Integrated Security Process Improvement Framework for Systems and Services
Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tool...
Ausführliche Beschreibung
Autor*in: |
Ramachandran, Muthu [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2014 |
---|
Umfang: |
1 Online-Ressource |
---|
Übergeordnetes Werk: |
Enthalten in: International journal of systems and service-oriented engineering - Hershey, Pa : IGI Global, 2010, 4(2014), 1, Seite 53-67 |
---|---|
Übergeordnetes Werk: |
volume:4 ; year:2014 ; number:1 ; pages:53-67 |
Links: |
---|
DOI / URN: |
10.4018/ijssoe.2014010104 |
---|
Katalog-ID: |
NLEJ251834654 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | NLEJ251834654 | ||
003 | DE-627 | ||
005 | 20231205144021.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231128s2014 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.4018/ijssoe.2014010104 |2 doi | |
035 | |a (DE-627)NLEJ251834654 | ||
035 | |a (VZGNL)10.4018/ijssoe.2014010104 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Ramachandran, Muthu |e verfasserin |4 aut | |
245 | 1 | 0 | |a Integrated Security Process Improvement Framework for Systems and Services |
264 | 1 | |c 2014 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before | ||
653 | |a Network Security |a Process Model |a Security Assessment |a Security Improvement |a Software Security |a Systems Security | ||
773 | 0 | 8 | |i Enthalten in |t International journal of systems and service-oriented engineering |d Hershey, Pa : IGI Global, 2010 |g 4(2014), 1, Seite 53-67 |h Online-Ressource |w (DE-627)NLEJ244419558 |w (DE-600)2703819-1 |x 1947-3060 |7 nnns |
773 | 1 | 8 | |g volume:4 |g year:2014 |g number:1 |g pages:53-67 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104 |m X:IGIG |x Verlag |z Deutschlandweit zugänglich |
856 | 4 | 2 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104&buylink=true |3 Abstract |
912 | |a ZDB-1-GIS | ||
912 | |a GBV_NL_ARTICLE | ||
951 | |a AR | ||
952 | |d 4 |j 2014 |e 1 |h 53-67 |
author_variant |
m r mr |
---|---|
matchkey_str |
article:19473060:2014----::nertdeuiyrcsipoeetrmwrfr |
hierarchy_sort_str |
2014 |
publishDate |
2014 |
allfields |
10.4018/ijssoe.2014010104 doi (DE-627)NLEJ251834654 (VZGNL)10.4018/ijssoe.2014010104 DE-627 ger DE-627 rakwb eng Ramachandran, Muthu verfasserin aut Integrated Security Process Improvement Framework for Systems and Services 2014 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before Network Security Process Model Security Assessment Security Improvement Software Security Systems Security Enthalten in International journal of systems and service-oriented engineering Hershey, Pa : IGI Global, 2010 4(2014), 1, Seite 53-67 Online-Ressource (DE-627)NLEJ244419558 (DE-600)2703819-1 1947-3060 nnns volume:4 year:2014 number:1 pages:53-67 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 4 2014 1 53-67 |
spelling |
10.4018/ijssoe.2014010104 doi (DE-627)NLEJ251834654 (VZGNL)10.4018/ijssoe.2014010104 DE-627 ger DE-627 rakwb eng Ramachandran, Muthu verfasserin aut Integrated Security Process Improvement Framework for Systems and Services 2014 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before Network Security Process Model Security Assessment Security Improvement Software Security Systems Security Enthalten in International journal of systems and service-oriented engineering Hershey, Pa : IGI Global, 2010 4(2014), 1, Seite 53-67 Online-Ressource (DE-627)NLEJ244419558 (DE-600)2703819-1 1947-3060 nnns volume:4 year:2014 number:1 pages:53-67 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 4 2014 1 53-67 |
allfields_unstemmed |
10.4018/ijssoe.2014010104 doi (DE-627)NLEJ251834654 (VZGNL)10.4018/ijssoe.2014010104 DE-627 ger DE-627 rakwb eng Ramachandran, Muthu verfasserin aut Integrated Security Process Improvement Framework for Systems and Services 2014 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before Network Security Process Model Security Assessment Security Improvement Software Security Systems Security Enthalten in International journal of systems and service-oriented engineering Hershey, Pa : IGI Global, 2010 4(2014), 1, Seite 53-67 Online-Ressource (DE-627)NLEJ244419558 (DE-600)2703819-1 1947-3060 nnns volume:4 year:2014 number:1 pages:53-67 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 4 2014 1 53-67 |
allfieldsGer |
10.4018/ijssoe.2014010104 doi (DE-627)NLEJ251834654 (VZGNL)10.4018/ijssoe.2014010104 DE-627 ger DE-627 rakwb eng Ramachandran, Muthu verfasserin aut Integrated Security Process Improvement Framework for Systems and Services 2014 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before Network Security Process Model Security Assessment Security Improvement Software Security Systems Security Enthalten in International journal of systems and service-oriented engineering Hershey, Pa : IGI Global, 2010 4(2014), 1, Seite 53-67 Online-Ressource (DE-627)NLEJ244419558 (DE-600)2703819-1 1947-3060 nnns volume:4 year:2014 number:1 pages:53-67 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 4 2014 1 53-67 |
