Information security governance: valuation of dependencies between IT solution architectures

3Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays, information security is a main organizational concern that aims to control and protect business assets from existing threats. However, the lack of mechanisms to direct and control the increasing incorporation of Information Technology (IT) assets to support new security solution architectures creates additional security threats. We created a method to identify the hidden implications that exist after implementing IT assets of different solution architectures. This method comprises two artifacts. The first artifact is a metamodel that characterizes three domains: IT governance, enterprise architecture, and dependencies between IT assets of solution architectures. The second artifact is a model to specify value dependencies, which identify the business impact related to interoperability relations between the aforementioned assets. The application of this method in a Latin American central bank led to rationalize IT assets and to obtain a suitable security solution architecture from two existing architectures.

Cite

CITATION STYLE

APA

González-Rojas, O., Ochoa-Venegas, L., & Molina-León, G. (2016). Information security governance: valuation of dependencies between IT solution architectures. In Lecture Notes in Business Information Processing (Vol. 261, pp. 220–223). Springer Verlag. https://doi.org/10.1007/978-3-319-45321-7_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free