• Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture
  Keith E. Anderson, Sr.

Physical Architecture
​

The Physical Security Architecture is based on the view of “The Builder” and is the layer in which the logical descriptions accumulated collectively from the layers above are turned into a technology model that can be used to construct a security solution (Sherwood, J., Clark, A., Lynas, D., 2005). In this layer:
  • the assets (what) are defined by the Business Data Model
  • the motivation (why) maps to the Security Rules, Practices, and Procedures
  • the process (how) maps to the Security Mechanisms
  • the people (who) are defined in the Users, Applications, and the User Interface
  • the location (where) is defined within the Platform and Network Infrastructure
  • the time (when) is defined by the Control Structure Execution
Picture
Powered by Create your own unique website with customizable templates.
  • Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture