Pattern and Security Requirements Engineering-Based Establishment of Security Standards /

Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are...

Full description

Bibliographic Details
Main Author: Beckers, Kristian (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2015.
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Foreword
  • Preface
  • Introduction
  • Background
  • The PEERESS Framework
  • The CAST Method for Comparing Security Standards
  • Relating ISO 27001 to the Conceptual Framework for Security Requirements Engineering Methods
  • Supporting ISO 27001 compliant ISMS Establishment with Si*
  • Supporting ISO 27001 Establishment with CORAS
  • Supporting Common Criteria Security Analysis with Problem Frames
  • Supporting ISO 26262 Hazard Analysis with Problem Frames
  • A Catalog of Context-Patterns
  • Initiating a Pattern Language for Context-Patterns
  • Supporting the Establishment of a cloud-specific ISMS according to ISO 27001 using the Cloud System Analysis Pattern
  • Validation and Extension of our Context-Pattern Approach
  • Conclusion.