(1)
Conclusion and Commentary
67(2)
IA Quantification
69(22)
Introduction
69(1)
Objectives
70(1)
IA Quantification Framework (IAQF)
70(12)
IA Quantification: Stakeholder Perspective
71(1)
Audience Dependent
72(1)
Spam Blocking Example
72(1)
Strategic Interests
72(1)
Tactical Interests
73(1)
IA Quantification Terms
73(1)
IA Quantification: Asset/Target Perspective
74(1)
Financial (Currency Measurement)
74(1)
Development (Quality Measurement)
75(1)
Operational (Functional Parameter Measurement)
75(1)
Risk Management (Standard Risk Assessment Quantification)
75(1)
Attack Modeling
75(1)
Attack Modeling: An Example
76(1)
IA Quantification: Vulnerability
76(1)
IA Quantification: Threat Perspective
77(1)
Threat Probability Assessment (TPA)
77(4)
Deductive Approach
81(1)
Inductive Approach
82(1)
IA Quantification Process (IAQP)
82(5)
Narrative
83(1)
Parameters
83(1)
Quantification
84(1)
Discovery
85(1)
Analysis
86(1)
Report
86(1)
Feedback
86(1)
Conclusion and Commentary
87(4)
Section II Applied IA2
Organizational Views of IA
91(32)
Introduction
91(1)
Objectives
91(1)
The Message of IA to the Organization
92(2)
OCF Layer Relationships
94(1)
Governance and IA
94(12)
The Scope of Risk Governance, Management, and Assessment
97(2)
Guiding Risk Analysis with Threat Assessments
99(1)
Threat Probability Assessment
99(3)
Intelligent Resource Allocation
102(1)
Scope of Control
103(1)
E-Insurance
103(3)
Management and IA
106(7)
Employment Practices and Policies
108(1)
Pre-Employment
109(1)
Post-Employment
109(1)
Employee Monitoring
109(1)
Employee Evaluation
110(1)
Employee Termination
110(1)
Employee References
110(1)
Commentary
110(1)
Compliance Management Program
110(1)
Compliance Assessment Process
111(2)
Security Policies
113(1)
Builders and IA
113(1)
Operations and IA
114(1)
Users and IA
115(1)
Leadership and IA
115(6)
Personal Development
116(1)
Championing IA Outside the IA Environment
117(1)
Perception Management
117(1)
Accommodate the People Factor in IA Perception
117(1)
Ethical Decision Making
118(1)
The Ethics Message
118(1)
Vendor Relations
119(1)
Vendor Roles in the IA
119(1)
Vendor and Product Selection
119(1)
Problem Solving
120(1)
When Things Go Right
120(1)
When Things Go Awry
120(1)
Problem-Solving Influence on IA2F
121(1)
Commentary and Conclusion
121(2)
IA Business Drivers
123(18)
Introduction
123(1)
Objectives
124(1)
IA Requirements Engineering and Compliance Management
124(3)
IA Compliance Requirements Engineering
126(1)
IA Requirements Engineering and SE
127(9)
Business Process Decomposition
130(2)
Systemic Decomposition
132(2)
Domain Functional-Isolation Requirements Engineering
134(2)
Requirements Traceability
136(3)
Conclusion and Commentary
139(2)
IA Technical Drivers
141(12)
Introduction
141(1)
Objectives
141(1)
IA2 Technology Drivers
142(1)
Wireless Networks: An Example
143(4)
Definitions
143(1)
Security Concerns
144(1)
Policy
144(1)
Corporate Perspective
144(1)
Employee Perspective
145(1)
Practice
145(1)
IA2 Perspective
146(1)
Communications (Voice and Data): An Example
147(4)
Traditional Communications
147(1)
Emerging Communications
147(3)
Communications Influence on the IA2F
150(1)
Voice Communications
150(1)
Data Communications
150(1)
Convergence
150(1)
Conclusion and Commentary
151(2)
IA2: Context of IA Services
153(72)
Introduction
