000 02729cam a2200301 i 4500
999 _c382050
_d382050
003 APU
005 20190106013811.0
008 190105s2014 flua b 001 0 eng
010 _a 2013025176
020 _a9781439841594 (hbk.)
040 _aDLC
_beng
_cDLC
_dWAN
042 _apcc
050 0 0 _aQA76.9.D314
_bS34 2014
082 0 0 _a003
_223
100 1 _aScholz, James A.
_941282
245 1 0 _aEnterprise architecture and information assurance :
_bdeveloping a secure foundation /
_cJames A. Scholz.
260 _aBoca Raton, Florida
_bCRC Press/Taylor & Francis Group,
_c[2014]
300 _axxv, 240 p. :
_bill. ;
_c25 cm
500 _a"An Auerback Book"
504 _aIncludes bibliographical references and index.
520 _a"Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes.Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book's comprehensive coverage includes:Infrastructure security model componentsSystems security categorizationBusiness impact analysisRisk management and mitigationSecurity configuration managementContingency planningPhysical securityThe certification and accreditation processFacilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention"--
650 0 _aDatabase security.
_941283
650 0 _aInformation storage and retrieval systems.
_941284
650 0 _aManagement information systems.
_941285
650 0 _aData protection.
_941286
650 0 _aSystem design.
_941287
942 _2lcc
_cBook