RIVER PUBLISHERS IS AN INTERNATIONAL PUBLISHER THAT PUBLISHES RESEARCH MONOGRAPHS, PROFESSIONAL BOOKS, HANDBOOKS, EDITED VOLUMES AND JOURNALS WITH FOCUS ON KEY RESEARCH AREAS WITHIN THE FIELDS OF SCIENCE, TECHNOLOGY AND MEDICINE (STM).

River Publishers Series in Security and Digital Forensics Series

Security Architecture – How & Why

Hardback
June 2022
9788770225847
More details
  • Publisher
    River Publishers
  • ISBN 9788770225847
  • Language English
  • Pages 160 pp.
  • Size 6" x 9"
  • Request Exam Copy
$115.00
Lib E-Book

Library E-Books

We have signed up with three aggregators who resell networkable e-book editions of our titles to academic libraries. These aggregators offer a variety of plans to libraries, such as simultaneous access by multiple library patrons, and access to portions of titles at a fraction of list price under what is commonly referred to as a “patron-driven demand” model.

These editions, priced at par with simultaneous hardcover editions of our titles, are not available direct from Stylus, but only from the following aggregators:

  • Ebook Library, a service of Ebooks Corporation Ltd. of Australia
  • ebrary, based in Palo Alto, a subsidiary of ProQuest
  • EBSCO / netLibrary, Alabama

as well as through the following wholesalers: The Yankee Book Peddler subsidiary of Baker & Taylor, Inc.

June 2022
9788770225830
More details
  • Publisher
    River Publishers
  • ISBN 9788770225830
  • Language English
  • Pages 160 pp.
  • Size 6" x 9"
$115.00

Security architecture or enterprise information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons, not least because having an architecture makes working with cyber security a much easier job, since we can now build on a, hopefully, solid foundation. Developing a security architecture is a daunting job, for almost anyone, and in a company that has not had a cyber security program implemented before, the job becomes even harder. The benefits of having a concrete cyber security architecture in place cannot be overstated! The challenge here is that a security architecture is not something that can stand alone, it absolutely must be aligned with the business in which is being implemented. This book emphasizes the importance, and the benefits, of having a security architecture in place. The book will be aligned with most of the sub frameworks in the general framework called SABSA, or Sherwood Applied Business Security Architecture. SABSA is comprised of several individual frameworks and there are several certifications that you can take in SABSA. Aside from getting a validation of your skills, SABSA as a framework focusses on aligning the Security Architecture with the business and its strategy. Each of the chapters in this book will be aligned with one or more of the components in SABSA, the components will be described along with the introduction to each of the chapters.

Why Security Architecture?
How Security Architecture?
Business Requirements Engineering
Risk and Opportunity Management
Policy Architecture
Security Services-Oriented Architecture
Governance
Security Domain
Security Service Management
Performance Management
Security Administration and Operations
Final Thoughts

Tom Madsen

Tom Madsen works as a Security Architect for ATEA in Denmark, specializing in security from Microsoft and Cisco. He is author of the book The Art of War for Computer Security (Springer).

Cyber Security; Security Architecture; Cyber Security Design; IT Architecture; Security management; SABSA