Pattern and Security Requirements: Engineering-Based Establishment of Security Standards Front Cover

Pattern and Security Requirements: Engineering-Based Establishment of Security Standards

  • Length: 474 pages
  • Edition: 2015
  • Publisher:
  • Publication Date: 2015-04-16
  • ISBN-10: 3319166638
  • ISBN-13: 9783319166636
  • Sales Rank: #21439205 (See Top 100 Books)
Description

Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards.

Standards such as Common Criteria or ISO 27001 are explored and several extensions are provided to well-known SRE methods such as Si*, CORAS, and UML4PF to support the establishment of these security standards. Through careful analysis of the activities demanded by the standards, for example the activities to establish an Information Security Management System (ISMS) in compliance with the ISO 27001 standard, methods are proposed which incorporate existing security requirement approaches and patterns.

Understanding Pattern and Security Requirements engineering methods is important for software engineers, security analysts and other professionals that are tasked with establishing a security standard, as well as researchers who aim to investigate the problems with establishing security standards. The examples and explanations in this book are designed to be understandable by all these readers.

Table of Contents

Chapter 1 Introduction
Chapter 2 Background
Chapter 3 The PEERESS Framework
Chapter 4 The CAST Method for Comparing Security Standards
Chapter 5 Relating ISO 27001 to the Conceptual Framework for Security Requirements Engineering Methods
Chapter 6 Supporting ISO 27001 Compliant ISMS Establishment with Si*
Chapter 7 Supporting ISO 27001 Establishment with CORAS
Chapter 8 Supporting Common Criteria Security Analysis with Problem Frames
Chapter 9 Supporting ISO 26262 Hazard Analysis with Problem Frames
Chapter 10 A Catalog of Context-Patterns
Chapter 11 Initiating a Pattern Language for Context-Patterns
Chapter 12 Supporting the Establishment of a Cloud-Specific ISMS According to ISO 27001 Using the Cloud System Analysis Pattern
Chapter 13 Validation and Extension of Our Context-Pattern Approach
Chapter 14 Conclusion
Appendix A OCL-Expressions for Validation and Security Reasoning
Appendix B Comparing ISO 27001 and ISO 31000
Appendix C Comparing Annex A of ISO 27001 and ISO 27001:2013
Appendix D Template for Security Standards

To access the link, solve the captcha.