Enterprise Information Security Architecture A Review of Frameworks, Methodology, and Case Studies

被引:2
|
作者
Oda, S. Michelle [1 ]
Fu, Huirong [1 ]
Zhu, Ye [2 ]
机构
[1] Oakland Univ, Dept CSE, Rochester, MI 48063 USA
[2] Cleveland State Univ, Dept Elect Commun Engn, Cleveland, OH 44115 USA
基金
美国国家科学基金会;
关键词
EISA; Security; Information; Case Study;
D O I
10.1109/ICCSIT.2009.5234695
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of enterprise architecture frameworks has become more common in the past five years within corporations as well as higher education. Only in the past two years has enterprise information security architecture been introduced as a subset of enterprise architecture aligning IT security with business strategy. This paper will review industry accepted enterprise information security architecture frameworks and methodology, its features, and how security is integrated within the features. As a case study, this paper will identify Oakland University's current security architecture, compare it to industry standards and best practices, and make recommendations to develop an ideal-world framework.
引用
收藏
页码:333 / +
页数:3
相关论文
共 50 条
  • [1] Enterprise Security Architecture: Mythology or Methodology?
    McClintock, Michelle
    Falkner, Katrina
    Szabo, Claudia
    Yarom, Yuval
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS (ICEIS), VOL 2, 2020, : 679 - 689
  • [2] Enterprise information security, a review of architectures and frameworks from interoperability perspective
    Shariati, Marzieh
    Bahmani, Faezeh
    Shams, Fereidoon
    WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [3] Research on Architecture of Information Security in Enterprise Portal
    Wang, Wei
    Wang, Ying
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 420 - 424
  • [4] A REVIEW ON ENTERPRISE INFORMATION SECURITY AND STANDARDS
    Vural, Yilmaz
    Sagiroglu, Seref
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2008, 23 (02): : 507 - 522
  • [5] A Formal Methodology for Enterprise Information Security Risk Assessment
    Bhattacharjee, Jaya
    Sengupta, Anirban
    Mazumdar, Chandan
    2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 2013,
  • [6] Information Security Methodology, Replication Studies and Information Security Education
    Wendzel, Steffen
    Caviglione, Luca
    Checco, Alessandro
    Mileva, Aleksandra
    Lalande, Jean-Francois
    Mazurczyk, Wojciech
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2020, 26 (07) : 762 - 763
  • [7] PLANNING PRACTICE OF SECURITY ARCHITECTURE OF ENTERPRISE INFORMATION SYSTEMS
    Sun Jun-jun
    Feng mei
    Shi Guo-wei
    Zhang Bei
    Chen liang
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS ( ICIMCS 2011), VOL 1: INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2011, : 363 - 365
  • [8] Intelligent Enterprise Information Security Architecture based on Service Oriented Architecture
    Sun, Jianguang
    Chen, Yan
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 196 - 200
  • [9] Urban Enterprise: a review of Smart City frameworks from an Enterprise Architecture perspective
    Mamkaitis, Aleksas
    Bezbradica, Marija
    Helfert, Markus
    IEEE SECOND INTERNATIONAL SMART CITIES CONFERENCE (ISC2 2016), 2016, : 437 - 441
  • [10] Applying the dod goal security architecture as a methodology for the development of system and enterprise security architectures
    Lowman, T
    Mosier, D
    13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 183 - 193