Enterprise Information Security Architecture A Review of Frameworks, Methodology, and Case Studies

被引:2
|
作者
Oda, S. Michelle [1 ]
Fu, Huirong [1 ]
Zhu, Ye [2 ]
机构
[1] Oakland Univ, Dept CSE, Rochester, MI 48063 USA
[2] Cleveland State Univ, Dept Elect Commun Engn, Cleveland, OH 44115 USA
基金
美国国家科学基金会;
关键词
EISA; Security; Information; Case Study;
D O I
10.1109/ICCSIT.2009.5234695
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of enterprise architecture frameworks has become more common in the past five years within corporations as well as higher education. Only in the past two years has enterprise information security architecture been introduced as a subset of enterprise architecture aligning IT security with business strategy. This paper will review industry accepted enterprise information security architecture frameworks and methodology, its features, and how security is integrated within the features. As a case study, this paper will identify Oakland University's current security architecture, compare it to industry standards and best practices, and make recommendations to develop an ideal-world framework.
引用
收藏
页码:333 / +
页数:3
相关论文
共 50 条
  • [21] Governance of Information Security Elements in Service-Oriented Enterprise Architecture
    Korhonen, Janne J.
    Yildiz, Mehmet
    Mykkanen, Atha
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 768 - +
  • [22] Improving Information Security Through Risk Management and Enterprise Architecture Integration
    Nather, Sarah
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 420 - 426
  • [23] An Analysis of Enterprise Architecture Maturity Frameworks
    Meyer, Martin
    Helfert, Markus
    O'Brien, Conor
    PERSPECTIVES IN BUSINESS INFORMATICS RESEARCH, 2011, 90 : 167 - +
  • [24] Causal Modelling in Enterprise Architecture Frameworks
    Gudas, Saulius
    INFORMATICA, 2021, 32 (02) : 247 - 281
  • [25] A comparison of frameworks for enterprise architecture modeling
    Martin, R
    Robertson, E
    CONCEPTUAL MODELING - ER 2003, PROCEEDINGS, 2003, 2813 : 562 - 564
  • [26] Fujitsu enterprise security architecture
    Shiozaki, Tetsuo
    Okuhara, Masayuki
    Yoshikawa, Nobuo
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2007, 43 (02): : 153 - 158
  • [27] Fujitsu enterprise security architecture
    Shiozaki, Tetsuo
    Okuhara, Masayuki
    Yoshikawa, Nobuo
    Fujitsu Scientific and Technical Journal, 2007, 43 (02): : 153 - 158
  • [28] A roadmap to the enterprise security architecture
    Kim, Young-Gab
    Kang, Seung-Seok
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2018, 123 : 47 - 48
  • [29] ENTERPRISE INFORMATION ARCHITECTURE
    PATTERSON, JH
    INFORMATION PROCESSING '94, VOL III: LINKAGE AND DEVELOPING COUNTRIES, 1994, 53 : 229 - 234
  • [30] Methodology of the Enterprise Architecture creating and the role of the Enterprise Architecture in rural development
    Rabova, Ivana
    AGRICULTURAL ECONOMICS-ZEMEDELSKA EKONOMIKA, 2010, 56 (07): : 334 - 340