-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Practical Cybersecurity Architecture
By :

In the previous chapter, we discussed the process of creating a high-level design document for a segment of the enterprise architecture. As you may recall, we employed several steps, many of which are elements of the architecture definition document described in the TOGAF architecture development method (ADM). While none of the actions we took were necessarily specific to TOGAF, we did employ their concepts and process in a way that we hope will allow you to glean existing information, should you need it from those resources.
In this chapter, we'll go through the same process but using a slightly different method for applications rather than the enterprise scope. Specifically, we'll go into the details of creating a baseline, high-level design framework for applications. You'll probably find the specific steps of this process analogous to the exercises we went through in the previous chapter. However...
Change the font size
Change margin width
Change background colour