ICT production and protecting it in practice

  • Wolfgang BehnsenEmail author
  • Eberhard von FaberEmail author
Part of the Edition <kes> book series (EDKES)


The organization, concept and content of the ICT Security Standards were described in Chap. 5 above. This chapter looks behind the scenes and describes the industrialized ICT production along with the technology and processes used. Using this portrayal as a basis, security problems, issues or concerns are identified and specified. They need to be addressed. The description of the environment and its analysis is performed step-by-step for each individual realm addressed by an ICT Security Standard. Each section is dedicated to one cluster of standards. After characterizing the challenges, the measures are addressed that are intended to counteract the problems and solve the challenges. Thus, information about major security measures is provided for each ICT Security Standard. Overall, the chapter offers a comprehensive view is provided about the ICT production and protecting it in practice.


Virtual Machine Service Level Agreement Security Measure Wide Area Network Domain Name System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Fachmedien Wiesbaden 2012

Authors and Affiliations

  1. 1., Security Management ProductionT-Systems International GmbHMünchenGermany
  2. 2., Security Consulting and EngineeringT-Systems GEI GmbHBonnGermany

Personalised recommendations