allfieldsSound |
10.4018/ijssoe.2014010104 doi (DE-627)NLEJ251834654 (VZGNL)10.4018/ijssoe.2014010104 DE-627 ger DE-627 rakwb eng Ramachandran, Muthu verfasserin aut Integrated Security Process Improvement Framework for Systems and Services 2014 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before Network Security Process Model Security Assessment Security Improvement Software Security Systems Security Enthalten in International journal of systems and service-oriented engineering Hershey, Pa : IGI Global, 2010 4(2014), 1, Seite 53-67 Online-Ressource (DE-627)NLEJ244419558 (DE-600)2703819-1 1947-3060 nnns volume:4 year:2014 number:1 pages:53-67 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 4 2014 1 53-67 |
language |
English |
source |
Enthalten in International journal of systems and service-oriented engineering 4(2014), 1, Seite 53-67 volume:4 year:2014 number:1 pages:53-67 |
sourceStr |
Enthalten in International journal of systems and service-oriented engineering 4(2014), 1, Seite 53-67 volume:4 year:2014 number:1 pages:53-67 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Network Security Process Model Security Assessment Security Improvement Software Security Systems Security |
isfreeaccess_bool |
false |
container_title |
International journal of systems and service-oriented engineering |
authorswithroles_txt_mv |
Ramachandran, Muthu @@aut@@ |
publishDateDaySort_date |
2014-01-01T00:00:00Z |
hierarchy_top_id |
NLEJ244419558 |
id |
NLEJ251834654 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">NLEJ251834654</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20231205144021.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231128s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/ijssoe.2014010104</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)NLEJ251834654</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(VZGNL)10.4018/ijssoe.2014010104</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ramachandran, Muthu</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Integrated Security Process Improvement Framework for Systems and Services</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Network Security</subfield><subfield code="a">Process Model</subfield><subfield code="a">Security Assessment</subfield><subfield code="a">Security Improvement</subfield><subfield code="a">Software Security</subfield><subfield code="a">Systems Security</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International journal of systems and service-oriented engineering</subfield><subfield code="d">Hershey, Pa : IGI Global, 2010</subfield><subfield code="g">4(2014), 1, Seite 53-67</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)NLEJ244419558</subfield><subfield code="w">(DE-600)2703819-1</subfield><subfield code="x">1947-3060</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:4</subfield><subfield code="g">year:2014</subfield><subfield code="g">number:1</subfield><subfield code="g">pages:53-67</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104</subfield><subfield code="m">X:IGIG</subfield><subfield code="x">Verlag</subfield><subfield code="z">Deutschlandweit zugänglich</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104&buylink=true</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-GIS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_NL_ARTICLE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">4</subfield><subfield code="j">2014</subfield><subfield code="e">1</subfield><subfield code="h">53-67</subfield></datafield></record></collection>
|
author |
Ramachandran, Muthu |
spellingShingle |
Ramachandran, Muthu misc Network Security Integrated Security Process Improvement Framework for Systems and Services |
authorStr |
Ramachandran, Muthu |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)NLEJ244419558 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut |
collection |
NL |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
1947-3060 |
topic_title |
Integrated Security Process Improvement Framework for Systems and Services |
topic |
misc Network Security |
topic_unstemmed |
misc Network Security |
topic_browse |
misc Network Security |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
International journal of systems and service-oriented engineering |
hierarchy_parent_id |
NLEJ244419558 |
hierarchy_top_title |
International journal of systems and service-oriented engineering |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)NLEJ244419558 (DE-600)2703819-1 |
title |
Integrated Security Process Improvement Framework for Systems and Services |
