Академический Документы
Профессиональный Документы
Культура Документы
Wayne A. Fischer
Author Note
This paper shows a table based on the implementation of the SABSA® model. In this
table there are seven security strategies from the SABSA® Logical Security Architecture layer
and list security strategies associated with them. These then map the security strategies to the
security services, and finally associate them with physical security mechanisms and provide
References
Covington, R. C. (2015, June 23). Physical security: The overlooked domain. Retrieved from
https://www.csoonline.com/article/2939322/physical-security-the-overlooked-
domain.html
Öğüt, H. (2013). The configuration and detection strategies for information security systems.
Sherwood, J., Clark, A., & Lynas, D. (2005). Enterprise Security Architecture - A Business-