Proctored Exam

IASA2-Enterprise Architecture

by IASA Chapter Indonesia

Enterprise Architecture is the conceptual blueprint that defines the structure and operation of an organization. The intent of an enterprise architecture is to determine how an organization can most effectively achieve its current and future objectives. Enterprise Architecture is a well-defined practice for conducting enterprise analysis, design, planning, and implementation, using a holistic approach at all times, for the successful development and execution of strategy. Enterprise architecture applies architecture principles and practices to guide organizations through the business, information, process, and technology changes necessary to execute their strategies. These practices utilize the various aspects of an enterprise to identify, motivate, and achieve these changes

IASA3 - IT Governance

by IASA Chapter Indonesia

IT Governance is the framework of processes and decision making structure within an organization applied through clearly defined policies and procedures relative to oversight of technology assets across the enterprise.  The primary focus of IT governance is the stewardship of IT resources on behalf of various stakeholders. IT Governance is critical to a business to assure that the investments in IT generate business value on an on-going basis. As business processes and technology are integrated, businesses are compelled to provide IT governance in order to manage their financial, operational and compliance risks

IASA1 - Archimate

by IASA Chapter Indonesia

As your ArchiMate skills develop your models will become larger and more complex and you will begin to rely on them more in your day to day work

IASA4 - Security System Architecture

by IASA Chapter Indonesia

Security System Architecture is the security architecture is one component of a product’s overall architecture and is developed to provide guidance during the design of the product. It outlines the level of assurance that is required and potential impacts that this level of security could have during the development stages and on the product overall.