Skip to main content

A security Taxonomy that facilitates Protecting an industrial ICT Production and how it really provides Transparency

  • Chapter
Book cover ISSE 2013 Securing Electronic Business Processes

Abstract

The Enterprise Security Architecture for Reliable ICT Services (ESARIS) is a reference architecture for protecting ICT services [EvFWB12]. User organizations are enabled to compare offerings and assess risks. ICT service providers receive a comprehensive template for implementing and maintaining all security measures, including those relating to service management. The architecture also introduces a Security Taxonomy on Level 4 of its hierarchy of security standards. This taxonomy is explained in this paper. The structure or organization model assigns security measures to production areas. It considers state-of-the-art service management processes (ITIL) and integrates ICT security management and IT service management. The taxonomy supports division of labor and assignment of responsibility within a large-scale ICT production. The taxonomy is compatible with all types of ICT services and service models since it allows easy identification and selection of the relevant security documentation. The taxonomy is modular and derived from specific criteria. The latter result from challenges in day-to-day business and consider interests and requirements both from user organizations and from ICT service providers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    ICT: Information and Communication Technology

References

  1. ISO/IEC 27001 - Information technology - Security techniques - Information security management systems - Requirements

    Google Scholar 

  2. ISO/IEC 27002 - Information technology - Security techniques - Code of practice for information security management

    Google Scholar 

  3. IT-Grundschutz Catalogues; German Federal Office for Information Security (BSI); www.bsi. bund.de

    Google Scholar 

  4. Eberhard von Faber and Wolfgang Behnsen: Secure ICT Service Provisioning for Cloud, Mobile and Beyond, A Workable Architectural Approach to Equilibrate Buyers and Providers; Springer Vieweg, 2013, ISBN-978-3-658-00068-4

    Google Scholar 

  5. Eberhard von Faber and Wolfgang Behnsen: A Systematic Holistic Approach for Providers to Deliver Secure ICT Services; in: H. Reimer, N. Pohlmann, W. Schneider (Editors): ISSE 2012 - Securing Electronic Business Processes, Springer Vieweg (2012), ISBN: 978-3-658-00332-6, p. 80 - 88

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

von Faber, E., Behnsen, W. (2013). A security Taxonomy that facilitates Protecting an industrial ICT Production and how it really provides Transparency. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2013 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-03371-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-03371-2_8

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-03370-5

  • Online ISBN: 978-3-658-03371-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics