• Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture
  Keith E. Anderson, Sr.

​​ Operational Architecture
​

The Operational Security Architecture is based on the view of “The Facilities Manager” and is the layer in which the accepted solution is operated and maintained by the responsible team(s)/individual(s) (Sherwood, J., Clark, A., Lynas, D., 2005). In this layer:
  • the assets (what) are defined by Assurance of Operational Continuity
  • the motivation (why) maps to the Operational Risk Management
  • the process (how) maps to the Security Service Management and Support
  • the people (who) are defined by the Application and user Management and Support requirements
  • the location (where) is defined by the Security responsibilities of Sites, Networks, and Platforms
  • the time (when) is defined by the Security Operations Schedule
Picture
Sherwood, J., et al. (2005). Enterprise Security Architecture: A Business-Driven Approach
Powered by Create your own unique website with customizable templates.
  • Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture