Skip to main content

A Systematic Holistic Approach for Providers to Deliver Secure ICT Services

  • Chapter
  • First Online:
ISSE 2012 Securing Electronic Business Processes

Abstract

An architecture is presented that is built as the sole reference for securing ICT services delivered to the market. It provides a specification for implementation during Bid phases through Transformation (project business) as well as for service operations (daily business). Simultaneously, it provides very detailed information to customers that allow them to compare offerings and to assess associated risks. The architecture describes the security procedures and all security controls as part of security standards. These standards provide a specification for implementation and operations in line with ITIL processes. They also provide transparency and evidence since these standards are used to demonstrate how the customer’s security requirements are met. Finally, the ICT Service Provider acquires an instrument that allows an active management of information security and that reduces costs while improving quality. This real-world approach is far too complex to be thoroughly described in this paper. So, in this paper a synopsis is being presented instead which depicts some major concepts and models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  1. Eberhard von Faber and Wolfgang Behnsen: Secure ICT Service Provisioning for Cloud, Mobile and Beyond, A Workable Architectural Approach to Equilibrate Buyers and Providers; Springer Vieweg, ISBN-978-3-658-00068-4 (to be published soon)

    Google Scholar 

  2. Eberhard von Faber and Michael Pauly: How Cloud Security strongly depends on Process Maturity, Automation and Scale; in: N. Pohlmann, H. Reimer, W. Schneider (Editors): Securing Electronic Business Processes, Vieweg (2011), ISBN-10: 3834819115, p. 23 – 33

    Google Scholar 

  3. Eberhard von Faber and Michael Pauly: User Risk Management Strategies and Models – Adaption for Cloud Computing; in: Securing Electronic Business Processes, Proceedings of the Information Security Solutions Europe, ISSE 2010, Vieweg+Teubner, Wiesbaden, 2010, ISBN 978- 3-8348-1438-8, p. 80-90

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eberhard von Faber .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

von Faber, E., Behnsen, W. (2012). A Systematic Holistic Approach for Providers to Deliver Secure ICT Services. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00333-3_9

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00332-6

  • Online ISBN: 978-3-658-00333-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics