ABSTRACT

Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow. By studying this book, readers will acquire the skills necessary to develop a security architecture that serves specific needs. They will come to understand distinctions amongst engineering architecture, solutions architecture, and systems engineering. The book also shows how the Zachman and the Federal Enterprise Architecture models can be used together to achieve the goals of a business or government agency.

part |2 pages

SECTION: IA2

chapter 1|10 pages

Foundational Concepts for IA2

chapter 2|36 pages

The IA2 Framework

chapter 3|20 pages

The IA Introduction

chapter 4|20 pages

IA Quantification

part |2 pages

SECTION II: Applied IA2

chapter 5|32 pages

Organizational Views of IA

chapter 6|18 pages

IA Business Drivers

chapter 7|12 pages

IA Technical Drivers

chapter 8|72 pages

IA2: Context of IA Services

chapter 9|54 pages

IA2: Context of IA Mechanisms

chapter 10|22 pages

Aligning IA2 and EA Standards

part |2 pages

SECTION III: IA2 Enterprise

chapter 11|12 pages

The Framework Perspective

chapter 12|22 pages

The Frameworks

chapter 13|32 pages

IA Justification

chapter 14|18 pages

Future of IA and IA2 Introduction

chapter |8 pages

Appendix A: IA2 Process Template

chapter |10 pages

Appendix B: Templates of IA2 F Views

chapter |12 pages

Appendix H: Root Cause Analysis Template

chapter |6 pages

Appendix K: E-Insurance

chapter |4 pages

Appendix L: Reading List

chapter |14 pages

Glossary

chapter |4 pages

References

chapter |4 pages

List of Figures

chapter |6 pages

List of Tables