Ontological mapping of information security best-practice guidelines

22Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more and more important for any kind of organization. The fundamental challenge for such systems is the representation and management of information security knowledge. While information security ontologies already exist, no methods have been proposed to map existing best-practice guidelines or information security standards to an existing ontology. Therefore, this paper presents a method for mapping the information security knowledge of the French EBIOS standard and the German IT Grundschutz Manual to a OWL-DL security ontology. Applying the introduced method allows to reuse existing information security knowledge bases and to map them to open and standardized data structures which can be easily reused by organizations and developers to support their existing information security management systems. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Fenz, S., Pruckner, T., & Manutscheri, A. (2009). Ontological mapping of information security best-practice guidelines. Lecture Notes in Business Information Processing, 21 LNBIP, 49–60. https://doi.org/10.1007/978-3-642-01190-0_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free