Components & Artifacts Flashcards
What are EA components and how do they relate to a framework?
The enterprise architecture (EA) framework provides the structure for modeling the enterprise from the perspective of the business and technology operating environment. EA components are for use within the framework as working elements within each level of the framework. They are replaceable elements within the framework and are subject to reevaluation when there are changes in strategy, information flows, applications, or infrastructure. EA components are the functional building blocks that create the parts of the IT capability. The framework provides a structure for modeling the enterprise. The components are the elements of the framework at each level.
What are EA artifacts and how do they relate to EA components?
In the context of enterprise architecture, an artifact is a product that documents one or more EA components. Artifact types are varied but typically consist of textual documentation, architectural diagrams, spreadsheets, presentations, and sometimes video or audio recordings. EA artifacts document EA components consistently across the enterprise. This consistency is what allows EA components to be easily understood and reused. Artifacts are essential documents used in information systems planning.
What parts of an enterprise’s Strategic Plan could be viewed as EA components?
EA components are active elements of the enterprise business and technology operating environment. Two elements of the enterprise’s Strategic Plan are viewed as EA components because they are considered active elements. The elements are the Strategic Plan consisting of strategic goals & initiatives, and the E-Commerce or E-Government Plan. The strategic plan is the planning document that the enterprise uses to decide and document the goals and lower-level strategies. The outlook of the strategic plan is 3-5 years. The E-Commerce/E-Government plan is more tactical in that it will name IT initiatives needed to meet the strategic goals of the enterprise.
Why can an enterprise’s business services, information flows, applications, and networks be viewed as EA components?
Enterprise architecture components are resources that provide capabilities at each level of the EA framework. The components are not static and are subject to change based on the strategy and goals of the organization. They may extend across the enterprise or be contained within a segment.
An enterprise’s business services, information flows, applications, and networks also provide capabilities with the EA framework and are considered EA components. These EA components act as components that can be reused across different segments in the framework. Likewise, when the organization’s strategy and goals change, the services, information flows, applications, and networks may need to change to accommodate the evolving organization.
Why are national and international standards important to EA components?
The enterprise architecture draws on standards from industry consortiums, national standards, and international standards. Drawing on international standards promotes the use of non-proprietary component solutions within enterprise architecture. Standardization of components in this way enables the reuse, integration, and interoperability of EA components. Vendors adhere to these standards to ensure interoperability between products and adherence to standards. Once an EA has committed to a standards-based approach, the architectural direction of the organization is better defined and understood by the enterprise.
Which elements of a security and privacy program can be viewed as EA components?
The elements of a security and privacy program viewed as EA components are contained within the security solutions. The solutions provide a view of how IT assets are protected throughout the enterprise. These security components comprise the solutions that protect the IT resources and business technology operating environment. EA components for security solutions fall into four dimensions: operational security, data or information security, personnel security, and physical security.