Enterprise architecture and information assurance : developing a secure foundation / James A. Scholz.
Material type: TextPublication details: Boca Raton, Florida CRC Press/Taylor & Francis Group, [2014]Description: xxv, 240 p. : ill. ; 25 cmISBN: 9781439841594 (hbk.)Subject(s): Database security | Information storage and retrieval systems | Management information systems | Data protection | System designDDC classification: 003 LOC classification: QA76.9.D314 | S34 2014Summary: "Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes.Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book's comprehensive coverage includes:Infrastructure security model componentsSystems security categorizationBusiness impact analysisRisk management and mitigationSecurity configuration managementContingency planningPhysical securityThe certification and accreditation processFacilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention"--Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
General Circulation | APU Library Open Shelf | Book | QA76.9.D314 S34 2014 c.1 (Browse shelf (Opens below)) | 1 | Available | 00012329 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
QA76.9.D314 .E58 2021 c.1 Enterprise Information Security Architecture : A complete guide 2021 edition Practical tools for self-assessment / | QA76.9.D314 K45 2005 c.1 Cryptography in the database : | QA76.9.D314 N49 2010 c.1 Computer security : | QA76.9.D314 S34 2014 c.1 Enterprise architecture and information assurance : | QA76.9.D314 T44 2001 c.1 Oracle security handbook / | QA76.9.D32 B53 2010 c.1 Patterns of data modeling / | QA76.9.D32 K98 2010 c.1 Expert Oracle database architecture : |
"An Auerback Book"
Includes bibliographical references and index.
"Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes.Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book's comprehensive coverage includes:Infrastructure security model componentsSystems security categorizationBusiness impact analysisRisk management and mitigationSecurity configuration managementContingency planningPhysical securityThe certification and accreditation processFacilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention"--
There are no comments on this title.