An advanced approach to security measurement system

被引:5
|
作者
You, Youngin [1 ]
Cho, Inhyun [1 ]
Lee, Kyungho [2 ]
机构
[1] Korea Univ, 401 Robot Convergence Bldg,Anam Dong 5ga, Seoul 136713, South Korea
[2] Korea Univ, 303 Robot Convergence Bldg,Anam Dong 5ga, Seoul 136713, South Korea
来源
JOURNAL OF SUPERCOMPUTING | 2016年 / 72卷 / 09期
关键词
ISMS; Security measurement; Quantitative method; National infrastructure; INFORMATION; MANAGEMENT;
D O I
10.1007/s11227-015-1585-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of information security has increased gradually. Initially, the notion of information security was limited to only a few areas. Now, it has expanded to cover a variety of areas. For example, critical infrastructure facilities such as power plants are operated online using industrial control systems so that the facilities are exposed to cyber threats. This is also the case with the other fields that are operated online. Each field requires appropriate information security management. Thus, this paper proposes an advanced security measurement system that reflects the characteristics of each field to achieve effective information security management.
引用
收藏
页码:3443 / 3454
页数:12
相关论文
共 50 条
  • [21] ANN approach assesses system security
    Swarup, KS
    Corthis, PB
    IEEE COMPUTER APPLICATIONS IN POWER, 2002, 15 (03): : 32 - 38
  • [22] Assessing DOVID security: A system approach
    Andrade, AA
    Rebordao, JM
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES III, 2000, 3973 : 248 - 256
  • [23] An Ontological Approach to Computer System Security
    Wang, Ju An
    Guo, Michael M.
    Camargo, Jairo
    INFORMATION SECURITY JOURNAL, 2010, 19 (02): : 61 - 73
  • [24] A verification approach to applied system security
    Brucker A.D.
    Wolff B.
    International Journal on Software Tools for Technology Transfer, 2005, 7 (3) : 233 - 247
  • [25] Structure design and test of enterprise security management system with advanced internal security
    Kim, Seoksoo
    Kim, Soongohn
    Lee, Geuk
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (03): : 358 - 363
  • [26] Advanced security model for power system computer networks
    Li, C
    Yana, CG
    Mander, T
    Cheung, R
    2005 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS, 1-3, 2005, : 1115 - 1122
  • [27] Advanced Mobile Security System Operated by Bioelectrical Sensor
    Zintus-art, Kalanyu
    Shin, Duk
    Yoshimura, Natsue
    Kambara, Hiroyuki
    Koike, Yasuharu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 139 - 149
  • [28] Tutorial: Investigating Advanced Exploits for System Security Assurance
    Ahmed, Salman
    Cheng, Long
    Liljestrand, Hans
    Asokan, N.
    Yao, Danfeng
    2021 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2021), 2021, : 3 - 4
  • [29] Study on advanced education system on maritime security management
    Nishio, S.
    Okada, J.
    Ishida, H.
    OCEANS 2008 - MTS/IEEE KOBE TECHNO-OCEAN, VOLS 1-3, 2008, : 864 - 868
  • [30] Biological approach to system information security (BASIS): A multi-agent approach to information security
    Skormin, V
    Moronski, J
    McGee, D
    Summerville, D
    MULTI-AGENT SYSTEMS AND APPLICATIONS III, PROCEEDINGS, 2003, 2691 : 435 - 444