首页> 外文会议>International conference on perspectives in business informatics research >Information Security Governance: Valuation of Dependencies Between IT Solution Architectures
【24h】

Information Security Governance: Valuation of Dependencies Between IT Solution Architectures

机译:信息安全治理:IT解决方案体系结构之间的依赖关系估值

获取原文

摘要

Nowadays, information security is a main organizational concern that aims to control and protect business assets from existing threats. However, the lack of mechanisms to direct and control the increasing incorporation of Information Technology (IT) assets to support new security solution architectures creates additional security threats. We created a method to identify the hidden implications that exist after implementing IT assets of different solution architectures. This method comprises two artifacts. The first artifact is a metamodel that characterizes three domains: IT governance, enterprise architecture, and dependencies between IT assets of solution architectures. The second artifact is a model to specify value dependencies, which identify the business impact related to interoperability relations between the aforementioned assets. The application of this method in a Latin American central bank led to rationalize IT assets and to obtain a suitable security solution architecture from two existing architectures.
机译:如今,信息安全是一种主要的组织关注,旨在控制和保护现有威胁的业务资产。但是,缺乏直接和控制信息技术(IT)资产的越来越多的机制来支持新的安全解决方案架构创造了额外的安全威胁。我们创建了一种方法来识别实现不同解决方案体系结构的IT资产之后存在的隐藏含义。该方法包括两个伪影。第一个工件是一个元模型,它表征了三个域名:IT治理,企业体系结构和解决方案体系结构资产之间的依赖关系。第二个工件是指定值依赖性的模型,该模型识别与上述资产之间的互操作性关系相关的业务影响。这种方法在拉丁美洲中央银行中的应用导致其资产合理化,并从两个现有架构获取合适的安全解决方案架构。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号