Pattern and Security Requirements Engineering-Based Establishment of Security Standards /
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are...
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Foreword
- Preface
- Introduction
- Background
- The PEERESS Framework
- The CAST Method for Comparing Security Standards
- Relating ISO 27001 to the Conceptual Framework for Security Requirements Engineering Methods
- Supporting ISO 27001 compliant ISMS Establishment with Si*
- Supporting ISO 27001 Establishment with CORAS
- Supporting Common Criteria Security Analysis with Problem Frames
- Supporting ISO 26262 Hazard Analysis with Problem Frames
- A Catalog of Context-Patterns
- Initiating a Pattern Language for Context-Patterns
- Supporting the Establishment of a cloud-specific ISMS according to ISO 27001 using the Cloud System Analysis Pattern
- Validation and Extension of our Context-Pattern Approach
- Conclusion.