• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > JIPS (Çѱ¹Á¤º¸Ã³¸®ÇÐȸ)

JIPS (Çѱ¹Á¤º¸Ã³¸®ÇÐȸ)

Current Result Document : 1 / 11   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement
¿µ¹®Á¦¸ñ(English Title) A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement
ÀúÀÚ(Author) Jun-Young Park   Eui-Nam Huh  
¿ø¹®¼ö·Ïó(Citation) VOL 16 NO. 01 PP. 0061 ~ 0082 (2020. 02)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.
Å°¿öµå(Keyword) Attack Graph   Cloud Security   Cost Optimization   Vulnerability Measurement  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå