Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Security architecture=== Security architecture can be defined as the "practice of designing computer systems to achieve security goals."<ref name="NSCS security arch">{{Cite web |title=How the NCSC thinks about security architecture |url=https://www.ncsc.gov.uk/blog-post/how-ncsc-thinks-about-security-architecture |access-date=2023-12-18 |website=www.ncsc.gov.uk |language=en}}</ref> These goals have overlap with the principles of "security by design" explored above, including to "make initial compromise of the system difficult," and to "limit the impact of any compromise."<ref name="NSCS security arch" /> In practice, the role of a security architect would be to ensure the structure of a system reinforces the security of the system, and that new changes are safe and meet the security requirements of the organization.<ref>{{Cite web |title=Secure System Architecture and Design |url=https://www.ukcybersecuritycouncil.org.uk/careers-and-learning/cyber-career-framework/secure-system-architecture-design| date=2024| access-date=4 January 2024 |website=UK Cyber Security Council |language=en }}</ref><ref>{{Cite web |title=security architecture β Glossary {{!}} CSRC |url=https://csrc.nist.gov/glossary/term/security_architecture |access-date=2023-12-18 |website=csrc.nist.gov |language=EN-US}}</ref> Similarly, Techopedia defines security architecture as "a unified security design that addresses the necessities and potential risks involved in a certain scenario or environment. It also specifies when and where to apply security controls. The design process is generally reproducible." The key attributes of security architecture are:<ref>{{cite web |last1=Jannsen |first1=Cory |title=Security Architecture |url=http://www.techopedia.com/definition/72/security-architecture |url-status=live |archive-url=https://web.archive.org/web/20141003064643/http://www.techopedia.com/definition/72/security-architecture |archive-date=3 October 2014 |access-date=9 October 2014 |website=Techopedia |publisher=Janalta Interactive Inc}}</ref> * the relationship of different components and how they depend on each other. * determination of controls based on risk assessment, good practices, finances, and legal matters. * the standardization of controls. Practicing security architecture provides the right foundation to systematically address business, IT and security concerns in an organization.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)