Practical Cybersecurity Architecture : A guide to creating and implementing robust designs for cybersecurity architects/ Ed Moyle, Diana Kelley.
Publisher: Birmingham, UK : Packt Publishing, 2020Copyright date: ©2020Description: v, 399 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 9781838989927 (paperback)
- 005.8 23
- HV6773 .C9174 2016
Item type | Current library | Shelving location | Call number | URL | Copy number | Status | Date due | Barcode | Course reserves | |
---|---|---|---|---|---|---|---|---|---|---|
BOOK GPS | FRANCIS LIGHT LIBRARY | Link to resource | Not for loan | |||||||
ACADEMIC | FRANCIS LIGHT LIBRARY | SHELVES 1 | 005.8 MOY (Browse shelf(Opens below)) | 1 | Available | 00000522 | ||||
ACADEMIC | FRANCIS LIGHT LIBRARY | SHELVES 1 | 005.8 MOY (Browse shelf(Opens below)) | 2 | Available | 00000523 |
Browsing FRANCIS LIGHT LIBRARY shelves, Shelving location: SHELVES 1 Close shelf browser (Hides shelf browser)
Includes index.
Section 1: Security architecture. 1. What is cybersecurity architecture? --
2. The core of solution building --
Section 2: Building an architecture. 3. Building an architecture : scope and requirements --
4. Building an architecture : your toolbox --
5. Building an architecture : developing enterprise blueprints --
6. Building an architecture : application blueprints --
Section 3: Execution. 7. Execution : applying architecture models --
8. Execution : future-proofing --
9. Putting it all together.
Cybersecurity architects work with others to develope a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through onging monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others. Provided by Publisher.
There are no comments on this title.