An effective security plan recognizes the importance of every component within the Information Security Architecture (ISA). Information Security Architecture, Second Edition describes each of these components in detail and outlines the steps necessary to establish an integrated and effective ISA. This new edition of a bestseller keeps the focus on developing the architecture and adds additional information and detail to each chapter for execution of the architecture. The Getting started section has been improved with custom planning templates. The book adds newer concepts such as HoneyPots, Business Continuity Planning, and Disaster Recovery Planning