Details

Title Practical Cybersecurity Architecture: A Guide to Creating and Implementing Robust Designs for Cybersecurity Architects.
Creators Moyle Ed. ; Kelley Diana.
Imprint Birmingham: Packt Publishing, Limited, 2020
Collection Электронные книги зарубежных издательств ; Общая коллекция
Subjects Computer security. ; EBSCO eBooks
Document type Other
File type PDF
Language English
Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
Record key on1202452703
Record create date 10/31/2020

Allowed Actions

pdf/2659430.pdf
Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network
epub/2659430.epub
Action 'Download' will be available if you login or access site from another network
Group Anonymous
Network Internet
Network User group Action
ILC SPbPU Local Network All
Read Print Download
Internet Authorized users SPbPU
Read Print Download
Internet Anonymous
  • Cover
  • Title page
  • Copyright and Credits
  • About Packt
  • Contributors
  • Table of Contents
  • Preface
  • Section 1: Security Architecture
  • Chapter 1: What is Cybersecurity Architecture?
    • Understanding the need for cybersecurity
    • What is cybersecurity architecture?
      • Network versus application security architecture
      • The role of the architect
      • Secure network architectures
      • Secure application architectures
    • Architecture, security standards, and frameworks
      • Architecture frameworks
      • Security guidance and standards
      • Security architecture frameworks
    • Architecture roles and processes
      • Roles
      • Process overview
      • Key tasks and milestones
    • Summary
  • Chapter 2: The Core of Solution Building
    • Terminology
    • Understanding solution building
    • Establishing the context for designs
    • Understanding goals
      • Identifying business goals
      • Dimensions of success
    • Structures and documents
      • Policies, procedures, and standards
      • Applying to architectural frameworks
    • Risk management and compliance
      • Risk management and appetite
      • Compliance
    • Establishing a guiding process
      • Understanding the business high-level goals
      • Understanding the technology goals
      • Drawing implied goals from existing documentation
      • Capturing (or defining) risk tolerances
      • Accounting for compliance requirements
    • Summary
  • Section 2: Building an Architecture
  • Chapter 3: Building an Architecture – Scope and Requirements
    • Understanding scope
      • What's in this chapter?
    • Setting architectural scope
      • Enterprise security architecture
      • Application security architecture
      • Defining scope boundaries
    • Scope – enterprise security
      • Existing capability
      • Risk management
      • Strategic planning
    • Scope – application security
      • The development and release process
      • Components, services, and design patterns
      • Team/organizational boundaries
      • Technology considerations
    • The process for setting scope
      • Consider high-level goals
      • Review contextual or other constraints
      • Set the initial scope
      • Validate and refine the initial scope
    • Summary
  • Chapter 4: Building an Architecture – Your Toolbox
    • Introduction to the architect's toolbox
    • Planning tools
      • Analytical tools
      • Informational tools
      • Modeling and design tools
    • Building blocks of secure design
      • Information security policies
      • Organization of information security
      • Human resources security
      • Asset management
      • Access control
      • Cryptography
      • Physical and environmental security
      • Operations security
      • Communications security
      • System acquisition, development, and maintenance
      • Supplier relationships
      • Information security incident management
      • Information security aspects of business continuity management
      • Compliance
    • Summary
  • Chapter 5: Building an Architecture – Developing Enterprise Blueprints
    • Requirements
    • Blueprints
    • Process
      • Why ADM?
    • The vision
      • Establishing architectural principles
      • Set Scope
      • Desired future (target) state
    • Creating a program
      • Discovery, identification, and validation
    • Documenting your high-level approach
      • Creating the roadmap
      • Architecture definition
      • Accompanying documentation
    • Summary
  • Chapter 6: Building an Architecture – Application Blueprints
    • Application design considerations
    • Life cycle models
      • Environment
    • Considerations for Waterfall projects
      • Requirements phase
      • Design phase
      • Implementation phase
      • Verification phase
      • Maintenance phase
    • Considerations for Agile projects
      • Conception phase
      • Inception phase
      • Construction phase
      • Release phase
      • Production phase
      • Retirement phase
    • Considerations for DevOps projects
      • Develop
      • Build
      • Unit test
      • Deploy (integrate)
      • Quality assurance
      • Production
      • Validate
    • Process for application security design
      • Systems security engineering
      • Architecture definition process
      • Architecture definition
      • Documentation
      • Validation
      • Modifying the SDLC and development processes
    • Summary
  • Section 3: Execution
  • Chapter 7: Execution – Applying Architecture Models
    • Process steps
    • Technical design
      • What specific product do we buy to do this?
      • Where do we place VPN concentrators or access points?
      • What client software do users require?
      • Creating technical implementation strategies
      • Assess constraints, synergies, and areas of opportunity
      • Validating against likely threat paths and creating a skeleton solution document
      • Validating implementation strategies
      • Finalizing the documentation
    • Operational integration
      • Changing context and evolution
      • Execution monitoring
    • Telemetry
      • Selecting strategic metrics
      • Selecting operational metrics
    • Summary
  • Chapter 8: Execution – Future-Proofing
    • Overcoming obstacles in project execution
      • Scope and requirements
      • Support failure and organizational issues
      • Resource shortfalls
      • Communication failure
      • Technical and environmental issues
    • Future-proofing designs
      • Establishing a 'virtuous cycle'
      • Monitoring our own environment for changes
      • Monitoring for external changes
    • Summary
  • Chapter 9: Putting It All Together
    • Virtuous cycles
      • Adapting architectural processes
    • Tips and tricks
      • Hone your ability to listen
      • Cultivate empathy
      • Have just enough process
      • When in doubt, over-communicate
      • Be ready to walk away
    • Gotchas
      • Be aware of (but don't play) politics
      • Don't shirk the preparation
      • Stay engaged until the end
      • Use a multi-disciplinary approach
    • Summary
  • Other Books You May Enjoy
  • Index
pdf/2659430.pdf

Access count: 0 
Last 30 days: 0

Detailed usage statistics

epub/2659430.epub

Access count: 0 
Last 30 days: 0

Detailed usage statistics