Skip to main content

Development of an Integrated, Risk-Based Platform for Information and E-Services Security

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4166))

Included in the following conference series:

Abstract

The paper presents a risk-based integrated platform for the information and e-services security management related to the Information Security Managements System (ISMS) concept. The current state of the work is shown, including the UML-based methodology, and the incrementally developed computer-aided tool prototype. The assumptions of the integrated platform can be specified on the basis of sampled experiences from the first deployment and case studies, an analysis of standards, legal requirements and technology, and a study of the needs and requirements of various organizations. It is assumed that the common and enhanced assets inventory will integrate information security, business continuity and IT services management processes. The paper concludes the current, initial state of the work and defines its further directions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. BS-7799-2. ISMS – Specification with guidance for use. British Standard Institution (2002)

    Google Scholar 

  2. ISO/IEC 17799. Code of practice for information security management (2000)

    Google Scholar 

  3. SecFrame, http://cbst.www.iss.pl

  4. ISO/IEC 20000-1. IT – Service management. Specification (2005)

    Google Scholar 

  5. ISO/IEC 20000-2. IT – Service management. Code of practice (2005)

    Google Scholar 

  6. ISO/IEC 15443. A framework for IT security assurance (Part 1-3) (2005)

    Google Scholar 

  7. Białas, A.: A UML approach in the ISMS implementation. In: IFIP 11.1 & 11.5 Working Conference, Fairfax (VA). Springer, Heidelberg (2005)

    Google Scholar 

  8. Białas, A.: The ISMS Business Environment Elaboration Using a UML Approach. In: Zieliński, K., Szmuc, T. (eds.) Software Engineering: Evolution and Emerging Technologies, pp. 99–110. IOS Press, Amsterdam (2005)

    Google Scholar 

  9. Białas, A.: IT security modelling. In: Arabnia, H.R., He, L., Mun, Y. (eds.) Proc. of the 2005 International Conf. on Security and Management – SAM 2005, Las Vegas, pp. 502–505. CSREA Press (2005)

    Google Scholar 

  10. ISO/IEC TR 13335-3, Guidelines for the management of IT Security (GMITS), Part 3

    Google Scholar 

  11. ITIL, http://www.itsmf.com

  12. Cobit, Isaca, https://www.isaca.org

  13. BSI PAS 56. Guide to Business Continuity Management (2003)

    Google Scholar 

  14. Callio Secura 17799, http://www.callio.com

  15. Proteus Enterprise, http://www.infogov.co.uk

  16. Cobra, http://www.riskworld.net

  17. Cora, http://www.ist-usa.com/

  18. Coras, http://coras.sourceforge.net

  19. Cramm, http://www.ogc.goc.uk

  20. Ebios, http://www.ssi.gouv.fr

  21. Ezrisk, http://www.ezrisk.co.uk/

  22. Mehari, R.: http://www.clusif.asso.fr ; http://www.risicare.fr/

  23. Octave, http://www.sei.cmu.edu

  24. Riskpack, http://www.cpacsweb.com

  25. IT Grundschutz, http://www.bsi.bund.de

  26. Aligning Cobit, ITIL and ISO 17799 for business benefit. IT Governance, OGC, itSMF (2005)

    Google Scholar 

  27. Eesa, http://www.itcon-ltd.com

  28. Białas, A.: IT security development – computer-aided tool supporting design and evaluation. In: Kowalik, J., Gorski, J., Sachenko, A. (eds.) Cyberspace Security and Defense. Research Issues. NATO Science Series II, vol. 196, pp. 3–23. Springer, Dordrecht (2005)

    Chapter  Google Scholar 

  29. Białas, A.: The Assets Inventory for the Information and Communication Technologies Security Management. Archiwum Informatyki Teoretycznej i Stosowanej. Polska Akademia Nauk. 16(2), 93–108 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Białas, A. (2006). Development of an Integrated, Risk-Based Platform for Information and E-Services Security. In: Górski, J. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2006. Lecture Notes in Computer Science, vol 4166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11875567_24

Download citation

  • DOI: https://doi.org/10.1007/11875567_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45762-6

  • Online ISBN: 978-3-540-45763-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics