Reader small image

You're reading from  Cybersecurity Architect's Handbook

Product typeBook
Published inMar 2024
PublisherPackt
ISBN-139781803235844
Edition1st Edition
Right arrow
Author (1)
Lester Nichols
Lester Nichols
author image
Lester Nichols

Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master's of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.
Read more about Lester Nichols

Right arrow

Cybersecurity Foundation

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”

– Sun Tzu

Building upon the introduction provided in Chapter 1, this chapter delves deeper into the foundational aspects of cybersecurity architecture. It explores key areas that a cybersecurity architect must address and understand concerning the business and operational teams. While the content provided is introductory, it serves as a springboard for future discussions on the cybersecurity career path and the specialization options that are available to aspiring cybersecurity architects.

As quoted from Sun Tzu’s Art of War at the beginning of this chapter, it is crucial to comprehend your environment and the potential threats posed by both internal and external...

Access control

Adequate information and system security is a fundamental responsibility of management. Access control plays a vital role in nearly all applications that handle financial, privacy, safety, or defense-related data. It involves determining the permissible actions of authorized users and managing every attempt made by a user to access system resources. While some systems grant complete access after successful authentication, most systems require more sophisticated and complex control mechanisms. In addition to authentication, access control considers how authorizations are structured. This may involve aligning authorizations with the organization’s structure or basing them on the sensitivity of documents and the clearance level of users accessing them.

When organizations plan to implement an access control system, they need to consider three crucial abstractions: access control policies, models, and mechanisms.

Access control policies are overarching requirements...

Network and communication security

Network and communication security is a critical component of a robust cybersecurity architecture. It involves implementing measures to protect the confidentiality, integrity, and availability of data as it traverses networks. As a cybersecurity architect, it is essential to have a deep understanding of network and communication security and its implications for the business and operational teams. This chapter delves into the foundational aspects of network and communication security, providing detailed insights for effective implementation.

Network security fundamentals

The objectives of network security are centered around safeguarding networks and their resources. The primary goals include the following:

  • Unauthorized access prevention: Implementing measures to prevent unauthorized individuals or systems from gaining access to the network. This includes securing network perimeters and enforcing strong authentication mechanisms.
  • ...

Cryptography

In the realm of cybersecurity architecture, cryptography plays a pivotal role in upholding the utmost confidentiality, integrity, and authenticity of sensitive information. As a cybersecurity architect, understanding and effectively utilizing cryptographic techniques is essential for protecting sensitive data and maintaining secure communication channels. This chapter delves into the foundational aspects of cryptography, exploring its significance in the context of the business and operational teams.

Cryptography fundamentals

In the ever-evolving world of cybersecurity, cryptography stands as a formidable shield, safeguarding sensitive information from prying eyes and malicious threats. In this section, we’ll delve deep into the core principles of cryptography, exploring its vital role in ensuring confidentiality, integrity, and authenticity of data.

Key concepts

Cryptography encompasses various key concepts that form the basis of secure communication...

BCP/DRP

BCP/DRP is a critical process that organizations undertake to ensure their ability to continue operations and recover from disruptive incidents or disasters. It involves developing strategies, procedures, and policies to minimize the impact of potential disruptions and maintain business operations in adverse conditions. Let’s delve deeper into BCP/DRP.

BCP

BCP focuses on maintaining essential business functions during and after a disruptive event. The key elements of BCP include the following:

  • Business impact analysis (BIA): BIA identifies critical business processes, resources, and dependencies, and assesses the potential impact of disruptions. It helps prioritize recovery efforts and allocate resources effectively.
  • Risk assessment: Organizations conduct a risk assessment to identify potential threats and vulnerabilities that could impact business operations. This includes natural disasters, cyber attacks, system failures, supply chain disruptions...

Physical security

Physical security refers to the measures and practices that are implemented to protect physical assets, facilities, and people from unauthorized access, damage, theft, or harm. It encompasses a range of strategies, technologies, and procedures designed to create a secure and safe environment. This section will provide detailed information on physical security.

Access control

Access control systems ensure that only authorized individuals can enter specific areas or facilities. This includes using techniques such as key cards, biometric authentication (fingerprint or facial recognition), PIN codes, or security personnel to verify and grant access.

Physical access control measures may include gates, turnstiles, locks, and security guards stationed at entrances and sensitive areas.

Access control policies and procedures define who is granted access, when, and under what conditions. It also includes visitor management protocols to track and monitor visitors...

Summary

Continuing from the introduction, this chapter took a deeper dive into foundational areas that are crucial for cybersecurity architects to understand and address within the context of the business and operational teams. While the coverage remained introductory, it provided the necessary groundwork for discussions on the cybersecurity career path and specialization options.

By engaging in the labs and scenarios provided throughout this chapter, you’ve developed practical skills and knowledge that can serve as a foundation for further exploration and specialization within the cybersecurity field. This chapter equipped you, as an aspiring cybersecurity architect, with the necessary understanding of these key areas to progress in your career and make informed decisions regarding specialization.

Now that we’ve discussed and have practical application of foundational concepts, in the next chapter, we’ll discuss what the role of a cybersecurity architect...

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Cybersecurity Architect's Handbook
Published in: Mar 2024Publisher: PacktISBN-13: 9781803235844
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at AU $19.99/month. Cancel anytime

Author (1)

author image
Lester Nichols

Lester E. Nichols III currently resides in North Texas and is the Director Security Architecture/VP Cybersecurity Operations at JPMorgan Chase & Co. Previous experience includes the Director of IT Infrastructure and Security for a development company, SOC oversight manager/Senior Infrastructure Officer within DHS and previous experience in Local/Federal/DoD/financial sectors. Lester has post graduate education with a Master's of Science Degree in Information Assurance from Norwich University, the oldest private military school in the United States, and multiple industry certifications including CISSP and SANS certs, as well as others. Lester is also a contributing author to the Computer Security Handbook 5th-6th Editions by Wiley Press.
Read more about Lester Nichols