Architecture Toolkit
The most important diagram in all of business architecture — without it your EA efforts are in vain. |
Current state blueprints capture business, data and implementation architecture at the conceptual, logical and physical levels. |
Recently on Simplicable
Physical Security Explainedposted by Anna MarPhysical security is real world security. The type of security that existed long before the information revolution. |
Canary Trap Explainedposted by Anna MarA digital signature embedded in information that can be tied to a source such as an individual or an IP address. |
Honeypot Explained (Security)posted by Anna MarA honeypot is decoy designed to distract attackers from your information infrastructure. |