Advanced security assessment for control effectiveness

Youngin You, Sangkyo Oh, Kyung Ho Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Initially, the field only dealt with sensitive security information. However, as operations on cyber space increases, the need for security in internet also increased. Thus, areas that requires security assessment also increased. But, to date, a security evaluation for each area is performed partially. Since security assessment does not reflect the characteristics of each area, the correct security level is difficult to determine. Therefore, new security indicator is required for the effective and efficient management. In this paper, we provide an advanced security assessment using edited indicators and common indicators.

Original languageEnglish
Title of host publicationInformation Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers
PublisherSpringer Verlag
Pages383-393
Number of pages11
Volume8909
ISBN (Electronic)9783319150864
DOIs
Publication statusPublished - 2015
Event15th International Workshop on Information Security Applications, WISA 2014 - , Korea, Republic of
Duration: 2014 Aug 252014 Aug 27

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8909
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other15th International Workshop on Information Security Applications, WISA 2014
CountryKorea, Republic of
Period14/8/2514/8/27

Fingerprint

Internet
Information Security
Evaluation

Keywords

  • ISMS
  • Security assessment
  • Security index

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

You, Y., Oh, S., & Lee, K. H. (2015). Advanced security assessment for control effectiveness. In Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers (Vol. 8909, pp. 383-393). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8909). Springer Verlag. https://doi.org/10.1007/978-3-319-15087-1_30

Advanced security assessment for control effectiveness. / You, Youngin; Oh, Sangkyo; Lee, Kyung Ho.

Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Vol. 8909 Springer Verlag, 2015. p. 383-393 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8909).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

You, Y, Oh, S & Lee, KH 2015, Advanced security assessment for control effectiveness. in Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. vol. 8909, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8909, Springer Verlag, pp. 383-393, 15th International Workshop on Information Security Applications, WISA 2014, Korea, Republic of, 14/8/25. https://doi.org/10.1007/978-3-319-15087-1_30
You Y, Oh S, Lee KH. Advanced security assessment for control effectiveness. In Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Vol. 8909. Springer Verlag. 2015. p. 383-393. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-15087-1_30
You, Youngin ; Oh, Sangkyo ; Lee, Kyung Ho. / Advanced security assessment for control effectiveness. Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Vol. 8909 Springer Verlag, 2015. pp. 383-393 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{615c71643208412a9d57fc25a21a4161,
title = "Advanced security assessment for control effectiveness",
abstract = "Initially, the field only dealt with sensitive security information. However, as operations on cyber space increases, the need for security in internet also increased. Thus, areas that requires security assessment also increased. But, to date, a security evaluation for each area is performed partially. Since security assessment does not reflect the characteristics of each area, the correct security level is difficult to determine. Therefore, new security indicator is required for the effective and efficient management. In this paper, we provide an advanced security assessment using edited indicators and common indicators.",
keywords = "ISMS, Security assessment, Security index",
author = "Youngin You and Sangkyo Oh and Lee, {Kyung Ho}",
year = "2015",
doi = "10.1007/978-3-319-15087-1_30",
language = "English",
volume = "8909",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "383--393",
booktitle = "Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers",

}

TY - GEN

T1 - Advanced security assessment for control effectiveness

AU - You, Youngin

AU - Oh, Sangkyo

AU - Lee, Kyung Ho

PY - 2015

Y1 - 2015

N2 - Initially, the field only dealt with sensitive security information. However, as operations on cyber space increases, the need for security in internet also increased. Thus, areas that requires security assessment also increased. But, to date, a security evaluation for each area is performed partially. Since security assessment does not reflect the characteristics of each area, the correct security level is difficult to determine. Therefore, new security indicator is required for the effective and efficient management. In this paper, we provide an advanced security assessment using edited indicators and common indicators.

AB - Initially, the field only dealt with sensitive security information. However, as operations on cyber space increases, the need for security in internet also increased. Thus, areas that requires security assessment also increased. But, to date, a security evaluation for each area is performed partially. Since security assessment does not reflect the characteristics of each area, the correct security level is difficult to determine. Therefore, new security indicator is required for the effective and efficient management. In this paper, we provide an advanced security assessment using edited indicators and common indicators.

KW - ISMS

KW - Security assessment

KW - Security index

UR - http://www.scopus.com/inward/record.url?scp=84922142203&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84922142203&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-15087-1_30

DO - 10.1007/978-3-319-15087-1_30

M3 - Conference contribution

AN - SCOPUS:84922142203

VL - 8909

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 383

EP - 393

BT - Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers

PB - Springer Verlag

ER -