Information Technology Reference
In-Depth Information
n
n
Honeypots
PKI
IA configuration settings
Operating system security
IA capabilities (aggregation of IA mechanisms)
Identity and privilege management
Protecting the information infrastructure
Local area networks
Cryptography
E-commerce safeguards
Development quality assurance
Mechanistic IA configurations are settings on or within devices that activate
or restrict certain capabilities of that device. For example, an operating system
configuration may activate the enforcement of strong passwords at system logon.
IA devices are dedicated to and perform a specific IA function; e.g., filter traffic
between the internal network and the Internet. Combinations of IA devices and IA
configurations support a variety of IA capabilities. These IA capabilities are not IA
services, but aggregations of IA functionality that satisfy a broader business objec-
tive. For the sake of brevity, the use of the term IA mechanism in the remainder
of this chapter may refer to all three of categories. The context of usage will clarify
which categories are relevant.
9.2 objecties
The objectives of this chapter include:
n
n
Distinguish IA mechanisms from IA services.
Relate IA mechanisms to the enterprise and IA 2 .
By the end of this chapter, you should be able to identify the difference between
an IA service and an IA mechanism, have some insight into the fit of IA mecha-
nisms in the architecture process, and have some insight into architectural con-
siderations for IA mechanisms. Moreover, you should have a better idea of the
organizational context of IA mechanisms.
9.3
iA 2 Context of iA Mechanisms
Figure 9.1 provides a context of IA mechanisms as part of the IA implementation
taxonomy. For simplicity, the alignment between business requirements and IA
services and mechanisms in Figure 9.1 occurs in a single step. The IA 2 LoS interim
Search WWH ::




Custom Search