You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following
tasks: Develop a risk-driven enterprise information security architecture. Deliver security
infrastructure solutions that support critical business initiatives. Which of the following methods will
you use to accomplish these tasks?
A.
Service-oriented architecture
B.
Sherwood Applied Business Security Architecture
C.
Service-oriented modeling framework
D.
Service-oriented modeling and architecture