What is a security architecture What are the key characteristics of a security architecture?

Why is a cyber security architecture needed?

A cyber security architecture is the foundation of an organization’s defense against cyber threats, and ensures that all components of its IT infrastructure are protected. Environments that are secured by a cyber security architecture include:

  • Cloud
  • Networks
  • IoT
  • Endpoints
  • Mobile

When a cyber security architecture adheres to all seven principles of the Zero Trust security model (devices, people, data, networks, workload, automation & orchestration, visibility & analytics) an enterprise can secure data and IT resources wherever they reside.

Protection across the entire IT infrastructure

Pre-emptive threat prevention technology is the key to a modern cyber security architecture blocking sophisticated attacks before damage can be inflicted. An organization needs to be able to predict and block unknown malware, as well as known malware, to deliver consistent protection across the entire IT infrastructure.

Small business and large enterprises should adopt a consolidated cyber security architecture to protect their most critical assets from advanced cyber attacks.

A holistic approach for creating a cyber security architecture

By employing dozens of vendors’ point security solutions organizations inadvertently create a patchwork security architecture. The added complexity potentially undermines an organization’s overall security and results in a higher TCO. By taking a holistic approach to building a cyber security architecture, organizations can close security gaps, reduce risk, and increase operational efficiency. This multi-layered, holistic approach to cyber security is referred to as a consolidated security architecture.

Do you need a consolidated cyber security architecture? We can help

Check Point Infinity is the first modern, consolidated, cyber security architecture built to prevent sophisticated Fifth Generation attacks across networks, cloud deployments, endpoints, mobile and IoT devices. Check Point’s entire portfolio of security solutions can be managed through a single pane of glass and adheres to all seven Zero Trust principles. Check Point ThreatCloud, the world’s largest cyber threat intelligence database, leverages AI and powers the dozens of threat prevention engines employed by Infinity.

Learn more about Check Point Infinity.

What is a security architecture What are the key characteristics of a security architecture?

What is a security architecture What are the key characteristics of a security architecture?

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. This course also gives you hands on access to cybersecurity tools important to a system analyst. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the sixth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst. The completion of this course also makes you eligible to earn the Cyber Threat Intelligence IBM digital badge. More information about the badge can be found https://www.youracclaim.com/org/ibm/badge/cyber-threat-intelligence. In this course, you will learn to: • Describe examples of network defensive tactics. • Discuss data loss prevention and endpoint protection concepts and tools. • Explore a data loss prevention tool and learn how to classify data in your database environment. • Describe security vulnerability scanning technologies and tools. • Recognize application security threats and common vulnerabilities. • Identify the key concepts around threat intelligence. • Explore a SIEM product and review suspicious alerts and how to take action.

View Syllabus

Skills You'll Learn

Application Security, threat intelligence, network defensive tactics, security analyst, Cybersecurity

Reviews

  • 5 stars

    78.92%

  • 4 stars

    15.70%

  • 3 stars

    3.54%

  • 2 stars

    1.24%

  • 1 star

    0.57%

OA

Jul 11, 2020

This course ought to have come first to provide a context for each concepts presented in previous courses. It really provided more clarity on the whole field of Cyber Security.

GO

Jul 20, 2022

The Course is great and the lecture videos were well organised. I also wish to thank IBM and Coursera for availing us of the links to labs for more detailed learning

From the lesson

Application Security and Testing

In this module you will learn about application architecture, security and DevSecOps.

Taught By

  • What is a security architecture What are the key characteristics of a security architecture?

    IBM Security Learning Services

    IBM Global Subject Matter Experts

Explore our Catalog

Join for free and get personalized recommendations, updates and offers.

What is security architecture?

Note: The security architecture reflects security domains, the placement of security-relevant elements within the security domains, the interconnections and trust relationships between the security-relevant elements, and the behavior and interaction between the security-relevant elements.

What does security architecture consist of?

The Security Architecture of the OSI Reference Model (ISO 7498-2) considers five main classes of security services: authentication, access control, confidentiality, integrity and non-repudiation.

What are the properties of security architecture?

A Security Architecture is a cohesive security design, which addresses the requirements (e.g. Authentication, authorization, etc.) – and in particular the risks of a particular environment/scenario, and specifies what security controls are to be applied where. The design process should be reproducible.

What is security architecture design?

Security architecture and design looks at how information security controls and safeguards are implemented in IT systems in order to protect the confidentiality, integrity, and availability of the data that are used, processed, and stored in those systems.