261 research outputs found

    Competences of IT Architects

    Get PDF
    The field of architecture in the digital world uses a plethora of terms to refer to different kinds of architects, and recognises a confusing variety of competences that these architects are required to have. Different service providers use different terms for similar architects and even if they use the same term, they may mean something different. This makes it hard for customers to know what competences an architect can be expected to have.\ud \ud This book combines competence profiles of the NGI Platform for IT Professionals, The Open Group Architecture Framework (TOGAF), as well as a number of Dutch IT service providers in a comprehensive framework. Using this framework, the book shows that notwithstanding a large variety in terminology, there is convergence towards a common set of competence profiles. In other words, when looking beyond terminological differences by using the framework, one sees that organizations recognize similar types of architects, and that similar architects in different organisations have similar competence profiles. The framework presented in this book thus provides an instrument to position architecture services as offered by IT service providers and as used by their customers.\ud \ud The framework and the competence profiles presented in this book are the main results of the special interest group “Professionalisation” of the Netherlands Architecture Forum for the Digital World (NAF). Members of this group, as well as students of the universities of Twente and Nijmegen have contributed to the research on which this book is based

    Improving IT infrastructures representation: A UML profile

    Get PDF
    IT infrastructures are most times informally modeled. The resulting models are ambiguous to stakeholders, cannot be checked for validity, and therefore are unable to play their important role in design, deployment and maintenance activities. The main reason for such a poor state-of-the-art lies mainly in the absence of a modeling language capable of representing IT infrastructures at the required level of abstraction. Indeed, existing candidate languages are too abstract, as shown in this paper by reviewing their metamodels. The present paper mitigates this problem by proposing a UML profile to describe the semantics of an IT infrastructure.info:eu-repo/semantics/publishedVersio

    A Comparison of Security Risk Analysis in the In-house IT Infrastructure and Cloud Infrastructure for the Payment Gateway System

    Get PDF
    Infrastruktuuri lahendused viiakse pilve tĂ€nu paremale juhtimisvĂ”imekusele, seadmete tehnilisele arengule ning pilve lahenduste paindlikkusele ja kuluefektiivsetele vĂ”imalustele. SeetĂ”ttu muutub ettevĂ”tte arhitektuur, kui sĂŒsteemid viiakse uude infrastruktuuri. Selliste muutuste tĂ”ttu vĂ”ivad turvariskid suureneda vĂ”i vĂ€heneda, avalduda uued riskid vĂ”i suudetakse kĂ”rvaldada mĂ”ned olemasolevad riskid. Ainult Ă€riprotsesside modelleerimisele tugineva riskianalĂŒĂŒsi puhul, kus tuvastatakse ettevĂ”tte varade vÀÀrtus, puudub IT-infrastruktuuri ja Ă€riprotsesside omavahelise seose esindamine. Seega vĂ”ib riskianalĂŒĂŒsis teatud infosĂŒsteemi (IS) varasid hoopis eirata. Kahe infrastruktuuri turvariskide analĂŒĂŒsimisel tuleb arvestada ettevĂ”tte arhitektuurilisi erinevusi, sest identifitseerimata IS varad vĂ”ivad olla haavatavad ja kujutada ohtu kĂ€sitletavale organisatsioonile. KĂ€esolevas töös tuvastatakse arhitektuuri modelleerimise kaudu varad, mis on vajalikud riskianalĂŒĂŒsi tegemiseks. Koostatud mudelid nĂ€itavad erinevusi, mis on seotud IS varadega organisatsiooni sisemise infrastruktuuri ja pilves vahel. Organisatsiooni arhitektuurist tulenevate IS varadega seotud turvariskide kindlaksmÀÀramisel kasutatakse STRIDE taksonoomia pĂ”hist ohu modelleerimist.Selles uurimistöös esitletakse protseduuri, mis aitab organisatsioonidel tuvastada kahe infrastruktuuri IS varade muutusi ja mĂ”ista turvariskide erinevusi. KĂ€esolevas uurimistöös kasutatud arhitektuuri modelleerimine illustreerib IS varade erinevusi ja nĂ€itab, kuidas Ă€riprotsesse saab kaardistada tehnoloogia komponentidega. SeejĂ€rel vĂ”imaldab ohu modelleerimine struktuurselt mÀÀrata sĂŒsteemi ohtusid. Vastavad turvariskid kategoriseeritakse pĂ”hinedes uue infrastruktuuri olemasolule. Riskidega seotud muutused toovad esile ettevĂ”tte sisemise infrastruktuuri ja pilve infrastruktuuri vahe. Selline lĂ€henemisviis on kinnitatud ekspertide poolt. KĂ€esolev uurimistöö pĂ”hineb juhtumiuuringul, mis kĂ€sitleb PĂ”hja-Euroopas kasutatavat maksekanali sĂŒsteemi.In-house infrastructures are migrated to the cloud owing to the enhanced technical management capabilities, technical advancement as well as the flexibility and cost-effective options offered by the cloud. Moreover, an enterprise architecture changes when the sys-tems are moved into a different infrastructure. Due to such infrastructural changes, secu-rity risks can increase or decrease, while new risks can be introduced and some risks can be eliminated. Asset identification for risk analysis based only on business process mod-elling lacks the integration and representation of the interrelationship between IT infra-structure and business processes. Hence, certain information system (IS) assets can be neglected in the risk analysis. When analysing the security risk of two infrastructures, enterprise architectural differences need to be captured, since unidentified IS assets could be vulnerable and pose a security risk to the concerned organisation.In this thesis, assets are identified via architectural modelling to perform risk analysis. Furthermore, models present the differences pertaining to IS assets within in-house infra-structure and cloud infrastructure, in addition to the mapping to corresponding business processes. The STRIDE-based threat modelling is employed to determine the security risks concerning IS assets derived from enterprise architecture.To elaborate, this study will introduce a procedure that will help organisations identify IS asset changes of two different infrastructures and capture security risk changes. Moreover, architectural modelling applied in this research will illustrate the differences regard-ing IS assets and present the way in which business processes are mapped to technology components. Subsequently, a threat modelling method employed will provide a structural way to identify threats to the systems. The changes incorporated concerning the security risks will further present the security risk gap regarding in-house infrastructure and cloud infrastructure. Additionally, the validation of this approach is performed by domain experts. The enterprise architecture modelled in this thesis is based on a case study dealing with a payment gateway system used in North Europe

