Cybersecurity Architect's Handbook An End-To-end Guide to Implementing and Maintaining Robust Security Architecture

Cybersecurity Architect's Handbook is an all-encompassing guide, introducing the essential skills for aspiring CSAs, outlining a path for cybersecurity engineers and newcomers to evolve into architects, and sharing best practices to enhance the skills of existing CSAs. Following a brief introdu...

Full description

Bibliographic Details
Main Author: Nichols, Lester
Format: eBook
Language:English
Published: Birmingham Packt Publishing, Limited 2024
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 06776nmm a2200373 u 4500
001 EB002207425
003 EBX01000000000000001344626
005 00000000000000.0
007 cr|||||||||||||||||||||
008 240503 ||| eng
020 |a 1803239891 
050 4 |a QA76.9.A25 
100 1 |a Nichols, Lester 
245 0 0 |a Cybersecurity Architect's Handbook  |h [electronic resource]  |b An End-To-end Guide to Implementing and Maintaining Robust Security Architecture 
260 |a Birmingham  |b Packt Publishing, Limited  |c 2024 
300 |a 494 p. 
505 0 |a Access control -- Access control fundamentals -- Aligning access control with the business -- Collaboration with operational teams -- Examples of how you can implement access control measures within an enterprise -- Access control lab -- Network and communication security -- Network security fundamentals -- Network security technologies -- Securing network communications -- Network access control -- Collaboration with operational teams -- Network security lab -- Cryptography -- Cryptography fundamentals -- Cryptography in practice -- Collaboration with business and operational teams 
505 0 |a Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Foundations -- Chapter 1: Introduction to Cybersecurity -- What is cybersecurity? -- Access control -- Secure software development -- Business continuity planning/disaster recovery (BCP/DR) -- Cryptography -- Information security governance/risk management -- Legal/regulatory/compliance and investigations -- Security operations -- Physical and environmental security -- Security architecture -- Telecommunications/network security -- Confidentiality/integrity/availability 
505 0 |a Confidentiality -- Integrity -- Availability -- Non-repudiation -- Networking and operating systems -- Networking fundamentals -- Operating systems in cybersecurity -- Cybersecurity considerations for networking and operating systems -- Applications -- Understanding applications -- Importance of application security -- Common application security challenges -- Secure development life cycle -- Governance, regulations, and compliance (GRC) -- Governance -- Regulations -- Compliance -- The role of GRC in organizations -- Summary -- Further reading -- Chapter 2: Cybersecurity Foundation 
505 0 |a Why implement physical security controls? -- Physical security lab -- Summary -- Chapter 3: What Is a Cybersecurity Architect and What Are Their Responsibilities? -- Understanding the role and environment -- What is a cybersecurity architect? -- Areas of focus -- Threat landscape analysis and modeling -- Security framework development -- Network security -- Application security -- Cloud security -- Mobile security -- Vendor and third-party risk management -- Emerging technologies evaluation -- Other areas of focus -- Cybersecurity architect as a part of the bigger team -- Responsibilities 
505 0 |a Cryptography lab -- BCP/DRP -- BCP -- DRP -- Integration with risk management and security -- Compliance and regulatory considerations -- BCP/DRP lab -- Physical security -- Access control -- Surveillance systems -- Intrusion detection and alarm systems -- Physical barriers and deterrents -- Security personnel and guards -- Security policies and procedures -- Incident response and emergency preparedness -- Environmental controls -- Inventory and asset management -- Perimeter security -- Collaboration with law enforcement and first responders -- Physical security audits and assessments 
653 |a Ordinateurs / Architecture 
653 |a Computer architecture / http://id.loc.gov/authorities/subjects/sh85029479 
653 |a Sécurité informatique 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Description based upon print version of record. - Scope of vision 
776 |z 9781803239897 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781803235844/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Cybersecurity Architect's Handbook is an all-encompassing guide, introducing the essential skills for aspiring CSAs, outlining a path for cybersecurity engineers and newcomers to evolve into architects, and sharing best practices to enhance the skills of existing CSAs. Following a brief introduction to the role and foundational concepts, this book will help you understand the day-to-day challenges faced by CSAs, supported by practical examples. You'll gain insights into assessing and improving your organization's security posture, concerning system, hardware, and software security. You'll also get to grips with setting user and system policies and protocols through effective monitoring and enforcement, along with understanding countermeasures that protect the system from unauthorized access attempts. To prepare you for the road ahead and augment your existing skills, the book provides invaluable tips and practices that will contribute to your success as a CSA.  
520 |a By the end of this book, you'll be well-equipped to take up the CSA role and execute robust security solutions. What you will learn Get to grips with the foundational concepts and basics of cybersecurity Understand cybersecurity architecture principles through scenario-based examples Navigate the certification landscape and understand key considerations for getting certified Implement zero-trust authentication with practical examples and best practices Find out how to choose commercial and open source tools Address architecture challenges, focusing on mitigating threats and organizational governance Who this book is for This book is for cybersecurity professionals looking to transition into a cybersecurity architect role. Solution architects interested in understanding the scope of the role and the necessary skills for success will also find this book useful 
520 |a Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in implementing and maintaining robust security structures for the ever-evolving digital landscape Key Features Gain insights into the cybersecurity architect role and master key skills to excel in it Acquire a diverse skill set for becoming a cybersecurity architect through up-to-date, practical examples Discover valuable tips and best practices to launch your career in cybersecurity Purchase of the print or Kindle book includes a free PDF eBook Book Description Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it requires both upskilling and a fundamental shift in the way you view cybersecurity altogether.