Project Description: The Project is about search to build a new methodology to understand to Information Security Architecture (ISA) as a complete independent architecture design stand by its own. You


There are many security architecture modeling such as (Angelo, 2001) which focus on data in term of classification, Regulatory, change control; others look at the security functionalities as architecture (Harris, 2016); another approach presented in (Killmeyer, 2006) which look at the security architecture from the point of security program, this approach covers Security Organization Infrastructure, Security Policies, Standards, and Procedures, Security Baselines and Risk Assessments, Security Awareness and Training Program, Compliance. Other work looking at the security policies as a architecture modeling (wikibooks.org, 2017); many work been done on Enterprise Information Security Architecture (EISA) and some define the EISA as “process of instituting a complete information security solution to the architecture of an enterprise, ensuring the security of business information at every point in the architecture” (bestpricecomputers.co.uk, 2017). Some work based their security architecture as an extra layer to the information architecture layers where the (Dournaee, 2011). This work does not go with security as a layer added to the information architecture. Information architecture (IA) defined as” is the structural design of shared information environments; the art and science of organizing and labelling websites, intranets, online communities and software to support usability and findability; and an emerging community of practice focused on bringing principles of design and architecture to the digital landscape (wikipedia.org, 2017), and we do not look at the information security architecture from a single domain as it implementing in EISA case. There was a work to establish an understanding of information security architecture in (Thorn, Christen, Gruber, Portman, & Ruf, 2008) was defined security architecture based dependency as the highest level which drives the security architecture is the Business Strategy & Requirements which drive IT Strategy & Governance which itself drive the IT reference architecture.

There are a separation between security architecture for a security program for an organization (which is primary focus for this work) and security architecture for a products or technology (Thorn, Christen, Gruber, Portman, & Ruf, 2008) such as security architecture for HP XP7 Device Manager Software, HP XP7 Tiered Storage Manager Software or IBM DB2 v12 for z/OS (Common-Criteria, 2017) or Java security architecture, GSS security architecture or CDMA) (Thorn, Christen, Gruber, Portman, & Ruf, 2008).

You and your team need to think and search to build a new methodology to understand to Information Security Architecture (ISA) as a complete independent architecture design stand by its own. You not eliminating any other work our methodology gives a new way to understand information security architecture

Bibliography

Angelo, S. M. (2001). Security Architecture Model Component. Retrieved from https://www.sans.org/reading-room/whitepapers/basics/security-architecture-model-component-overview-526

bestpricecomputers.co.uk. (2017). Enterprise Information Security Architecture (from BPC, Articles and Glossary). Retrieved 2017, from http://www.bestpricecomputers.co.uk/glossary/enterprise-information-security-architecture.htm

Common-Criteria. (2017). Certified Products. Retrieved 2017, from can be retrived from https://www.commoncriteriaportal.org/products/#AC

Dournaee, B. (2011). How about a Security Layer? Retrieved 2017, from Can be retrived from https://software.intel.com/en-us/blogs/2011/02/10/how-about-a-security-layer

Harris, S. (2016). Chapter 5 Security Models and Architecture. In CISSP Certification All-in-One Exam Guide (p. 186). McGraw-Hill Education; 7 edition (June 7, 2016).

Killmeyer, J. (2006). Information Security Architecture An Integrated Approach to Security in the Organization (Second Edition). FL 33487-2742: Auerbach - Taylor & Francis Group, LLC.

Thorn, A., Christen, T., Gruber, B., Portman, R., & Ruf, L. (2008, 9 2). information security society seussland: What is a Security Architecture?-v6.doc. Retrieved 1 1, 2018, from can be retrived from https://www.isss.ch/fileadmin/publ/agsa/Security_Architecture.pdf

wikibooks.org. (2017, November 22). Security Architecture and Design/Security Models. (wikibooks.org) Retrieved 2017, from https://en.wikibooks.org/wiki/Security_Architecture_and_Design/Security_Models

wikipedia.org. (2017, Dec). Information architecture. Retrieved 2017, from https://en.wikipedia.org/wiki/Information_architecture