Search Ebook here:


Enterprise Architecture and Information Assurance: Developing a Secure Foundation



 PDF

Author: James A. Scholz

Publisher: Auerbach Publications

Genres:

Publish Date: July 29, 2013

ISBN-10: 1439841594

Pages: 266

File Type: PDF

Language: English

read download

Book Preface

Within the “industry” most know, or have heard, that the requirements of the federal government and enforcement of information assurance have heightened in the past years. With the incorporation of the Gramm–Leach–Bliley Act (GLBA), the Sarbanes–Oxley Act (SOX), and the Clinger–Cohen Act, it seems that we have multiple requirements with a mixture of standards. To add to the confusion (as some may see it), we have Control Objectives for Information and related Technology (CoBit), Information Technology Infrastructure Library (ITIL), Microsoft Operations Framework (MOF), International Organization for Standardization (ISO), and other frameworks that our clients wish to incorporate into their infrastructures.

Business service management (BSM) holds many challenges; approaches to BSM, using each of the different platforms, are a little different than most organizations think and should remain that way by identifying the lowest common denominator, a piece of hardware or software, and applying that piece of equipment to the business model and its functions within the business. Asset management involves budgetary requirements under the ITIL, and it coexists with change, release, and configuration management, all of which require input into the management of an information technology (IT) system and cohesion with the configuration management database (CMDB) so the organization can get on track and meet the requirements of its governing headquarters.

The three operations required for effective IT management are as follows:
1. Portfolio management (PM)
2. Enterprise architecture (EA)
3. Capital planning and investment control (CPIC)

Contents

  • Chapter 1 Setting the Foundation
  • Chapter 2 Building the Enterprise Infrastructure
  • Chapter 3 Infrastructure Security Model
  • Chapter 4 Systems Security Categorization
  • Chapter 5 Business Impact Analysis
  • Chapter 6 Risk
  • Chapter 7 Secure Configuration Management
  • Chapter 8 Contingency Planning
  • Chapter 9 Cloud Computing
  • Chapter 10 Continuous Monitoring
  • Chapter 11 Physical Security
  • Chapter 12 Building Security
  • Chapter 13 Validating the Enterprise

Download Ebook Read Now File Type Upload Date
Download here Read Now PDF May 30, 2020

How to Read and Open File Type for PC ?