• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.702 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Participation
    • Team Project
  • Harvard Coursepack
  • Gradebook

Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”

December 22, 2020 by Wade Mackey 6 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 01 - Threat Environment Tagged With:

Reader Interactions

Comments

  1. Jonathan Mettus says

    January 24, 2021 at 10:35 am

    Because enterprise architecture is often represented in principles, policies, and technology choices, the concept of it can be hard for managers and decision makers to grasp. The authors of this chapter came out with a “core diagram.” The core diagram is a high-level view of the processes, data, and technologies constituting the desired foundation for execution. It is supposed to help managers understand their company’s architecture. I think this relates to one of the foundational challenges of IT, which is taking concepts or information that can be complex and representing them in a simplified way so that managers can understand and make decisions regarding them or off of them.

    Log in to Reply
  2. Nicholas Fabrizio says

    January 24, 2021 at 2:12 pm

    When designing the enterprise architecture it is important to take into account the organization’s operating model and what their goals are. The enterprise architecture “is the organizing logic for business processes and IT infrastructure reflecting the integration and standardization requirements of the company’s operating model” (Ross, Weill, Robertson). Staying within the scope of the operating model will allow the company to build a better base that will allow them to adapt as time goes on with new regulations, laws, technology, or business goals.

    Log in to Reply
  3. Lakshmi Surujnauth says

    January 24, 2021 at 8:35 pm

    One key takeaway is that it is imperative for senior management to discuss the entity’s operating model to clearly identify core process, shared data and technologies in developing an integrated enterprise architecture. If done solely by IT subject matter experts, chances are it may lean towards capturing complex systems, instead of an integrated architecture model that reflects and aligns the entity’s business and IT plans.

    Log in to Reply
    • Michael Doherty says

      February 7, 2021 at 5:16 pm

      Agree! As long as the Top Down is implemented, shared and BELIEVED then it will definitely make it better.

      Log in to Reply
  4. Elias Harake says

    January 24, 2021 at 10:09 pm

    A key point made in the Implement The Operating Model Via Enterprise Architecture article was that the enterprise architecture process should start with senior management and not by lower-skilled IT employees. Creating an operating model should be a decision made from an overview perspective instead. Some important business processes should be identifying such as the key clients, data sharing components, and core processes. The article describes enterprise architecture as an essential management tool for aligning technology and business objectives.

    Log in to Reply
  5. Michael Doherty says

    February 7, 2021 at 5:15 pm

    The operating model seems to be the key that should be considered. Top management needs to consider structures, procedures and policies to consider. THis review will help the organization implement an appropriate operating model.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (3)
  • 01 – Threat Environment (5)
  • 02 – System Security Plan (5)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (4)
  • 10 – Application Security (5)
  • 11 – Data Protection (3)
  • 12 – Incident and Disaster Response (4)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in