153(1)
Objectives
153(1)
IA Services
154(6)
Defense-in-Depth Perspective
154(3)
Exogenous View of Defense-in-Depth
157(1)
Endogenous View of Defense-in-Depth
158(1)
Physical
158(1)
Data State
159(1)
IA Operations Cycle
159(1)
IA Compliance Management Program
160(3)
Compliance Assessment
161(1)
Compliance Assessment: Subjective
161(1)
Compliance Assessment: Objective (Quantification)
162(1)
IA2 Perspective
163(1)
IA Assessment and Audit
163(5)
Audit Perspective
164(1)
Audit Process
165(1)
Audit Trigger Events
165(1)
Audit Notification
165(1)
Audit Responsibilities and Performance
166(1)
Reporting Results
166(1)
Organizational Feedback
166(1)
Sarbanes-Oxley: An Audit and Assessment Example
167(1)
Commentary
167(1)
Policy Management
168(8)
Security Policies
168(1)
Roles and Responsibilities
169(2)
Policy Drivers
171(1)
Commentary
171(1)
Policy Examples: E-Mail and Internet Appropriate Use
171(1)
Policy Details
172(1)
Policy Enforcement
173(1)
Using Social Psychology to Enforce Policies
173(1)
Audience Framing and Message Delivery
174(1)
Commentary
175(1)
Security Education, Training, and Awareness Management
176(4)
Security Education, Training, and Awareness (SETA) Policy
177(1)
SETA Architecture
178(1)
SETA Deployment
179(1)
Commentary
179(1)
Effectiveness Metrics (Tracking)
179(1)
Privacy
180(4)
Privacy Qualifiers
181(1)
Compliance Requirements
181(1)
External Privacy Qualifiers
181(1)
Internal Privacy Qualifiers
182(1)
Privacy IA2 Perspective
182(1)
Censorship
183(1)
Censorship IA2 Perspective
183(1)
Enterprise Operations Management: IA Context
184(4)
Network Management
184(2)
Network Management Services
186(1)
Network Management Mechanics
186(1)
Network Management and IA2
187(1)
Operations Security Management
187(1)
Computer Security Incident Response Team (CSIRT)
188(6)
Compliance Requirements
190(1)
CSIR Policy
190(2)
Practice
192(1)
Best Practices
192(1)
IA2 Perspective
192(2)
Vulnerability Management
194(3)
Vulnerability Assessments
194(1)
Deliverables
195(1)
Deliverable Format and Content
196(1)
Patch Management
196(1)
IA2 Perspective
197(1)
Digital Forensics
197(4)
Business Drivers
198(1)
Compliance Requirements
198(1)
Legislation
198(1)
RFP
198(1)
CONOPS
198(1)
Policy
199(1)
Policy
199(1)
Practice
199(1)
Best Practices
199(1)
IA2 Perspective
200(1)
Commentary
201(1)
Business Impact Assessment
201(5)
Compliance Requirements
202(1)
Policy
202(1)
Practice
202(2)
Best Practices
204(1)
BIA Deliverables
205(1)
IA2 Perspective
205(1)
Commentary
205(1)
Business Continuity Management
206(6)
Compliance Requirements
207(1)
Policy
207(1)
Practice
208(1)
Best Practices
209(1)
COOP: Determining Priorities
209(2)
IA2 Perspective
211(1)
Disaster Recovery Planning (DRP) and Disaster Recovery Management (DRM)
212(6)
Compliance Requirements
212(1)
Policy
213(1)
Practice
213(1)
Hot Site Solution: Dedicated
214(1)
Warm Site Solution: Shared (Warm)
214(1)
Cold Site Solution
214(1)
Development Environment
214(1)
Reciprocal Agreement
214(1)
Reserve System
215(1)
Commercial Service
215(1)
IA2 Perspective
216(1)
Commentary
217(1)
Backup and Recovery
218(5)
Business/Technical Drivers
219(1)
Compliance Requirements
219(1)
Policy
219(1)
Practice
219(1)
Strategy
220(1)
Tactics
221(1)
Best Practices
221(2)
IA2 Perspective
223(1)
Commentary
223(1)
Security Controls
