• Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture
  Keith E. Anderson, Sr.

Logical Architecture
​

The Logical Security Architecture is based on the view of “The Designer” and is an interpretation of the Architect’s conceptual vision turned into a logical structure that can be engineered to create a real solution (Sherwood, J., Clark, A., Lynas, D., 2005). In this layer:
  • the assets (what) are defined by the Business Information Model
  • the motivation (why) maps to the Security Policies
  • the process (how) maps to the Security Services
  • the people (who) are defined in the Entity Schema and Privilege Profiles
  • the location (where) is defined within the Security Domain Definitions and Associations
  • the time (when) is defined by the Security Processing Cycle
Picture
Powered by Create your own unique website with customizable templates.
  • Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture