Wednesday, June 18, 2014

3 Pillars of Information Security

Business Security Services
--driven by regulation concerns, partnerships etc
IT Security Services
--responsible for addressing how the business services are physically deployed.
Security Policy Management
--ensures business security services are managed in a consistent manner with IT. It links the business-related andIT-related security servies together.

From The Art of Enterprise Information Architecture.

Five pillars of Enterprise Information

From the Art of Enterprise Information Architecture.

They are these data domains:

Metadata
--data of data
Master data
--such as customer, product, invoice
Operation data
--such as order
Unstructured data
--such as scanned signed agreements, emails related
Analytical data
--derived by putting operation data into an analytical context. typically a data movement of operational data into dedicated analytical system such as DW.

SOA

SOA is an architectural style designed with the goal of achieving loose coupling among interacting services based on open standards and protocols.

A service is a unit of work done by a service provider to achieve desired end results for a service consumer. Both provider and consumer are roles played by organizational units and software agents on behalf of their owners. Fine-grained services can be composed into coarse-grained services. Business processes are executed by weaving a series of services