Question

which of the following frameworks focuses exclusively on security architecture A. NIST B. ISO C. ITIL...

which of the following frameworks focuses exclusively on security architecture

A. NIST

B. ISO

C. ITIL

D. SABSA

Homework Answers

Answer #1

Before answering the framework which is exclusive for Security Architecture we must be aware of the term Security Architecture.

Security Architecture

Security Architecture is nothing but the system or set of protocols that must be taken to protect any organization or IT infrastructure. It is part of the architecture of an enterprise only.

The Framework that focuses exclusively on security architecture is SABSA. that means option D is the correct answer It is the topmost Security architecture that should be applied. Let's discuss in detail about SABSA.

SABSA

1. SABSA stands for Sherwood Applied Business Security Architecture as it was developed by John Sherwood.

2. SABA is currently owned and ran by SABSA institute in the United Kingdom.

3. It is also used for Risk management frameworks, Information Assurance Architecture in IT organizations by being the part of IT organization architectures.

4. SABSA ensures that it is fulfilling all the needs, support, and security services to the organization for which they are doing security and also guarantees all the jobs given to them by the organization.

5. It analyzes the business requirements of the organizations and then creates a chain of traceability by its strategy and then handles the security and fulfills all demands and expectations of the organizations.

6. SABSA applies various different view architectures. They are

Business View Contextual Architecture
Architect's View Conceptual Architecture
Designer's View Logical Architecture
Constructor's View Physical Architecture
Technician's View Component Architecture
Manager's View Management Architecture

This layered diagram is given by the SABSA Institute.

7. The above architectures are also used in the matrix for implementing security architecture development for the organizations by SABSA.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
10- which of the following glands formed exclusively of serous cell? a. sublingual b. parotid c....
10- which of the following glands formed exclusively of serous cell? a. sublingual b. parotid c. submandibular d. pancrease
Which of the following is not an element of the ISO 9001 quality system? Select one:...
Which of the following is not an element of the ISO 9001 quality system? Select one: a. resource management b. documentation of a quality manual and procedures manual c. purchasing as one element of product realization d. design and development e. market research
Which of the following BEST describes a government –wide standard for security Assessment and Authorization (A&A),...
Which of the following BEST describes a government –wide standard for security Assessment and Authorization (A&A), and continuous monitoring for cloud products and services, which is mandatory for federal agencies and Cloud Services Providers (CSP)? Federal Risk and Authorization Management Program ( FedRAMP) National Institute of Standards and Technology (NIST) Federal Information Technology Acquisition Reform ACT (FITARA) National Cyber Security Program (NCSP)
5. The Scientist-Practitioner model A. Focuses on the objective assessment of data only B. Focuses on...
5. The Scientist-Practitioner model A. Focuses on the objective assessment of data only B. Focuses on the subjective experience of counseling only C. Provides direction for developing evidenced based treatment practices D. None of the above are true regarding the Scientist-Practitioner model 6. Studies which compare and contrast one cultural group with another are typically referred to as A. Cultural research B. Cross cultural research C. Culturally sensitive research D. Culturally relevant research
1) Which of the following focuses on these five? factors: competitors, potential entrants to the? market,...
1) Which of the following focuses on these five? factors: competitors, potential entrants to the? market, equivalent? products, bargaining power of? customers, and bargaining power of? suppliers? A. industry analysis B. balanced scorecard C. product differentiation analysis D. business process reengineering 2) The reciprocal allocation? method: A. fully incorporates interdepartmental relationships into the support?department cost allocations B. requires the ranking of support departments in the order that the allocation is to proceed C. allocates support?department costs to other support departments...
consider two iso quant curves , combination A on iso quant curve 1 has 6 units...
consider two iso quant curves , combination A on iso quant curve 1 has 6 units of capital (K) and 3 units of labor (L) , produce , output Q1 = 90 unit of x . combination B on iso quant curve 2 , has (6.k and 4.L) produces Q2 = 115 unit of x Which of the following may be deduced from the above information? Select one: a. given capital is fixed at 6 units, the average product of...
To ensure the information security of outsourced IT services, which of the following is the MOST...
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity? A. Review samples of service level reports from the service provider. B. Assess the level of security awareness of the service provider. C. Request that the service provider comply with information security policy. D. Review the security status of the service provider. Correct Answer: C?? or D???
Which accounting concept focuses on the size of amounts on the financial statements to determine their...
Which accounting concept focuses on the size of amounts on the financial statements to determine their importance? A-Conservatism B-Entity Concept C-Historical Cost D-Materiality
12. Consider a portfolio formed with debt security and equity security. Which of the following portfolio...
12. Consider a portfolio formed with debt security and equity security. Which of the following portfolio strategies would you follow when weight of debt security is less than zero and weight of equity security greater than one? Select one: a. Short sell equity and invest the proceed in debt b. Borrow more money and invest in equity c. Borrow at risk-free rate and invest in stock portfolio d. Short sell debt security and invest the proceed in equity security
Network architecture: Which of the following applications require best-effort , guaranteed , or predictable service, Give...
Network architecture: Which of the following applications require best-effort , guaranteed , or predictable service, Give reasons for your choices. a. High-quality (phone company-grade) voice calls b. Voice over IP (VoIP) c. File transfers via FTP d. Audio file downloads e. A commercial video-on-demand service f. User access to servers in a corporation
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT