Security Architecture – How & Why - Tom Madsen

Security Architecture – How & Why

(Autor)

Buch | Hardcover
212 Seiten
2022
River Publishers (Verlag)
978-87-7022-584-7 (ISBN)
118,45 inkl. MwSt
Developing a security architecture is a daunting job for almost anyone, and in a company that has not had a cyber security program implemented before, the job becomes even harder. This book emphasizes the importance, and the benefits, of having a security architecture in place.
Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons, not least because having an architecture makes working with cyber security a much easier job, since we can now build on a, hopefully, solid foundation. Developing a security architecture is a daunting job for almost anyone, and in a company that has not had a cyber security program implemented before, the job becomes even harder. The benefits of having a concrete cyber security architecture in place cannot be overstated! The challenge here is that a security architecture is not something that can stand alone, it absolutely must be aligned with the business in which it is being implemented.

This book emphasizes the importance, and the benefits, of having a security architecture in place. The book will be aligned with most of the sub-frameworks in the general framework called SABSA, or Sherwood Applied Business Security Architecture. SABSA is comprised of several individual frameworks and there are several certifications that you can take in SABSA. Aside from getting a validation of your skills, SABSA as a framework focuses on aligning the Security Architecture with the business and its strategy. Each of the chapters in this book will be aligned with one or more of the components in SABSA, the components will be described along with the introduction to each of the chapters.

Tom Madsen works as a Cybersecurity SME for NNIT in Denmark, specializing in security & Compliance from Microsoft, Cisco & Oracle. Author of the book Sun Tzu – The Art of war for Cyber Security.

1. Why Security? 2. Why Architecture 3. Security Architecture Model 4. Contextual Security Architecture 5. Conceptual Security Architecture 6. Logical Security Architecture 7. Physical Security Architecture 8. Component Security Architecture 9. Security Policy Management 10. Security Architecture – Cisco & Microsoft

Erscheinungsdatum
Zusatzinfo 17 Tables, color; 2 Tables, black and white; 3 Line drawings, color; 4 Line drawings, black and white; 3 Illustrations, color; 4 Illustrations, black and white
Verlagsort Gistrup
Sprache englisch
Maße 156 x 234 mm
Gewicht 589 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
ISBN-10 87-7022-584-2 / 8770225842
ISBN-13 978-87-7022-584-7 / 9788770225847
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95