Security Architecture and Design
AGENDA
- Implementation and operation of the controls necessary to insure availability, integrity, and confidentiality of information
- Know how to secure an enterprise architecture
- Relationships between various types of software
- Design principles of enterprise architecture
- Physical components of IT architecture
- Security models and architecture theory
- Evaluation methods and criteria
- Definitions of certification and accreditation
- Difference between trusted and nontrusted components
- Constitutes appropriate protection mechanisms
- Purpose of assurance evaluations
- Techniques used to provide system security