본문 바로가기

리디 접속이 원활하지 않습니다.
강제 새로 고침(Ctrl + F5)이나 브라우저 캐시 삭제를 진행해주세요.
계속해서 문제가 발생한다면 리디 접속 테스트를 통해 원인을 파악하고 대응 방법을 안내드리겠습니다.
테스트 페이지로 이동하기

Practical Cybersecurity Architecture 상세페이지

Practical Cybersecurity Architecture

A guide to creating and implementing robust designs for cybersecurity architects

  • 관심 0
소장
전자책 정가
26,000원
판매가
26,000원
출간 정보
  • 2020.10.23 전자책 출간
듣기 기능
TTS(듣기) 지원
파일 정보
  • PDF
  • 418 쪽
  • 2.8MB
지원 환경
  • PC뷰어
  • PAPER
ISBN
9781838982195
UCI
-
Practical Cybersecurity Architecture

작품 정보

Plan and design robust security architectures to secure your organization's technology landscape and the applications you develop

▶Book Description
Cybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization.

With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs.

By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.

▶What You Will Learn
⦁Explore ways to create your own architectures and analyze those from others
⦁Understand strategies for creating architectures for environments and applications
⦁Discover approaches to documentation using repeatable approaches and tools
⦁Delve into communication techniques for designs, goals, and requirements
⦁Focus on implementation strategies for designs that help reduce risk
⦁Become well-versed with methods to apply architectural discipline to your organization

▶Key Features
⦁Leverage practical use cases to successfully architect complex security structures
⦁Learn risk assessment methodologies for the cloud, networks, and connected devices
⦁Understand cybersecurity architecture to implement effective solutions in medium-to-large enterprises

▶Who This Book Is For
If you are involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization, then this security book is for you. This includes security practitioners, technology governance practitioners, systems auditors, and software developers invested in keeping their organizations secure. If you're new to cybersecurity architecture, the book takes you through the process step by step; for those who already work in the field and have some experience, the book presents strategies and techniques that will help them develop their skills further.

▶What this book covers
⦁ Chapter 1, What is Cybersecurity Architecture?, provides an overview of cybersecurity architecture: what it is, why it's useful, the business value that it brings to the organization employing it, and the role of the cybersecurity architect within an organization. We highlight the history of cybersecurity architecture, important standards, frameworks, and approaches that the architect can draw upon, and lay out the fundamental requirements for the architect before they get started.

⦁ Chapter 2, The Core of Solution Building, helps the architect assess the important touchstones, contextual background, and goals of the organization. Architecture doesn't happen in a vacuum: the design must be reflective of the organization's needs, its business, and its mission. This chapter helps the architect understand that context the boundaries around what the organization considers important that will allow the architect to systematically and purposefully take action.

⦁ Chapter 3, Building an Architecture – Scope and Requirements, explains that with any project, the outcome must be dictated by what the organization needs. This section presents methods for discovering the scope within which the architect must design as well as the core information about requirements that their solution should address.

⦁ Chapter 4, Building an Architecture – Your Toolbox, is all about building out the toolbox that you will need as you approach the design process. Getting your tools ready ahead of time allows you to have them when you need them. Any project you undertake has a set of tools that will let you do the job successfully. With them, the job is easy – without them, there's nothing harder.

⦁ Chapter 5, Building an Architecture – Developing Enterprise Blueprints, outlines how to gather, document, and validate the necessary information that will allow you to create a high-level architectural definition. This lets you select a solution approach that is consistent with what the organization needs, is documented in such a way to protect the organization and streamline efforts, and ensures that technical implementation approaches are optimal.

⦁ Chapter 6, Building an Architecture – Application Blueprints, provides specific guidance on application security architecture efforts. In many ways, building a cybersecurity architecture for an application is similar to doing so for the organization in aggregate or for a network. However, because there are different audiences that we must present designs and approaches to (and that we must of necessity work collaboratively with), there are some elements of the process that are different.

⦁ Chapter 7, Execution – Applying Architecture Models, walks through how to implement your design concept technically, walking you through elements of execution and realization of the implementation. At this point, you will have created a high-level model, a design that meets the organization's needs. However, the best ideas on paper don't actually provide value until they are implemented.

⦁ Chapter 8, Execution – Future-Proofing, goes through the process of ensuring that a design (and subsequent implementation) that you've deployed stays meaningful over time. It discusses ways to ensure that you keep apprised of changes, that you monitor the effectiveness of your solution over time, and that you build in and adapt instrumentation (such as metrics) to keep things running smoothly after deployment.

⦁ Chapter 9, Putting It All Together, closes the book with strategies that you can use to improve your architecture skills, improve the processes you follow, and ensure that with each project you take on you optimize what you do. We present guidance about common issues that architects run into, how to avoid them, and advice for the architect drawn from the experiences of those in the field.

