An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security. Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives with an understanding of the requirements for a strategic plan for security within the organization.Executive and business unit management presentations were discussed in the previous section. ... to achieve bonus status, a business unit managera#39;s main concern may be excellent customer service resulting in increased sales. ... Clifford Stoll, a Berkeley astronomer, was the guest speaker at an Ernst aamp; Young, LLP, internal training program. ... Power Point presentations with colorful graphics, swooping screens, disappearing and reappearing pictures, and interesting sounds keepanbsp;...
|Title||:||Information Security Architecture|
|Publisher||:||CRC Press - 2000-09-25|