JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Forecast System for Security Incidents
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Forecast System for Security Incidents
Lee, Dongkun; Lim, Jong In;
  PDF(new window)
 Abstract
If the security incidents are occurred then, the company concentrates on the quick reaction to security incidents, reports the reason of incidents, it`s problem, the result of measure to the top management team. There will be the case that actively finding problems and taking it`s actions with linking the internal problems whenever external security incidents are occurred or that having only interest of problems at the moment. It is important that lasting the preventing action to prevent security incidents than not concentrating on only the security incidents are occurred. To do this, the systematical and consistent method for this should be provided. In this paper, we will provide a security incident forecast system. The security incident forecast system updates the incident induction factor which helping to forecast the potential security incidents on the database inferred from the direct security incidents which are occurred inside the company as well as the indirect security incidents which are occurred outside the company and makes interact with the incident experience and the measure process systematically. The security incident forecast system is the efficient measure about the potential security incidents in taking precaution.
 Keywords
Security Incident;Security Management;
 Language
Korean
 Cited by
 References
1.
Anonymous attack http://www.datanews.co.kr/news/article.html?no=90099

2.
Dae-Young Lee, "A Study on Personal Data Hacking Case to build Corporate Security and Counter Strategy: Focused on HYUNDAI CAPITAL hacking case(2011)", Journal of Security Engineering, v.10, n.4, 2013. 08.

3.
Dae-Young Lee, Jin-Hong Jeong, "A Case Study of Employee Privacy leaks and Fraud during B2B transaction -Focused on Man in the Middle attack case-", Journal of Security Engineering, V.12, N.5, pp.501-514, 2015. crossref(new window)

4.
The industrial espionage technology leakage situation of the domestic industry: http://m.blog.daum.net/torabora/13653348

5.
Shipbuilding technology leaks: http://www.boannews.com/media/view.asp?idx=8511

6.
March 1st Cyber attacks http://www.dt.co.kr/contents.html?article_no=2010030202010251739002

7.
NIST, Computer Security Incident Handling Guide.

8.
NIST, Cyber Security Framework, Cyber Security Issue, 2013.10.

9.
Jungduk Kim, "The Management System and Governance for Personal Information", Journal of the Korean Institute of Information Security and Cryptology, v.18, n.6, pp 1-5, 2008.12.

10.
Yoo, Jin-Ho ; Jie, Sang-Ho ; Lim, