Ontological Mapping of Information Security Best-Practice Guidelines
Publication
[:en]
Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more and more important for any kind of organization. The fundamental challenge for such systems is the representation and management of information security knowledge. While information security ontologies already exist, no methods have been proposed to map existing best-practice guidelines or information security standards to an existing ontology. Therefore, this paper presents a method for mapping the information security knowledge of the French EBIOS standard and the German IT Grundschutz Manual to a OWL-DL security ontology. Applying the introduced method allows to reuse existing information security knowledge bases and to map them to open and standardized data structures which can be easily reused by organizations and developers to support their existing information security management systems.
link.springer.com/chapter/10.1007%2F978-3-642-01190-0_5[:de]
Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more and more important for any kind of organization. The fundamental challenge for such systems is the representation and management of information security knowledge. While information security ontologies already exist, no methods have been proposed to map existing best-practice guidelines or information security standards to an existing ontology. Therefore, this paper presents a method for mapping the information security knowledge of the French EBIOS standard and the German IT Grundschutz Manual to a OWL-DL security ontology. Applying the introduced method allows to reuse existing information security knowledge bases and to map them to open and standardized data structures which can be easily reused by organizations and developers to support their existing information security management systems.
Related Posts
Kategorien
Schlagwörter
Agribusiness
AURUM
BITCRIME
Building Planning
City Planning
Climate change
CO2
Compliance Management
Corporate Social Responsibility (CSR)
CSRMAP
Digital Farming
e-Health
ECOCITIES
Energy Efficiency
Energy Efficiency Directive (EED)
Energy Simulation
European Commission
farming.software
Glossary
IT Security
Landwirtschaft
Privacy
Pseudonymization
Risk Management
Semantic Web
SEMERGY
Smart farming
Sustainability