Детальная информация

Название: Practical Cybersecurity Architecture: A Guide to Creating and Implementing Robust Designs for Cybersecurity Architects.
Авторы: Moyle Ed.; Kelley Diana.
Выходные сведения: Birmingham: Packt Publishing, Limited, 2020
Коллекция: Электронные книги зарубежных издательств; Общая коллекция
Тематика: Computer security.; EBSCO eBooks
Тип документа: Другой
Тип файла: PDF
Язык: Английский
Права доступа: Доступ по паролю из сети Интернет (чтение, печать, копирование)
Ключ записи: on1202452703

Разрешенные действия:

pdf/2659430.pdf
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
epub/2659430.epub
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети

Группа: Анонимные пользователи

Сеть: Интернет

Права на использование объекта хранения

Место доступа Группа пользователей Действие
Локальная сеть ИБК СПбПУ Все Прочитать Печать Загрузить
Интернет Авторизованные пользователи СПбПУ Прочитать Печать Загрузить
-> Интернет Анонимные пользователи

Оглавление

  • Cover
  • Title page
  • Copyright and Credits
  • About Packt
  • Contributors
  • Table of Contents
  • Preface
  • Section 1: Security Architecture
  • Chapter 1: What is Cybersecurity Architecture?
    • Understanding the need for cybersecurity
    • What is cybersecurity architecture?
      • Network versus application security architecture
      • The role of the architect
      • Secure network architectures
      • Secure application architectures
    • Architecture, security standards, and frameworks
      • Architecture frameworks
      • Security guidance and standards
      • Security architecture frameworks
    • Architecture roles and processes
      • Roles
      • Process overview
      • Key tasks and milestones
    • Summary
  • Chapter 2: The Core of Solution Building
    • Terminology
    • Understanding solution building
    • Establishing the context for designs
    • Understanding goals
      • Identifying business goals
      • Dimensions of success
    • Structures and documents
      • Policies, procedures, and standards
      • Applying to architectural frameworks
    • Risk management and compliance
      • Risk management and appetite
      • Compliance
    • Establishing a guiding process
      • Understanding the business high-level goals
      • Understanding the technology goals
      • Drawing implied goals from existing documentation
      • Capturing (or defining) risk tolerances
      • Accounting for compliance requirements
    • Summary
  • Section 2: Building an Architecture
  • Chapter 3: Building an Architecture – Scope and Requirements
    • Understanding scope
      • What's in this chapter?
    • Setting architectural scope
      • Enterprise security architecture
      • Application security architecture
      • Defining scope boundaries
    • Scope – enterprise security
      • Existing capability
      • Risk management
      • Strategic planning
    • Scope – application security
      • The development and release process
      • Components, services, and design patterns
      • Team/organizational boundaries
      • Technology considerations
    • The process for setting scope
      • Consider high-level goals
      • Review contextual or other constraints
      • Set the initial scope
      • Validate and refine the initial scope
    • Summary
  • Chapter 4: Building an Architecture – Your Toolbox
    • Introduction to the architect's toolbox
    • Planning tools
      • Analytical tools
      • Informational tools
      • Modeling and design tools
    • Building blocks of secure design
      • Information security policies
      • Organization of information security
      • Human resources security
      • Asset management
      • Access control
      • Cryptography
      • Physical and environmental security
      • Operations security
      • Communications security
      • System acquisition, development, and maintenance
      • Supplier relationships
      • Information security incident management
      • Information security aspects of business continuity management
      • Compliance
    • Summary
  • Chapter 5: Building an Architecture – Developing Enterprise Blueprints
    • Requirements
    • Blueprints
    • Process
      • Why ADM?
    • The vision
      • Establishing architectural principles
      • Set Scope
      • Desired future (target) state
    • Creating a program
      • Discovery, identification, and validation
    • Documenting your high-level approach
      • Creating the roadmap
      • Architecture definition
      • Accompanying documentation
    • Summary
  • Chapter 6: Building an Architecture – Application Blueprints
    • Application design considerations
    • Life cycle models
      • Environment
    • Considerations for Waterfall projects
      • Requirements phase
      • Design phase
      • Implementation phase
      • Verification phase
      • Maintenance phase
    • Considerations for Agile projects
      • Conception phase
      • Inception phase
      • Construction phase
      • Release phase
      • Production phase
      • Retirement phase
    • Considerations for DevOps projects
      • Develop
      • Build
      • Unit test
      • Deploy (integrate)
      • Quality assurance
      • Production
      • Validate
    • Process for application security design
      • Systems security engineering
      • Architecture definition process
      • Architecture definition
      • Documentation
      • Validation
      • Modifying the SDLC and development processes
    • Summary
  • Section 3: Execution
  • Chapter 7: Execution – Applying Architecture Models
    • Process steps
    • Technical design
      • What specific product do we buy to do this?
      • Where do we place VPN concentrators or access points?
      • What client software do users require?
      • Creating technical implementation strategies
      • Assess constraints, synergies, and areas of opportunity
      • Validating against likely threat paths and creating a skeleton solution document
      • Validating implementation strategies
      • Finalizing the documentation
    • Operational integration
      • Changing context and evolution
      • Execution monitoring
    • Telemetry
      • Selecting strategic metrics
      • Selecting operational metrics
    • Summary
  • Chapter 8: Execution – Future-Proofing
    • Overcoming obstacles in project execution
      • Scope and requirements
      • Support failure and organizational issues
      • Resource shortfalls
      • Communication failure
      • Technical and environmental issues
    • Future-proofing designs
      • Establishing a 'virtuous cycle'
      • Monitoring our own environment for changes
      • Monitoring for external changes
    • Summary
  • Chapter 9: Putting It All Together
    • Virtuous cycles
      • Adapting architectural processes
    • Tips and tricks
      • Hone your ability to listen
      • Cultivate empathy
      • Have just enough process
      • When in doubt, over-communicate
      • Be ready to walk away
    • Gotchas
      • Be aware of (but don't play) politics
      • Don't shirk the preparation
      • Stay engaged until the end
      • Use a multi-disciplinary approach
    • Summary
  • Other Books You May Enjoy
  • Index

Статистика использования

pdf/2659430.pdf

stat Количество обращений: 0
За последние 30 дней: 0
Подробная статистика

epub/2659430.epub

stat Количество обращений: 0
За последние 30 дней: 0
Подробная статистика