Enterprise Information Security Architecture A Review of Frameworks, Methodology, and Case Studies

被引:2
|
作者
Oda, S. Michelle [1 ]
Fu, Huirong [1 ]
Zhu, Ye [2 ]
机构
[1] Oakland Univ, Dept CSE, Rochester, MI 48063 USA
[2] Cleveland State Univ, Dept Elect Commun Engn, Cleveland, OH 44115 USA
基金
美国国家科学基金会;
关键词
EISA; Security; Information; Case Study;
D O I
10.1109/ICCSIT.2009.5234695
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of enterprise architecture frameworks has become more common in the past five years within corporations as well as higher education. Only in the past two years has enterprise information security architecture been introduced as a subset of enterprise architecture aligning IT security with business strategy. This paper will review industry accepted enterprise information security architecture frameworks and methodology, its features, and how security is integrated within the features. As a case study, this paper will identify Oakland University's current security architecture, compare it to industry standards and best practices, and make recommendations to develop an ideal-world framework.
引用
收藏
页码:333 / +
页数:3
相关论文
共 50 条
  • [31] Enterprise Architecture, Enterprise Information Systems and Enterprise Integration: A Review Based on Systems Theory Perspective
    Gorkhali, Anjee
    Da Xu, Li
    JOURNAL OF INDUSTRIAL INTEGRATION AND MANAGEMENT-INNOVATION AND ENTREPRENEURSHIP, 2019, 4 (02):
  • [32] Guest editorial: Information security methodology and replication studies
    Wendzel, Steffen
    Caviglione, Luca
    Mileva, Aleksandra
    Lalande, Jean-Francois
    Mazurczyk, Wojciech
    IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 1 - 3
  • [34] A two-phase quantitative methodology for enterprise information security risk analysis
    Bhattacharjee, Jaya
    Sengupta, Anirban
    Mazumdar, Chandan
    Barik, Mridul Sankar
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (01): : 5 - 17
  • [35] Enterprise engineering, and security - Enterprise frameworks and architectures, and IA patterns
    Heaney, J
    Hybertson, DI
    Reedy, A
    Chapin, S
    Kirwan, M
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 293 - 294
  • [36] Methodology to Ensure Information Security in a Distributed Architecture for a Public Organization of Ecuador
    Toapanta Toapanta, Segundo Moises
    Mendoza Quimi, Felix Gustavo
    Ortiz Pazmino, Kevin Eduardo
    Maciel Arrellano, Rocio
    Mafla Gallegos, Luis Enrique
    FUZZY SYSTEMS AND DATA MINING V (FSDM 2019), 2019, 320 : 933 - 944
  • [37] Enterprise Information Systems Security: A Case Study in the Banking Sector
    Chaudhry, Peggy E.
    Chaudhry, Sohail S.
    Clark, Kevin D.
    Jones, Darryl S.
    ENTERPRISE INFORMATION SYSTEMS OF THE FUTURE, 2013, 139 : 206 - 214
  • [38] An effective Enterprise Architecture Implementation Methodology
    Nikpay, Fatemeh
    Ahmad, Rodina Binti
    Rouhani, Babak Darvish
    Mahrin, Mohd Naz'ri
    Shahaboddin Shamshirband
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2017, 15 (04) : 927 - 962
  • [39] An effective Enterprise Architecture Implementation Methodology
    Fatemeh Nikpay
    Rodina Binti Ahmad
    Babak Darvish Rouhani
    Mohd Naz’ri Mahrin
    Shahaboddin Shamshirband
    Information Systems and e-Business Management, 2017, 15 : 927 - 962
  • [40] Application of Cyclomatic Complexity in Enterprise Architecture Frameworks
    Stroud, Robert O.
    Ertas, Atila
    Mengel, Susan
    IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2166 - 2176