Sponsored by ComputerWeekly.com
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. Access >>>
Table of contents
- Overview of TOGAF and SABSA integration – why bolster TOGAF with security architecture and why use SABSA?
- Operational risk and its relevance to enterprise architecture – why incorporating the concept of operational risk is essential to modern enterprise architecture design.
- A central role for requirements management – how to perform requirements management using SABSA Business Attribute Profiling.
Premium Content for Free.
More Premium Content Accessible For Free
Social Media: IT Purchasers get social, marketers play catch up ?
IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.
Can national security and privacy co-exist?
In this week’s Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how ...
Cultivating IT Talent
While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses...