Pattern and Security Requirements Engineering-Based Establishment of Security Standards /
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are...
Κύριος συγγραφέας: | |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Foreword
- Preface
- Introduction
- Background
- The PEERESS Framework
- The CAST Method for Comparing Security Standards
- Relating ISO 27001 to the Conceptual Framework for Security Requirements Engineering Methods
- Supporting ISO 27001 compliant ISMS Establishment with Si*
- Supporting ISO 27001 Establishment with CORAS
- Supporting Common Criteria Security Analysis with Problem Frames
- Supporting ISO 26262 Hazard Analysis with Problem Frames
- A Catalog of Context-Patterns
- Initiating a Pattern Language for Context-Patterns
- Supporting the Establishment of a cloud-specific ISMS according to ISO 27001 using the Cloud System Analysis Pattern
- Validation and Extension of our Context-Pattern Approach
- Conclusion.