{"title":"军队中有效的漏洞管理过程","authors":"Seung-hyun Baek, Young-Gab Kim","doi":"10.1109/PLATCON.2019.8669420","DOIUrl":null,"url":null,"abstract":"Reducing vulnerabilities is one of the most effective ways to minimize the cyber risks that can occur to information systems. Given the characteristics of the military environment, particularly in operating a wide variety of information systems and dealing with critical information on national security, clear / concise management procedures are needed that enable more realistic and direct action to identify and address vulnerabilities. Also, five requirements for the efficient vulnerability management procedure in the military are proposed as follows: (i) quickness, (ii) continuousness, (iii) clearness, (iv) interdependence, and (v) completeness. By considering all information, this paper suggested 5 phases for the vulnerability management process in military: (i) Framing; (ii) Identification; (iii) Assessment; (iv) Remediation; and (v) Verification. In addition, the three-tiered concept was applied to the efficient management of the vulnerabilities, taking into consideration the characteristics of the organization with clear hierarchical relationships. As a result, it will contribute to reduce the cyber risk in the defense area, by presenting the specific procedures for vulnerability management in each hierarchical organization.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Efficient Vulnerability Management Process in the Military\",\"authors\":\"Seung-hyun Baek, Young-Gab Kim\",\"doi\":\"10.1109/PLATCON.2019.8669420\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Reducing vulnerabilities is one of the most effective ways to minimize the cyber risks that can occur to information systems. Given the characteristics of the military environment, particularly in operating a wide variety of information systems and dealing with critical information on national security, clear / concise management procedures are needed that enable more realistic and direct action to identify and address vulnerabilities. Also, five requirements for the efficient vulnerability management procedure in the military are proposed as follows: (i) quickness, (ii) continuousness, (iii) clearness, (iv) interdependence, and (v) completeness. By considering all information, this paper suggested 5 phases for the vulnerability management process in military: (i) Framing; (ii) Identification; (iii) Assessment; (iv) Remediation; and (v) Verification. In addition, the three-tiered concept was applied to the efficient management of the vulnerabilities, taking into consideration the characteristics of the organization with clear hierarchical relationships. As a result, it will contribute to reduce the cyber risk in the defense area, by presenting the specific procedures for vulnerability management in each hierarchical organization.\",\"PeriodicalId\":364838,\"journal\":{\"name\":\"2019 International Conference on Platform Technology and Service (PlatCon)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Platform Technology and Service (PlatCon)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PLATCON.2019.8669420\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Platform Technology and Service (PlatCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PLATCON.2019.8669420","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficient Vulnerability Management Process in the Military
Reducing vulnerabilities is one of the most effective ways to minimize the cyber risks that can occur to information systems. Given the characteristics of the military environment, particularly in operating a wide variety of information systems and dealing with critical information on national security, clear / concise management procedures are needed that enable more realistic and direct action to identify and address vulnerabilities. Also, five requirements for the efficient vulnerability management procedure in the military are proposed as follows: (i) quickness, (ii) continuousness, (iii) clearness, (iv) interdependence, and (v) completeness. By considering all information, this paper suggested 5 phases for the vulnerability management process in military: (i) Framing; (ii) Identification; (iii) Assessment; (iv) Remediation; and (v) Verification. In addition, the three-tiered concept was applied to the efficient management of the vulnerabilities, taking into consideration the characteristics of the organization with clear hierarchical relationships. As a result, it will contribute to reduce the cyber risk in the defense area, by presenting the specific procedures for vulnerability management in each hierarchical organization.