Record Detail Back

XML

Pattern and Security Requirements


Information security management is a challenging topic, due to the dif

culty of exhaustively modeling attackers for an entire system and the threats they cause to it. The idea of security standards and their respective certi

cation schemes is an excellent one. Companies can use a security analysis process in a standard and establish a security product, e.g., a secure software or a process for information security. Security standards are based on best practices from industry and agreed upon in respective consortiums. After a security standard is established, a certi

- cation body checks the security product for compliance with the standard. The certi

cation body shall either certify the successful efforts with an of

cial document or provide guidance on how to improve their security product to achieve certi

cation. The alternative to a security certi

cation process is to deal with security prob- lems at random points in a system. These isolated efforts can prevent the exploi- tation of vulnerabilities of several parts of a system, but without a structured and systematic method the security level of the entire organization cannot be deter- mined. Furthermore, inventing an effective process with regard to security not based on best practices or standards is extremely dif

cult. Not to mention the missing
certi

cation option, which includes an outside review of the security analysis. A security standard with a certi

cation infrastructure has the potential to help with
these problems effectively.
Kristian Beckers - Personal Name
978-3-319-16663-6
NONE
Pattern and Security Requirements
Information Technology
English
2015
1-489
LOADING LIST...
LOADING LIST...