2
09/08/13 IEEE Xplore - En t erprise information securit y archit ect ure a revie w of f ramew orks, methodolo gy , and case st udies ieee x plore .iee e. org/x pl/lo gin.jsp? tp =&arn um be r=523 46 95 &u rl=http %3A %2F%2Fiee ex plore .iee e. org%2Fx pls%2 Fab s_a ll.jsp%3 Farnu mb er%3 D52 34 69 5 1/ 2 For Institutional User s: Institutional Sign In Athens/Shibboleth Brow se Confer ence Publicati ons > Computer Science and Informat  ... Enterprise information security architecture a review of framewor ks, methodology, and case studies Full Text Sign-In or Purchase 3 Author(s) Tweet 0 0 Share Page(s): 333 - 337 E-ISBN : 978-1-4244-4520-2 Print ISBN: 978-1-4244-4519-6 INSPEC Accession Number: 10868278 Conference Location : Beijing Digital Object Identifier : 10.1109/ICCSIT.2009.5234695 The use of enterprise architecture frameworks has become more common in the past five years within corporations as well as higher  education. Only in the past two years has enterprise information security architecture been introduced as a subset of enterpri se architecture aligning IT security with business strategy. This paper will review industry accepted en terprise information security architecture frameworks and methodology, its features, and how  security is integrated within the features. As a case study, this paper will identify Oakland University's current security architecture, compare it to industry standards and best practices, and make recommendations to develop an ideal-world framework. Published in: Computer Sc ience and Information Technology, 2009. ICCSIT 2009. 2nd IEEE Internation al Conference on Date of Conference:  8-11 Aug. 2009 Sign In  | Create Account IEEE Account Change Username/Pa ssword Update Address Purchase Details Payment Options Order History Access Purchased Documents Profil e Informat ion Communicat ions Preferences Profession and Education Technical Interests Need Help? US & Canada: +1 800 678 4333 Worldwide: +1 732 981 0060 Contact & Support IEEE.org | IEEE  Xplore  Dig ital Libr ary | IEEE Standards | IEEE Spectrum | More Sites  Oda, S.M. ; Dept. of CSE, Oakland Univ., Rochester, MI, USA ; Huir ong Fu ; Ye Zhu Authors References Cited By Keywords Metri cs Si mi l ar  About IEEE  Xplore  | Contact  | Help  | Terms of Use  | Nondiscrimination Policy  | Site Map  | Privacy & Opting Out of Cookies Abstract 0 Me gust

IEEE Xplore - Enterprise Information Security Architecture a Review of Frameworks, Methodology, And Case Studies

Embed Size (px)

Citation preview

Page 1: IEEE Xplore - Enterprise Information Security Architecture a Review of Frameworks, Methodology, And Case Studies

8/11/2019 IEEE Xplore - Enterprise Information Security Architecture a Review of Frameworks, Methodology, And Case Studies

http://slidepdf.com/reader/full/ieee-xplore-enterprise-information-security-architecture-a-review-of-frameworks 1/2

09/08/13 IEEE Xplore - Enterprise information security architecture a review of frameworks, methodology, and case studies

ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5234695&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5234695

For Institutional Users:

Institutional Sign In

Athens/Shibboleth

Brow se Confer ence Publications > Computer Science and Informat ...

Enterprise information securityarchitecture a review of framewor ks,methodology, and case studies

Full TextSign-In or Purchase

3Author(s)

Tweet

0

0

Share

Page(s):

333 - 337

E-ISBN :

978-1-4244-4520-2

Print ISBN:

978-1-4244-4519-6

INSPEC Accession Number:

10868278

Conference Location :

Beijing

Digital Object Identifier :

10.1109/ICCSIT.2009.5234695

The use of enterprise architecture frameworks has become more common in the past five years within

corporations as well as higher  education. Only in the past two years has enterprise information security

architecture been introduced as a subset of enterprise architecture aligning IT security with business

strategy. This paper will review industry accepted enterprise information security architecture

frameworks and methodology, its features, and how security is integrated within the features. As a case

study, this paper will identify Oakland University's current security architecture, compare it to industry

standards and best practices, and make recommendations to develop an ideal-world framework.

Published in:

Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference

on

Date of Conference: 8-11 Aug. 2009

Sign In  | Create Account

IEEE Account

Change Username/Password

Update Address

Purchase Details

Payment Options

Order History

Access Purchased Documents

Profile Information

Communications Preferences

Profession and Education

Technical Interests

Need Help?

US & Canada: +1 800 678 4333

Worldwide: +1 732 981 0060

Contact & Support

IEEE.org | IEEE  Xplore  Digital Library | IEEE Standards | IEEE Spectrum | More Sites

 

Oda, S.M. ; Dept. of CSE, Oakland Univ., Rochester, MI, USA ; Huir ong Fu ; Ye Zhu

Authors References Cited By Keywords Metrics Similar  

About IEEE  Xplore  | Contact  | Help  | Terms of Use  | Nondiscrimination Policy  | Site Map  | Privacy & Opting Out of Cookies

Abstract

0

Me gust

Page 2: IEEE Xplore - Enterprise Information Security Architecture a Review of Frameworks, Methodology, And Case Studies

8/11/2019 IEEE Xplore - Enterprise Information Security Architecture a Review of Frameworks, Methodology, And Case Studies

http://slidepdf.com/reader/full/ieee-xplore-enterprise-information-security-architecture-a-review-of-frameworks 2/2

09/08/13 IEEE Xplore - Enterprise information security architecture a review of frameworks, methodology, and case studies

ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5234695&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5234695

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.

© Copyright 2013 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.