ctrlnum |
(DE-627)NLEJ251834654 (VZGNL)10.4018/ijssoe.2014010104 |
title_full |
Integrated Security Process Improvement Framework for Systems and Services |
author_sort |
Ramachandran, Muthu |
journal |
International journal of systems and service-oriented engineering |
journalStr |
International journal of systems and service-oriented engineering |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2014 |
contenttype_str_mv |
txt |
container_start_page |
53 |
author_browse |
Ramachandran, Muthu |
container_volume |
4 |
physical |
1 Online-Ressource |
format_se |
Elektronische Aufsätze |
author-letter |
Ramachandran, Muthu |
doi_str_mv |
10.4018/ijssoe.2014010104 |
title_sort |
integrated security process improvement framework for systems and services |
title_auth |
Integrated Security Process Improvement Framework for Systems and Services |
abstract |
Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before |
abstractGer |
Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before |
abstract_unstemmed |
Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before |
collection_details |
ZDB-1-GIS GBV_NL_ARTICLE |
container_issue |
1 |
title_short |
Integrated Security Process Improvement Framework for Systems and Services |
url |
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104&buylink=true |
remote_bool |
true |
ppnlink |
NLEJ244419558 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.4018/ijssoe.2014010104 |
up_date |
2024-07-06T11:44:07.134Z |
_version_ |
1803829900355829760 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">NLEJ251834654</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20231205144021.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231128s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/ijssoe.2014010104</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)NLEJ251834654</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(VZGNL)10.4018/ijssoe.2014010104</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ramachandran, Muthu</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Integrated Security Process Improvement Framework for Systems and Services</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security of systems and services has been dominant research area in recent years as today's cloud services, big data and networked systems, especially when they provide wireless application access where personal and confidential data to be transmitted across the networked systems. Numerous tools and technologies are available to ensure system's security; however, external threats to computer systems and applications residents thereon, are also becoming more and more sophisticated and on the increase. Therefore, the key aim of this research is to integrate security engineering techniques and process with systems development life-cycle and process improvement frameworks. This paper presents a framework that consists of two components: 1) a security assessment model to looks at the existing security infrastructure of an organisation to determine its security maturity level; and 2) a security improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a scheme to improve the organisation's Systems and network security with the aim that it becomes more efficient and effective than before</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Network Security</subfield><subfield code="a">Process Model</subfield><subfield code="a">Security Assessment</subfield><subfield code="a">Security Improvement</subfield><subfield code="a">Software Security</subfield><subfield code="a">Systems Security</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International journal of systems and service-oriented engineering</subfield><subfield code="d">Hershey, Pa : IGI Global, 2010</subfield><subfield code="g">4(2014), 1, Seite 53-67</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)NLEJ244419558</subfield><subfield code="w">(DE-600)2703819-1</subfield><subfield code="x">1947-3060</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:4</subfield><subfield code="g">year:2014</subfield><subfield code="g">number:1</subfield><subfield code="g">pages:53-67</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104</subfield><subfield code="m">X:IGIG</subfield><subfield code="x">Verlag</subfield><subfield code="z">Deutschlandweit zugänglich</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijssoe.2014010104&buylink=true</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-GIS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_NL_ARTICLE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">4</subfield><subfield code="j">2014</subfield><subfield code="e">1</subfield><subfield code="h">53-67</subfield></datafield></record></collection>
|
score |
7.3986187 |