22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

so, a security methodology needs to be used and put in place. The goal of this<br />

security methodology is to understand the what, when, where, who, why, and<br />

most importantly, how.<br />

2.5.1 Brief introduction to the methodology<br />

This methodology is not quite as far reaching and complex as the other<br />

methodologies presented in this chapter. The reason behind that is twofold. First,<br />

it is meant to be used as a tool to contextualize important concepts that were<br />

<strong>cover</strong>ed in the previous chapter. Second, it is meant to be simple enough that the<br />

concepts contained within it can be understood without getting overwhelmed by<br />

the methodology itself.<br />

That said, this sample methodology is based around three types of activity: 1)<br />

What should I do? 2) How should I build It? and, 3) How should I manage it?<br />

Which translates in the following three words: Assess, Build and Manage. As<br />

shown in Figure 2-17, this is a cyclical process, which is what a good security<br />

methodology should offer.<br />

What Should I do?<br />

How Should I<br />

Manage It?<br />

Assess<br />

Manage Build<br />

How Should I<br />

Build It?<br />

Figure 2-17 The three phases of our sample security methodology<br />

Chapter 2. Security methodologies 87

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!