작가 소개

▶About the Author
- Ed Moyle
Ed Moyle is currently a Partner with SecurityCurve. In his 20 years in information security, Ed has held numerous positions including Director of Thought Leadership and Research for ISACA, Senior Security Strategist with Savvis, Senior Manager with CTG, and Vice President and Information Security Officer for Merrill Lynch Investment Managers. Ed is co-author of Cryptographic Libraries for Developers and a frequent contributor to the Information Security industry as author, public speaker, and analyst.

- Diana Kelley
Diana Kelley's security career spans over 30 years. She is Co-Founder and CTO of SecurityCurve and donates much of her time to volunteer work in the cybersecurity community, including serving on the ACM Ethics & Plagiarism Committee, as CTO and Board member at Sightline Security, Board member and Inclusion Working Group champion at WiCyS, and RSAC US Program Committee. She was the Cybersecurity Field CTO for Microsoft, Global Executive Security Advisor at IBM Security, GM at Symantec, VP at Burton Group (now Gartner), and a Manager at KPMG. She is a sought after keynote speaker, the co-author of the book Cryptographic Libraries for Developers, and one of Cybersecurity Ventures 100 Fascinating Females Fighting Cybercrime.

리뷰

0.0

구매자 별점
0명 평가

이 작품을 평가해 주세요!

건전한 리뷰 정착 및 양질의 리뷰를 위해 아래 해당하는 리뷰는 비공개 조치될 수 있음을 안내드립니다.
  1. 타인에게 불쾌감을 주는 욕설
  2. 비속어나 타인을 비방하는 내용
  3. 특정 종교, 민족, 계층을 비방하는 내용
  4. 해당 작품의 줄거리나 리디 서비스 이용과 관련이 없는 내용
  5. 의미를 알 수 없는 내용
  6. 광고 및 반복적인 글을 게시하여 서비스 품질을 떨어트리는 내용
  7. 저작권상 문제의 소지가 있는 내용
  8. 다른 리뷰에 대한 반박이나 논쟁을 유발하는 내용
* 결말을 예상할 수 있는 리뷰는 자제하여 주시기 바랍니다.
이 외에도 건전한 리뷰 문화 형성을 위한 운영 목적과 취지에 맞지 않는 내용은 담당자에 의해 리뷰가 비공개 처리가 될 수 있습니다.
아직 등록된 리뷰가 없습니다.
첫 번째 리뷰를 남겨주세요!
'구매자' 표시는 유료 작품 결제 후 다운로드하거나 리디셀렉트 작품을 다운로드 한 경우에만 표시됩니다.
무료 작품 (프로모션 등으로 무료로 전환된 작품 포함)
'구매자'로 표시되지 않습니다.
시리즈 내 무료 작품
'구매자'로 표시되지 않습니다. 하지만 같은 시리즈의 유료 작품을 결제한 뒤 리뷰를 수정하거나 재등록하면 '구매자'로 표시됩니다.
영구 삭제
작품을 영구 삭제해도 '구매자' 표시는 남아있습니다.
결제 취소
'구매자' 표시가 자동으로 사라집니다.

개발/프로그래밍 베스트더보기

  • 바이브 코딩 너머 개발자 생존법 (애디 오스마니, 강민혁)
  • AI 에이전트 엔지니어링 (마이클 알바다, 강민혁)
  • 요즘 바이브 코딩 클로드 코드 완벽 가이드 (최지호(코드팩토리))
  • 요즘 당근 AI 개발 (당근 팀)
  • 유니티를 활용한 RPG 게임 개발 (장세윤)
  • 그림으로 이해하는 도커와 쿠버네티스 (토쿠나가 코헤이 , 서수환)
  • AI 개발자가 되고 싶으세요? (배휘동, 홍석용)
  • 유리링의 실전 게임 시스템 기획 (정윤지(유리링))
  • MCP 실전 활용 & 서버 개발 핵심 가이드 (AI튜터랩)
  • 혼자 공부하는 컴퓨터 구조+운영체제 (강민철)
  • 개정판|혼자 공부하는 파이썬 (윤인성)
  • 요즘 개발자를 위한 시스템 설계 수업 (디렌드라 신하 , 테자스 초프라)
  • 깃허브 액션으로 구현하는 실전 CI/CD 설계와 운영 (노무라 도모키, 김완섭)
  • AI 에이전트 생태계 (이주환)
  • AI 에이전트 인 액션 (마이클 래넘, 류광)
  • 미래를 선점하라 : AI Agent와 함께라면 당신도 디지털 천재 (정승원(디지털 셰르파))
  • 개정판 | 밑바닥부터 시작하는 딥러닝 1 (사이토 고키, 이복연)
  • 막힘없이 PostgreSQL (임경석, 김철환)
  • 처음 시작하는 FastAPI (빌 루바노빅, 한용재)
  • 켄트 벡의 Tidy First? (켄트 벡, 안영회)

본문 끝 최상단으로 돌아가기

spinner
앱으로 연결해서 다운로드하시겠습니까?
닫기 버튼
대여한 작품은 다운로드 시점부터 대여가 시작됩니다.
앱으로 연결해서 보시겠습니까?
닫기 버튼
앱이 설치되어 있지 않으면 앱 다운로드로 자동 연결됩니다.
모바일 버전