    Improving IT infrastructures representation: A UML profile

    Get PDF
    IT infrastructures are most times informally modeled. The resulting models are ambiguous to stakeholders, cannot be checked for validity, and therefore are unable to play their important role in design, deployment and maintenance activities. The main reason for such a poor state-of-the-art lies mainly in the absence of a modeling language capable of representing IT infrastructures at the required level of abstraction. Indeed, existing candidate languages are too abstract, as shown in this paper by reviewing their metamodels. The present paper mitigates this problem by proposing a UML profile to describe the semantics of an IT infrastructure.info:eu-repo/semantics/publishedVersio

    Combining goal-oriented and model-driven approaches to solve the Payment Problem Scenario

    Get PDF
    Motivated by the objective to provide an improved participation of business domain experts in the design of service-oriented integration solutions, we extend our previous work on using the COSMO methodology for service mediation by introducing a goal-oriented approach to requirements engineering. With this approach, business requirements including the motivations behind the mediation solution are better understood, specified, and aligned with their technical implementations. We use the Payment Problem Scenario of the SWS Challenge to illustrate the extension

    Management of Security Risks in the Enterprise Architecture using ArchiMate and Mal-activities

    Get PDF
    Turvalisuse tase on ettevĂ”tte ĂŒks peamisi elemente, mida tuleb organisatsioonis kontrollida. Kui ettevĂ”tte Ă€ri arengut modelleeritakse on eesmĂ€rgiks katkematu ettevĂ”tlus, aga tihti ei vĂ”eta sellega arvesse turvanĂ”udeid. Selliselt on aga infosĂŒsteemi kĂ”rget turvalisuse taset vĂ€ga raske sĂ€ilitada. Selles dokumendis kĂ€sitletakse lĂ€henemisviisi, mis parandab julgeoleku vastumeetmeid, et sellelĂ€bi aidata ettevĂ”tte arhitektuuri turvalisemaks muuta. EttevĂ”tte arhitektuurimudeli ja turvariski juhtimise vaheliste soeste leidmine toimub lĂ€bi InfosĂŒsteemi turvariskide juhtimise domeeni mudeli (ISSRM). EttevĂ”tte arhitektuuri modelleerimiseks on kasutatud ArchiMate modelleerimiskeelt. Paljudest riskide kirjeldamise keeltest on sobilikum mal-activity (pahatahtlikute tegevuste) diagrammid, sest see aitab julgeoleku riskide juhtimist kĂ”ige paremini visualiseerida. Struktureeritud joondus aitab ĂŒlalnimetatud keelte vahelisi seoseid nĂ€idata ning annab informatsiooni kĂ”ige haavatavamate punktide kohta sĂŒsteemis. Turvalisuse taseme sĂ€ilitamine aitab ettevĂ”ttel Ă€ritegevust viia sĂ”ltumatuks infosĂŒsteemist. Selle dokumendi tulemuseks on ArchiMate ja Mal-activity diagrammide vahelised seostetabelid ja reeglid. Nende kahe keele vaheliseks seoseks on ISSRM. Kirjeldatud lĂ€henemise valideerimine on lĂ€bi viidud ĂŒhe nĂ€ite pĂ”hjal, mis on vĂ”etud CoCoME juhtumiuuringust. NĂ€ite pĂ”hjal on loodud mitmeid illustreerivaid pilte valideerimise kohta. KĂ”ige viimasena on kirjeldatud meetodiga saadud tulemust vĂ”rreldud Grandy et.al. (2013) poolt arendatud lĂ€henemisega. VĂ”tmesĂ”nad: InfosĂŒsteem, InfosĂŒsteemi turvariskide juhtimine, ettevĂ”tte arhitektuur, ettevĂ”tte arhitektuuri mudel, julgeoleku vastumeetmed, turvariskide juhtimine, riskidele orjenteeritud modelleerimiskeeled, ArchiMate, mal-activity diagrammid.Security level of the enterprise is one of the main elements that should be taken under control in the organization. It is difficult to maintain high security level of Information System. Since development of enterprise architecture is targeted on continues business flow modeling, it sometimes does not take into account