SlideShare uma empresa Scribd logo
1 de 6
Enterprise Security
Thinking
Defenders Defend – Attackers Attack
Enterprise Architecture
Specialist Interest Group
November 2015 Daljit Banger MSc FBCS
Background
The 3rd
Floor of a building houses valuable jewels.
Each Floor requires extensive protection measures
against vulnerabilities
Attackers
For each floor, you must have considered a
solution to get you through the layer of security.
Points are scored when you move up a floor and
you win by reaching 3rd
floor
Defenders
For each area you must have considered a solution
to protect from any attack.
Points are scored when you defend for any
situation.
Example
• Attack
• We will ‘ram raid’ the front door
• Defend
• We have installed metal bollards
Defender scores Points
DEFEND
Attack
? ?
Website : www.s-ea-t.com (Tools, Papers Downloads)
Blog : https://dalbanger.wordpress.com/
Email : dal@s-ea-t.com
Thank
You
Website : www.s-ea-t.com (Tools, Papers Downloads)
Blog : https://dalbanger.wordpress.com/
Email : dal@s-ea-t.com
Thank
You

Mais conteúdo relacionado

Mais de Daljit Banger

Mais de Daljit Banger (17)

Enterprise Architecture -A Recap : What, Why and Value
Enterprise Architecture  -A  Recap : What, Why and ValueEnterprise Architecture  -A  Recap : What, Why and Value
Enterprise Architecture -A Recap : What, Why and Value
 
Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Presentation to the AEA (June 23)
Presentation to the AEA (June 23)
 
Aligning The Business Model to Technology Landscapes Enterprise Systems Arch...
Aligning The Business Model to  Technology Landscapes Enterprise Systems Arch...Aligning The Business Model to  Technology Landscapes Enterprise Systems Arch...
Aligning The Business Model to Technology Landscapes Enterprise Systems Arch...
 
Architectural Engagement Through the Project Lifecycle
Architectural Engagement Through the Project LifecycleArchitectural Engagement Through the Project Lifecycle
Architectural Engagement Through the Project Lifecycle
 
Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...
Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...
Moving from the Business Strategy to Technology Strategy - A Top-Down Approac...
 
Developing a Strategy - A Reusable Pattern
Developing a Strategy - A Reusable PatternDeveloping a Strategy - A Reusable Pattern
Developing a Strategy - A Reusable Pattern
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction
 
Building a ICT Strategy with an Enterprise Architecture Mindset
Building a ICT Strategy  with an Enterprise Architecture MindsetBuilding a ICT Strategy  with an Enterprise Architecture Mindset
Building a ICT Strategy with an Enterprise Architecture Mindset
 
Life Cycle An informal discussion - Interaction & Control Points for Enterpr...
Life Cycle An informal discussion  - Interaction & Control Points for Enterpr...Life Cycle An informal discussion  - Interaction & Control Points for Enterpr...
Life Cycle An informal discussion - Interaction & Control Points for Enterpr...
 
Enterprise Architecture Workshop London - July 17th 2017
Enterprise Architecture Workshop London - July 17th 2017Enterprise Architecture Workshop London - July 17th 2017
Enterprise Architecture Workshop London - July 17th 2017
 
Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017Supporting material for my Webinar to the ACS - June2017
Supporting material for my Webinar to the ACS - June2017
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World
 
A Brief Introduction to Enterprise Architecture
A Brief Introduction to  Enterprise Architecture A Brief Introduction to  Enterprise Architecture
A Brief Introduction to Enterprise Architecture
 
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
 
ICT Strategy Development Slides
ICT Strategy Development SlidesICT Strategy Development Slides
ICT Strategy Development Slides
 
BCS EA Practitioners Day Intro Slides
BCS EA Practitioners Day Intro SlidesBCS EA Practitioners Day Intro Slides
BCS EA Practitioners Day Intro Slides
 
EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015) EA Consolidated Slides from Q1-Q2 (2015)
EA Consolidated Slides from Q1-Q2 (2015)
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

EA Secuity Thinking - Practical Exercise

  • 1. Enterprise Security Thinking Defenders Defend – Attackers Attack Enterprise Architecture Specialist Interest Group November 2015 Daljit Banger MSc FBCS
  • 2. Background The 3rd Floor of a building houses valuable jewels. Each Floor requires extensive protection measures against vulnerabilities Attackers For each floor, you must have considered a solution to get you through the layer of security. Points are scored when you move up a floor and you win by reaching 3rd floor Defenders For each area you must have considered a solution to protect from any attack. Points are scored when you defend for any situation.
  • 3. Example • Attack • We will ‘ram raid’ the front door • Defend • We have installed metal bollards Defender scores Points
  • 5. Website : www.s-ea-t.com (Tools, Papers Downloads) Blog : https://dalbanger.wordpress.com/ Email : dal@s-ea-t.com Thank You
  • 6. Website : www.s-ea-t.com (Tools, Papers Downloads) Blog : https://dalbanger.wordpress.com/ Email : dal@s-ea-t.com Thank You