Modellierung der Sicherheit von Informationssystemen mit DROPS
AbstractThe complexity of an organization's security problem can be reduced by modelling security issues of business information systems. This facilitates analyzing and detecting security requirements and optimal operational alternatives (i.e. suitable security measures). DROPS (dimension-relational organization and problem oriented security model) is a model for the security of information systems enabling these issues. The approach DROPS is based on is holistic, integrative and scaleable. For example, security considerations concerning information systems are often limited to a technical perspective (IT-security). DROPS allows modelling a mere technical view as well as the integration of non-technical system components (e.g. personnell). Furthermore, non-technical security measures (e.g. organizational issues) can be included into the model. The composition of DROPS offers an organization the opportunity to integrate individual elements of a security problem and their relations. Essential characteristics of specific business processes can be considered this way. In practical application, first of all the choice of suitable security measures is facilitated. Second, DROPS can be used to model actual and/or aspired security requirements and the security system of an organization.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoPaper provided by Leibniz Universität Hannover, Wirtschaftswissenschaftliche Fakultät in its series Diskussionspapiere der Wirtschaftswissenschaftlichen Fakultät der Leibniz Universität Hannover with number dp-301.
Length: 17 pages
Date of creation: Jul 2004
Date of revision:
Sicherheitsmanagement; Sicherheit von Informationssystemen; IT-IT-Sicherheit; Sicherheitsmodell; Sicherheitsanforderungen; Sicherheitsaspekte; Sicherheitsmaßnahmen;
Find related papers by JEL classification:
- O39 - Economic Development, Technological Change, and Growth - - Technological Change; Research and Development; Intellectual Property Rights - - - Other
- Z0 - Other Special Topics - - General
You can help add them by filling out this form.
reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Dietrich, Karl).
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.