223(1)
Conclusion and Commentary
224(1)
IA2: Context of IA Mechanisms
225(54)
Introductions
225(1)
Objectives
226(1)
IA2 Context of IA Mechanisms
226(3)
Applied IA2
229(1)
Organizational Context of IA Mechanisms
229(4)
Security Standards
233(4)
Homogeneous versus Heterogeneous IA Environments
233(1)
Applied IA2 Summary
234(1)
Standards in the IA2 Process: An Example
235(2)
Anti-Malware
237(5)
Applied IA2: Anti-Malware
237(1)
Anticipate
238(1)
Defend
238(1)
Monitor
238(1)
Respond
238(1)
Anti-Spam: An Anti-Malware Mechanism
239(1)
Policy
239(1)
Practice
240(1)
IA2 Perspective
240(2)
Firewalls
242(5)
Applied IA2: Firewalls
244(3)
Intrusion Detection Systems
247(3)
Applied IA2: IDS
248(1)
Policy
248(1)
Practice
249(1)
Best Practices
249(1)
IA2 Perspective
249(1)
Security Service and Mechanism Aggregation
250(1)
Honeypots
250(3)
Policy
251(1)
Best Practices
251(2)
IA2 Perspective
253(1)
Commentary
253(1)
Public Key Infrastructure (PKI) and Certificate Authority (CA)
253(3)
Applied IA2 Summary
254(1)
PKI Models (Trust Models)
254(2)
OS Security
256(4)
Applied IA2: OS Mechanistic IA Configurations
257(2)
Commentary
259(1)
Identity and Privilege Management
260(3)
Applied IA2: Identity and Privilege Management Capability
260(3)
Commentary
263(1)
Protecting the Information Infrastructure
263(2)
Applied IA2: Protecting the Information Infrastructure Capability
263(2)
Local Area Networks
265(3)
Applied IA2: LAN Protection Capability
265(3)
Cryptography
268(4)
Applied IA2: Cryptography Capability
269(1)
Business Requirements
269(2)
Cryptographic Services and Mechanisms: A Brief Example
271(1)
Cryptographic Influence on the IA2 F
271(1)
E-Commerce Safeguards
272(3)
Applied IA2: E-Commerce Safeguard Capability
273(1)
Health Care E-Commerce Example
274(1)
Development Quality Assurance
275(2)
Applied IA2: DQA Capability
276(1)
Commentary and Conclusion
277(2)
Aligning IA2 and EA Standards
279(24)
Introduction
279(1)
Objectives
280(1)
Federal Enterprise Architecture (FEA): An Introduction
280(9)
FEA Reference Models
282(1)
Performance Reference Model
282(1)
Business Reference Model
283(1)
Service Component Reference Model
283(1)
Technical Reference Model
284(1)
Data Reference Model
285(1)
IA2 Alignment with FEA RMs
285(1)
IA2 Alignment with PRM
285(1)
IA2 Alignment with BRM
286(1)
IA2 Alignment with SRM
286(1)
IA2 Alignment with TRM
287(1)
IA2 Alignment with DRM
287(1)
IA2 Alignment Deliverables
288(1)
FEA Security and Privacy Profile
288(1)
DoDAF Products Overview
289(1)
A List of EA Frameworks
289(1)
Enterprise Architecture Organizations
289(1)
Commentary
289(14)
Section III IA2 Enterprise Context
The Framework Perspective
303(12)
Introduction
303(1)
Frameworks as Decision Support Tools
304(3)
Decision Making
305(1)
Change
305(1)
Simple System
306(1)
Business versus Technical Perspectives
307(1)
Organizational Structure Context Framework
307(8)
Governance Frameworks
308(1)
Management Frameworks
308(1)
Builder Frameworks
309(1)
Operations Frameworks
310(1)
User Frameworks
310(1)
Leadership Frameworks
311(1)
How to Use Frameworks
312(1)
IA2 Perspective of the Frameworks
312(3)
The Frameworks
315(22)
Introduction
315(1)
Objectives
316(1)
Enterprise Context Framework
316(3)
Enterprise Perspective of IA Framework
319(2)
Innovation Framework
321(1)
EA Framework
