A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service

被引:1
作者
Kim, Hwankuk [1 ]
Lim, Jongin [2 ]
Lee, Kyungho [2 ]
机构
[1] KISA, Seoul 138803, South Korea
[2] Korea Univ, CIST, Seoul 136701, South Korea
关键词
Personal computing - Internet of things - Risk management - Web services;
D O I
10.1155/2015/474329
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although Internet of Things (IoT) technologies and services are being developed rapidly worldwide, concerns of potential security threats such as privacy violation, information leak, and hacking are increasing as more various sensors are connected to the Internet. There is a need for the study of introducing risk management and existing security management standard (e.g., ISO27001) to ensure the stability and reliability of IoT services. K-ISMS is a representative certification system that evaluates the security management level of the enterprise in Korea and is possible to apply as a standardized process to enhance the security management of IoT services. However, there are growing concerns about the quality deterioration of the K-ISMS certification assessment these days because of internet security incidents occurring frequently in K-ISMS certified enterprises. Therefore, various researches are required to improve the accuracy and objectivity of the certification assessment. Since existing studies mainly focus on simple statistical analysis of the K-ISMS assessment results, analysis on the cause of certification assessment fault based on past data analysis is insufficient. As a method of managing the certification inspection quality, in this paper, we analyze the association among the fault items of the K-ISMS certification assessment results using association rule mining which involves identifying an association rule among items in the database.
引用
收藏
页数:12
相关论文
共 26 条
[1]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[2]  
Agrawal R., P 20 INT C VERY LARG
[3]  
[Anonymous], 2014, SCI WORLD J
[4]  
Brijs T., 2010, INT J INFORM THEORIE, V10, P370
[5]  
Hahsler M., 2005, J STAT SOFTW, V14, P11
[6]  
Hahsler M., 2008, PROBABILISTIC APPROA
[7]  
Hahsler M., COMPREHENSIVE R ARCH
[8]  
Hai Q. L., 2013, MATH PROBL ENG, V2013
[9]   Proposal for a Security Management in Cloud Computing for Health Care [J].
Haufe, Knut ;
Dzombeta, Srdan ;
Brandis, Knud .
SCIENTIFIC WORLD JOURNAL, 2014,
[10]  
Hipp J., 2000, SIGKDD EXPLORATIONS, V2, P58, DOI DOI 10.1145/360402.360421