Skip to main content

Sector-Based Improvement of the Information Security Risk Management Process in the Context of Telecommunications Regulation

  • Conference paper
Systems, Software and Services Process Improvement (EuroSPI 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 364))

Included in the following conference series:

Abstract

The current European regulation on public communications networks requires today that Telecommunications Service Providers (TSPs) take appropriate technical and organizational measures to manage the risks posed to security of networks and services. However, a key issue in this process is the risk identification activity, which roughly consists in defining what are the relevant risks regarding the business operated and the architecture in place. The same problem appears when selecting relevant security controls. The research question discussed in this paper is: how to adapt generic Information Security Risk Management (ISRM) process and practices to the telecommunications sector? To answer this research question, a four-step research method has been established and is presented in this paper. The outcome is an improved ISRM process in the context of the telecommunications regulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Official Journal of the European Union, Directive 2009/140/EC of the European Parliament and of the Council of 25 November 2009 (2009)

    Google Scholar 

  2. Journal Officiel du Grand-Duché de Luxembourg, Loi du 27 février, sur les réseaux et les services de communications électroniques (2011)

    Google Scholar 

  3. Dekker, M., Liveri, D., Catteddu, D., Dupré, L.: Technical Guideline for Minimum Security Measures - Guidance on the security measures in Article 13a. In: ENISA (The European Network and Information Security Agency) (December 2011)

    Google Scholar 

  4. Official Journal of the European Communities, Directive 2002/21/EC of the European Parliament and of the Council of 7 March 2002 on a common regulatory framework for electronic communications networks and services (Framework Directive) (2002)

    Google Scholar 

  5. Federal Communications Commission, Telecommunications Act of 1996

    Google Scholar 

  6. Alter, S.: Defining Information Systems as Work Systems: Implications for the IS. European Journal of Information Systems 17(5), 448–469 (2008)

    Article  Google Scholar 

  7. ISO/IEC 42010, Systems and software engineering – Recommended practice for architectural description of software-intensive systems. Geneva: International Organization for Standardization (2007)

    Google Scholar 

  8. Dubois, É., Heymans, P., Mayer, N., Matulevičius, R.: Intentional Perspectives on Information Systems Engineering. In: Nurcan, S., Salinesi, C., Souveyet, C., Ralyté, J. (eds.) Intentional Perspectives on Information Systems Engineering, pp. 289–306. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. The Open Group, TOGAF Version 9.1. Van Haren Publishing, The Netherlands (2011)

    Google Scholar 

  10. ISO/IEC 27005, Information technology – Security techniques – Information security risk management. Geneva: International Organization for Standardization (2011)

    Google Scholar 

  11. ANSSI, EBIOS 2010 - Expression of Needs and Identification of Security Objectives. France (2010), http://www.ssi.gouv.fr/en/the-anssi/publications-109/methods-to-achieve-iss/ebios-2010-expression-of-needs-and-identification-of-security-objectives.html

  12. ISO/IEC 27002, Information technology – Security techniques – Code of practice for information security management. Geneva: International Organization for Standardization (2005)

    Google Scholar 

  13. Mayer, N.: A Cluster Approach to Security Improvement according to ISO/IEC 27001. presented at the Software Process Improvement, 17th European Conference, EuroSPI 2010 (2010)

    Google Scholar 

  14. TMForum, “TM Forum - eTOM Business Process Framework, http://www.tmforum.org/BusinessProcessFramework/1647/home.html (accessed: February 11, 2013)

  15. American Productivity & Quality Center (APQC) and IBM, “Telecommunication Process Classification Framework (November 2008)

    Google Scholar 

  16. TMForum, “TMForum Frameworx - SID Service Overview,” GB922-4SO (2011)

    Google Scholar 

  17. ITU (International Telecommunication Union), “ITU-T X.1057 Asset Management Guidelines in Telecommunication Organizations,” Recommendation ITU-T X.1057 (2011)

    Google Scholar 

  18. Marinos, L., Sfakianakis, A.: ENISA Threat Landscape - Responding to the Evolving Threat Environment. In: ENISA (The European Network and Information Security Agency) (September 2012)

    Google Scholar 

  19. Ministerio de Hacienda y Administraciones Públicas, “MAGERIT - versión 3.0 - Metodología de Análisis y Gestión de Riesgos de los Sistemas de Información - Libro II: Catálogo de Elementos” (October 2012)

    Google Scholar 

  20. National Institute of Standards and Technology, “NIST Special Publication 800-30 Guide for Conducing Risk Assessments” (September 2012)

    Google Scholar 

  21. Alberts, C., Dorofee, A.: OCTAVE Threat Profiles. Software Engineering Institute. Carnegie Mellon University, White paper

    Google Scholar 

  22. Bundesamt für Sicherheit in der Informationstechnik, “Supplement to BSI-Standard 100-3, Version 2.5 - Application of the Elementary Threats from the IT-Grundschutz Catalogues for Performing Risk Analyses,” Federal Office for Information Security, Bonn, Germany (August 2011)

    Google Scholar 

  23. Collier, M.D.: Enterprise Telecom Security Threats (2004)

    Google Scholar 

  24. ITU (International Telecommunication Union), “ITU-T X.1055 - Risk management and risk profile guidelines for telecommunication organizations” (November 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mayer, N., Aubert, J., Cholez, H., Grandry, E. (2013). Sector-Based Improvement of the Information Security Risk Management Process in the Context of Telecommunications Regulation. In: McCaffery, F., O’Connor, R.V., Messnarz, R. (eds) Systems, Software and Services Process Improvement. EuroSPI 2013. Communications in Computer and Information Science, vol 364. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39179-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39179-8_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39178-1

  • Online ISBN: 978-3-642-39179-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics