<p>This book describes new methods and measures which enable ICT service providers and large IT departments to provide secure ICT services in an industrialized IT production environment characterized by rigorous specialization, standardization and division of labor along the complete supply chain. T
Secure ICT Service Provisioning for Cloud, Mobile and Beyond: A Workable Architectural Approach Balancing Between Buyers and Providers
β Scribed by Eberhard von Faber, Wolfgang Behnsen (auth.)
- Publisher
- Vieweg+Teubner Verlag
- Year
- 2012
- Tongue
- English
- Leaves
- 295
- Series
- Edition <kes>
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book introduces a reference architecture that enhances the security of services offered in the information and communication technology (ICT) market. It enables customers to compare offerings and to assess risks when using third-party ICT services including cloud computing and mobile services. Service providers are given a comprehensive blueprint for security implementation and maintenance covering service portfolio management, bid phases and realization projects as well as service delivery management. The architecture is completely modular and hierarchical. It contains a security taxonomy organizing all aspects of modern industrialized ICT production. The book also describes a wealth of security measures derived from real-world challenges in ICT production and service management.
β¦ Table of Contents
Front Matter....Pages I-XIII
Introduction....Pages 1-23
Security, assurance and the division of labor....Pages 25-42
Approach and framework....Pages 43-60
Main building blocks....Pages 61-79
ESARIS Security Taxonomy....Pages 81-114
ICT production and protecting it in practice....Pages 115-214
Usage of the ICT Security Standards....Pages 215-230
Rollout process....Pages 231-245
Back Matter....Pages 247-284
β¦ Subjects
e-Commerce/e-business; Computer Science, general
π SIMILAR VOLUMES
<p><P>Communication networks are very complex and interdependent systems requiring complicated management and control operations under strict resource and time constraints. A finite number of network components with limited capacities need to be shared for dynamically allocating a high number of tra
This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Part 1 introduces Cloud Computing and describes the main service models (IaaS, PaaS and SaaS
Service Provider Networks in many ways are unique networks. Many services might be serving millions of customers, so there might be many paths between different parts of the network as you will see in the book. There are many different types of Service Providers but there is very little information
Mobility, Security and Web Services provides an insight into the exciting world of new technologies and points the way ahead towards a new era of IT solutions. It describes complex interrelations in a clearly comprehensible way. Concrete examples show you how companies can meet the challenges of the