security requirements. The paper provides an approach to improve security countermeasures to contribute with secure Enterprise Architecture. Filling the gap between Enterprise Architecture model and Security Risk Management is done through Information System Security Risk Management domain model (ISSRM). To build the Enterprise Architecture model, ArchiMate modelling language is being used. Among different risk-oriented languages, selection was done in favor of Mal-activity diagrams, which help to provide visual concept of Security Risk Management. Structured alignment can show the mapping between aforementioned terms and provide the information about most vulnerable points of the system. The maintenance of security level will help to make business flow independent from the state of Information System. The outcome of this paper is an alignment tables and rules between ArchiMate and Mal-activity diagrams. The mapping link between these two languages is ISSRM. Validation of our approach is done on the example, which is taken from CoCoME case study. It is shown on number of illustrative pictures. After getting the results, there is a comparison of the output between presented method and approach developed by Grandry et.al. (2013). Keywords: Information System, Information System Security Risk Management, Enterprise Architecture, Enterprise Architecture model, security countermeasures, Security Risk Management, risk-oriented modelling languages, ArchiMate, Mal-activity diagrams

    Linking Telecom Service High-level Abstract Models to Simulators based on Model Transformations: The IMS Case Study

    Get PDF
    Part 3: ManagementInternational audienceTelecommunication services are widespread and subject today to tensions on a competitive market. Telecommunication service design is more and more software oriented. To reduce time to market and cost of services, a service designer better need to simulate and evaluate his design earlier. The approach proposed in this paper is to reduce the abstraction gap between modeling and simulation phases using model transformation. But manual transformations are so far time consuming and error prone.As a trustworthy solution, model based techniques and associated transformations permit to systematically link service models with simulation phase before realization. We thus propose as a first contribution a meta-model dedicated to concepts of IP Multimedia Subsystem core network as a case study. Our meta-model constrains and defines such network entities to be used in the code generation, which is our second contribution. The implementation of a video conference service permits to illustrate our workbench

    An integrated conceptual model for information system security risk management supported by enterprise architecture management

    Get PDF
    Risk management is today a major steering tool for any organisation wanting to deal with information system (IS) security. However, IS security risk management (ISSRM) remains a difficult process to establish and maintain, mainly in a context of multi-regulations with complex and inter-connected IS. We claim that a connection with enterprise architecture management (EAM) contributes to deal with these issues. A first step towards a better integration of both domains is to define an integrated EAM-ISSRM conceptual model. This paper is about the elaboration and validation of this model. To do so, we improve an existing ISSRM domain model, i.e. a conceptual model depicting the domain of ISSRM, with the concepts of EAM. The validation of the EAM-ISSRM integrated model is then performed with the help of a validation group assessing the utility and usability of the model
    • 

    corecore