UMGC Security and Privacy Discussion
Description
pls respond to students
Security and privacy play an important role within an EA program and its architecture.
The research, development, organization, and implementation of policies and tactics to accomplish broad business goals by making utilization of IT technology and protection is known as an enterprise architecture (EA). As per this idea of enterprise architecture, a business may develop IT projects and put policies into place that would help it achieve its goals. Additionally, EA assists a company in staying current with changes in its industry, such as new, disruptive technology and approaches to the efficient and safe use of IT tools (Fortinet, n.d.)
An enterprise architect is another name for enterprise architecture (EAP). Plans that result from an enterprise architecture approach enable the company to scale up or down in accordance with its objectives while maintaining security and effectiveness. The truth is that ensuring an organization has a strong security posture involves many varied factors, but it’s crucial to know what we mean by security. Even though the scope may be greater in some organizations, we are mostly talking about information security (Fortinet, n.d.).
A company’s risk management strategy must include security as they are essential to the success of an EA program. As a result, enterprise architects collaborate with security and privacy architects to develop artefacts that oversee the EA’s suggested controls. A two-way information exchange is required since the security and privacy architects are also creating knowledge that the EA might find useful (Michali, 2022).
Before conducting a task or business process, security and protection requirements must be established and assigned. To protect the confidentiality, integrity, and availability of data used, processed, and stored in information technology systems, data security controls and safeguards have been built (Michali, 2022).
Once an organization’s enterprise information security architecture program is organized and effectively employed, employers and clients are better secured. The first line of defense is frequently preventative measures, which aim to stop an incident or breach. The confidentiality architect makes sure that corporate design, including reference models, segment architectures, and solution architectures, effectively addresses stakeholder security needs and corresponding technical specifications (Michali, 2022).
A complete set of controls that permeate all architectural domains and are a vital component of an organization’s strategy for risk management is the finest way, to sum up, the function of security and privacy inside an EA program. This can be visualized as a vertical thread that runs across all the architectural levels. Since security and privacy are most successful if they are integrated into the enterprise’s strategic initiatives, business services, information flows, applications, and technological infrastructure, the thread metaphor is employed (instead of a distinct dedicated level).
Based on your research, how are security and/or privacy handled by one of the frameworks?
Technology from many eras (independent machines, mainframe systems, client-server, distributed computing) is frequently merged in a single organization because of the evolution of IT management. The end effect is that a corporation finds it extremely challenging to have a comprehensive strategy for controlling all its information systems or an appropriate “map” of each of its information systems (Electronic intrusion, n.d).
Companies are rushing to comply with information security and privacy rules in the wake of the Sarbanes-Oxley act. Enterprise Architecture frameworks have indeed been utilized to address these difficulties and provide a shrink-wrapped approach to accomplishing them. There are several such systems, but two of them are among the more popular ones (the Zachman Framework and the Federal Enterprise Architecture Framework) (Electronic intrusion, n.d).
A lack of centralized coordination is thought to weaken system security. It is believed that confusion about everything would lead to numerous security leaks and increased vulnerability because each system has its techniques for handling security, which is inconsistent (Electronic intrusion, n.d).
The whole first three grids of the Zachman matrix are function, network, people, motive, time, and information useful when discussing security and privacy in design. This matrix offers details on the data assets that the organization is in control of, their location, their use, when they are utilized, by whom, and for what purposes. Additionally, the matrix’s first five rows offer a unique perspective on the security dilemma. The Ballpark view provides a detailed explanation of the interactions and relationships in this situation. The system’s functional capabilities are described from the architect’s view. A detailed description of the methods and architecture for monitoring the system’s performance is provided by the builder’s view, which follows the designer’s view in establishing the security architectural design ( et al., 2011).
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."