{"title":"新型关键信息基础设施的风险分析方法","authors":"Jun Heo, Jong-Whoi Shin, Wansuk Lee, Yoojae Won","doi":"10.1109/ICSNC.2008.72","DOIUrl":null,"url":null,"abstract":"In Korea, hacking, computer viruses, such as infringement on electronic systems for protecting Critical Information Infrastructure from the law was enacted. Every year, Specified facilities that Critical Information Infrastructure are analysed system risks and will be submitted to Central Government. This research intends to provide IT service attributes to take into account the methodology that predicts the security of Critical Information Infrastructure. The service provider who wants to offer the new Critical Information Infrastructure service needs to secure appropriate security measures based on threat and vulnerability analysis from IT service attributes and the service planning stage. However, it is difficult to use existing risk methodologies that perform threat analysis as the one that allows Service attributes This paper propose the information security framework that figures out security threats at the new IT Critical Information Infrastructure service planning stage, and easily identifies relevancy between security technologies and IT service attributes.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"276 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Risk Analysis Methodology for New Critical Information Infrastructure\",\"authors\":\"Jun Heo, Jong-Whoi Shin, Wansuk Lee, Yoojae Won\",\"doi\":\"10.1109/ICSNC.2008.72\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In Korea, hacking, computer viruses, such as infringement on electronic systems for protecting Critical Information Infrastructure from the law was enacted. Every year, Specified facilities that Critical Information Infrastructure are analysed system risks and will be submitted to Central Government. This research intends to provide IT service attributes to take into account the methodology that predicts the security of Critical Information Infrastructure. The service provider who wants to offer the new Critical Information Infrastructure service needs to secure appropriate security measures based on threat and vulnerability analysis from IT service attributes and the service planning stage. However, it is difficult to use existing risk methodologies that perform threat analysis as the one that allows Service attributes This paper propose the information security framework that figures out security threats at the new IT Critical Information Infrastructure service planning stage, and easily identifies relevancy between security technologies and IT service attributes.\",\"PeriodicalId\":105399,\"journal\":{\"name\":\"2008 Third International Conference on Systems and Networks Communications\",\"volume\":\"276 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Third International Conference on Systems and Networks Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSNC.2008.72\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Conference on Systems and Networks Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSNC.2008.72","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Risk Analysis Methodology for New Critical Information Infrastructure
In Korea, hacking, computer viruses, such as infringement on electronic systems for protecting Critical Information Infrastructure from the law was enacted. Every year, Specified facilities that Critical Information Infrastructure are analysed system risks and will be submitted to Central Government. This research intends to provide IT service attributes to take into account the methodology that predicts the security of Critical Information Infrastructure. The service provider who wants to offer the new Critical Information Infrastructure service needs to secure appropriate security measures based on threat and vulnerability analysis from IT service attributes and the service planning stage. However, it is difficult to use existing risk methodologies that perform threat analysis as the one that allows Service attributes This paper propose the information security framework that figures out security threats at the new IT Critical Information Infrastructure service planning stage, and easily identifies relevancy between security technologies and IT service attributes.