𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Pattern and Security Requirements: Engineering-Based Establishment of Security Standards

✍ Scribed by Kristian Beckers


Publisher
Springer
Year
2015
Tongue
English
Leaves
489
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standards such as Common Criteria or ISO 27001 are explored and several extensions are provided to well-known SRE methods such as Si*, CORAS, and UML4PF to support the establishment of these security standards. Through careful analysis of the activities demanded by the standards, for example the activities to establish an Information Security Management System (ISMS) in compliance with the ISO 27001 standard, methods are proposed which incorporate existing security requirement approaches and patterns.


πŸ“œ SIMILAR VOLUMES


Pattern and Security Requirements: Engin
✍ Kristian Beckers (auth.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer International Publishing 🌐 English

<p><p>Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standar

Security Patterns Integrating Security a
✍ Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, πŸ“‚ Library πŸ“… 2006 πŸ› Wiley 🌐 English

Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses the full spect

Security Patterns: Integrating Security
✍ Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, πŸ“‚ Library πŸ“… 2006 πŸ› Wiley 🌐 English

Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers.Β <i>Security Patterns</i>Β addresses the ful

Security Patterns: Integrating Security
✍ Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, πŸ“‚ Library πŸ“… 2006 πŸ› Wiley 🌐 English

Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers.Β <i>Security Patterns</i>Β addresses the ful

Security patterns : integrating security
✍ Markus Schumacher; et al πŸ“‚ Library πŸ“… 2006 πŸ› John Wiley & Sons 🌐 English

"In a time where systems are constantly at risk, it is essential that you arm yourself with the knowledge of different security measures. This title breaks down security at various levels of the system: the enterprise, architectural and operational layers. It acts as an extension to the larger enter