322(1)
ROI Framework
323(1)
Awareness, Training, and Education (ATE) Framework
324(2)
Objective-Centered Framework
325(1)
SATE Framework
326(1)
SE Framework
326(1)
Enterprise Life Cycle Management (ELCM) Framework
327(3)
Concept
328(1)
Architect
328(1)
Engineer
328(1)
Acquire/Develop
328(1)
Implement
329(1)
Test
329(1)
Deploy
329(1)
Train
329(1)
Operate and Maintain
329(1)
Retire
329(1)
Security Framework
330(2)
Risk Management Framework
332(1)
Security Management Program Framework (SMP Framework)
332(1)
Reality Check Framework (RCF)
333(1)
Summary
334(1)
IA2 Framework Context
335(2)
IA Justification
337(32)
Introduction
337(1)
Objectives
337(1)
ROI Justification
337(3)
Revenue
338(1)
Increase Revenue
338(1)
Revenue Acceleration
339(1)
Sustain Revenue
339(1)
Cost
339(1)
Reduce Cost
339(1)
Avoid Cost
339(1)
IA Justification Based on Examining the Threat Space
340(5)
Threat Sources and Types
340(5)
IA2 Threat Taxonomy
345(1)
Expanding on the Adversary Threat Space
345(14)
Adversary Means
347(1)
Finances
348(1)
Equipment
348(1)
Knowledge
348(1)
Adversary Methods
349(1)
Computer System Penetration
349(1)
Programmatic Attacks
350(1)
Computer, Automated
350(1)
Computer, Interactive
351(1)
Adversary Motivations
351(1)
Computer Criminal Psychology
352(1)
Personal Motivations
353(1)
Industrial Motivations
353(1)
Political Motivations
353(1)
Information Warfare
354(1)
Asymmetrical Adversarialism
354(1)
Cyber-Terrorism
355(1)
Adversary Mission
356(1)
Targets
356(1)
Intellectual Property (IP)
356(1)
E-Commerce
357(1)
Physical Infrastructure
357(1)
Desired Results of Target Attack
357(1)
Knowledge
358(1)
Subvert
358(1)
Destroy
358(1)
Steal
359(1)
Render Useless
359(1)
Consequences
359(2)
Interpersonal Damage
360(1)
Intercorporate Damage
360(1)
International Damage
360(1)
Adversary Consequences
360(1)
IA Core Principles as IA Justification
361(1)
IA Operations Cycle as IA Justification
361(3)
Anticipate
362(1)
Defend
363(1)
Monitor
364(1)
Respond
364(1)
Empirical Evidence
364(1)
Surveys
364(1)
Recent Media Coverage
365(1)
Compliance Requirements
365(2)
Cyberspace Law
366(1)
Legal Obligations
366(1)
IA Justification Summary
367(2)
Future of IA and IA2
369(18)
Introduction
369(1)
Objectives
369(1)
Future Vision
370(10)
General Bounds
370(1)
Future Vision Framework
371(1)
Drivers
371(1)
Extension
371(2)
Extrapolation
373(1)
Pendulum
374(1)
Patterns
374(1)
Connections
374(1)
Chaos
375(1)
Increase in Decision-Making Complexity
376(1)
Systems Dynamics
376(2)
Constants and Variables
378(1)
Summary of IA Future Vision
378(2)
The Future of IA
380(3)
The Future of IA2
383(4)
Appendix A: IA2 Process Template 387(8)
Appendix B: Templates of IA2 F Views 395(10)
Appendix C: IA Quantification Process Template 405(10)
Appendix D: Security Management Program Framework 415(38)
Appendix E: Security Management Program Template Outline 453(8)
Appendix F: NIST Document Applicability Template 461(28)
Appendix G: IA Standards Best Practices References 489(6)
Appendix H: Root Cause Analysis Template 495(12)
Appendix I: Problem Assertion Document Template 507(18)
Appendix J: Privacy Management Program Outline 525(6)
Appendix K: E-Insurance 531(6)
Appendix L: Reading List 537(4)
Glossary 541(14)
References 555(4)
List of Figures 559(4)
List of Tables 563(8)
Index 571
Willett, Keith D.