Advertisement

Introduction

  • Wolfgang BehnsenEmail author
  • Eberhard von FaberEmail author
Chapter
  • 453 Downloads
Part of the Edition <kes> book series (EDKES)

Abstract

This book introduces a reference architecture that enhances the security of services offered in the information and communication technology (ICT) market. It enables customers to compare offerings and to assess risks when using thirdparty ICT services including cloud computing and mobile services. Service providers are given a comprehensive blueprint for security implementation and maintenance covering service portfolio management, bid phases and realization projects as well as service delivery management. The architecture is completely modular and hierarchical. It contains a security taxonomy organizing all aspects of modern industrialized ICT production. The book also describes a wealth of security measures derived from real-world challenges in ICT production and service management.

Keywords

Cloud Computing Security Measure Enterprise Architecture Security Architecture User Organization 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Fachmedien Wiesbaden 2012

Authors and Affiliations

  1. 1., Security Management ProductionT-Systems International GmbHMünchenGermany
  2. 2., Security Consulting and EngineeringT-Systems GEI GmbHBonnGermany

Personalised recommendations