Skip to main content

Part of the book series: Edition <kes> ((EDKES))

  • 513 Accesses

Abstract

Level 4 in the Hierarchy of Security Standards plays an important role since it serves both as directives for ICT production and delivery (provider’s side) and as a source of information for the user organization (customer’s side). This level comprises all security aspects that are relevant for the security of ICT services. Both the ICT services and the security aspects are diverse. An ordering schema is required and the individual security measures are assigned to separate ICT Security Standards in order to allow the efficient extraction of information required by user organizations. Such a structure or ordering schema, referred to below as taxonomy, is also required to enable the ICT Service Provider to produce and maintain the documentation of security measures. There are several conditions or requirements to be met by the taxonomy. These are identified and analyzed first (Sect. 5.1). Then the taxonomy is presented and explained step by step; first by explaining the three groups in the whole map, then by dividing up the whole map into six clusters (Sect. 5.2) and, finally, by briefly defining each ICT Security Standard in the context of its cluster (Sect. 5.3). After having defined the organization of security measures and standards, a structure is defined that organizes the internal content of all standards (Sect. 5.4). This does not really belong to the taxonomy itself, but further binding conditions are formulated along the primary parameters for ESARIS: hierarchical approach, modularity and standardization. A brief summary of the procedure and result is provided at the end of this chapter (Sect. 5.5).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Wolfgang Behnsen Dipl.-Math. or Eberhard von Faber Prof. Dr. .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Behnsen, W., von Faber, E. (2012). ESARIS Security Taxonomy. In: Secure ICT Service Provisioning for Cloud, Mobile and Beyond. Edition <kes>. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00069-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00069-1_5

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00068-4

  • Online ISBN: 978-3-658-00069-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics