State whether the presented architecture meets those design principles and why

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter4: Information Security Policy
Section: Chapter Questions
Problem 2E
icon
Related questions
Question

Study the figure below that represents an Enterprise Security Architecture (ESA)
of a business

Evaluate this ESA against the basic design principles that a Security Architecture
must establish. State whether the presented architecture meets those design
principles and why.

What
do they do?
Files Encryption
SECURITY
Vulnerability Mngt & Policy Compliance Programme
Information
Architecture
Data
Integration
Business Architecture
Who
Does it?
Database Access Control
Data Masking
Database Audit
Database Encryption
Reverse Proxy
Applications
Antivirus, Anti-spam
Patch Ungt
Security
Which
information?
SECURITY
Security Incident & Event Mngt Security Reporting
Technology Architecture
Data
Technology
SSL certificates
PKC infrastructure
Collaboration
Privilege Management
Platforms
Where
Is it done?
Password Vault
Two Factor Authentication
Active Directory
Application
Technology
Identity & Access Ungt
Integration
Technology
IPSec, Client to Site VPN
Intrusion detection & prevention
Networks
Firewall Analyser
Forward Proxy
m
M
Transcribed Image Text:What do they do? Files Encryption SECURITY Vulnerability Mngt & Policy Compliance Programme Information Architecture Data Integration Business Architecture Who Does it? Database Access Control Data Masking Database Audit Database Encryption Reverse Proxy Applications Antivirus, Anti-spam Patch Ungt Security Which information? SECURITY Security Incident & Event Mngt Security Reporting Technology Architecture Data Technology SSL certificates PKC infrastructure Collaboration Privilege Management Platforms Where Is it done? Password Vault Two Factor Authentication Active Directory Application Technology Identity & Access Ungt Integration Technology IPSec, Client to Site VPN Intrusion detection & prevention Networks Firewall Analyser Forward Proxy m M
Expert Solution
steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Types of Database Architectures
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning