TY - JOUR AU - Nakamura, Takafumi AU - Kijima, Kyoichi PY - 2013/03/10 Y2 - 2024/03/28 TI - Value Orchestration Platform for ICT security services JF - Proceedings of the 56th Annual Meeting of the ISSS - 2012, San Jose, CA, USA JA - ISSS-2012 VL - 0 IS - 0 SE - DO - UR - https://journals.isss.org/index.php/proceedings56th/article/view/1944 SP - AB - <p class="MsoNormal" style="margin: 0mm 0mm 0pt;"><span style="font-size: small;"><span style="font-family: Times New Roman;"><span lang="EN-US">This paper explains the service science approach to ICT security. The first half of 2011 should prove to be the &ldquo;year of the breaches.&rdquo;&nbsp; We saw numerous security breaches targeting high-profile organizations such as, Sony PlayStation, Lockheed Martin, and a dozen of other companies and government organizations. Mitsubishi heavy industries have suffered security attack from anonymous group. </span><span style="mso-bidi-font-size: 10.5pt; mso-ansi-language: EN;" lang="EN">The attack, which involved several types of data-stealing malware on Mitsubishi computers, occurred in August 2011. </span><span lang="EN-US">The impacts of the security breach are quite sever for enormous number of people&rsquo;s private information and top secret information in corporations (or governments) were disclosed in those cases. The damage of the corporate in terms of reliability and economy are enormous. However the security is a non-functional requirement therefore it tends to be ignored at ICT design phase to implement security requirement. The service science approach to ICT security shed a light to the ICT security area to maximize ICT security measures and investments. This paper provides the concept of value orchestration platform for ICT security services. Firstly we survey the current ICT security market, and we conceptualized this situation as two parties&rsquo; model between customers and providers. Then we use ICT security standard as security service platform. This enables us to visualize current ICT security venerability or inappropriate investments. Lastly we conceptualize this solution as three parties&rsquo; model (i.e. value orchestration platform) between customers, providers and security service platform providers. We conclude that the three parties&rsquo; model contribute maximizing ICT security measures and investments as value orchestration platform.</span></span></span></p> ER -