Cybersecurity Architect's Handbook : An End-To-end Guide to Implementing and Maintaining Robust Security Architecture.

Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implementing and maintaining robust security structures for the ever-evolving digital landscape Key Features Gain insights into the cybersecurity architect role and master key skills to...

Full description

Saved in:
Bibliographic Details
Main Author: Nichols, Lester
Format: Electronic eBook
Language:English
Published: Birmingham : Packt Publishing, Limited, 2024.
Subjects:
Online Access:CONNECT
Table of Contents:
  • Cover
  • Title Page
  • Copyright and Credit
  • Dedicated
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Foundations
  • Chapter 1: Introduction to Cybersecurity
  • What is cybersecurity?
  • Access control
  • Secure software development
  • Business continuity planning/disaster recovery (BCP/DR)
  • Cryptography
  • Information security governance/risk management
  • Legal/regulatory/compliance and investigations
  • Security operations
  • Physical and environmental security
  • Security architecture
  • Telecommunications/network security
  • Confidentiality/integrity/availability
  • Confidentiality
  • Integrity
  • Availability
  • Non-repudiation
  • Networking and operating systems
  • Networking fundamentals
  • Operating systems in cybersecurity
  • Cybersecurity considerations for networking and operating systems
  • Applications
  • Understanding applications
  • Importance of application security
  • Common application security challenges
  • Secure development life cycle
  • Governance, regulations, and compliance (GRC)
  • Governance
  • Regulations
  • Compliance
  • The role of GRC in organizations
  • Summary
  • Further reading
  • Chapter 2: Cybersecurity Foundation
  • Access control
  • Access control fundamentals
  • Aligning access control with the business
  • Collaboration with operational teams
  • Examples of how you can implement access control measures within an enterprise
  • Access control lab
  • Network and communication security
  • Network security fundamentals
  • Network security technologies
  • Securing network communications
  • Network access control
  • Collaboration with operational teams
  • Network security lab
  • Cryptography
  • Cryptography fundamentals
  • Cryptography in practice
  • Collaboration with business and operational teams
  • Cryptography lab
  • BCP/DRP
  • BCP
  • DRP
  • Integration with risk management and security
  • Compliance and regulatory considerations
  • BCP/DRP lab
  • Physical security
  • Access control
  • Surveillance systems
  • Intrusion detection and alarm systems
  • Physical barriers and deterrents
  • Security personnel and guards
  • Security policies and procedures
  • Incident response and emergency preparedness
  • Environmental controls
  • Inventory and asset management
  • Perimeter security
  • Collaboration with law enforcement and first responders
  • Physical security audits and assessments
  • Why implement physical security controls?
  • Physical security lab
  • Summary
  • Chapter 3: What Is a Cybersecurity Architect and What Are Their Responsibilities?
  • Understanding the role and environment
  • What is a cybersecurity architect?
  • Areas of focus
  • Threat landscape analysis and modeling
  • Security framework development
  • Network security
  • Application security
  • Cloud security
  • Mobile security
  • Vendor and third-party risk management
  • Emerging technologies evaluation
  • Other areas of focus
  • Cybersecurity architect as a part of the bigger team
  • Responsibilities