Wireless Security Architecture by Jennifer Minella

Wireless Security Architecture by Jennifer Minella

Author:Jennifer Minella [Jennifer (JJ) Minella]
Language: eng
Format: epub
ISBN: 9781119883074
Publisher: Wiley
Published: 2022-04-12T00:00:00+00:00


It starts with the define phase to scope the project and collect requirements, followed by a characterize phase to refine and map requirements to the discrete design elements (such as client networks, infrastructure hardening) against known security requirements documented in policies or compliance mandates. Together, define and characterize compose the discovery tasks and serve as the inputs for the architect stage.

The output of the planning exercise was described through three additional phases—design, optimize, and validate, which comprise the architect and iterate stages.

The optimize and validate phases are entangled and non-linear, where optimize affords the architect the opportunity to further refine the design plans based on changing or additional inputs, while the validate phase serves as the opportunity to compare the design against the original requirements and validate the objectives are being met.

Instead of presenting a canned approach to planning, the content here continued with actionable templates and guidance for making decisions based on inputs and how those correlate to the outputs.

Sample templates, forms, and tables were provided along with representative data to illustrate the use of the templates.

Finally, the chapter concluded with pointed guidance written for an executive audience who wields the power to help make secure wireless more attainable.

REFERENCE Find more detailed recommendations for planning in Appendix C, “Sample Architectures.”



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.