Pattern and Security Requirements Engineering-Based Establishment of Security Standards /
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
Edición: | 1st ed. 2015. |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Foreword
- Preface
- Introduction
- Background
- The PEERESS Framework
- The CAST Method for Comparing Security Standards
- Relating ISO 27001 to the Conceptual Framework for Security Requirements Engineering Methods
- Supporting ISO 27001 compliant ISMS Establishment with Si*
- Supporting ISO 27001 Establishment with CORAS
- Supporting Common Criteria Security Analysis with Problem Frames
- Supporting ISO 26262 Hazard Analysis with Problem Frames
- A Catalog of Context-Patterns
- Initiating a Pattern Language for Context-Patterns
- Supporting the Establishment of a cloud-specific ISMS according to ISO 27001 using the Cloud System Analysis Pattern
- Validation and Extension of our Context-Pattern Approach
- Conclusion.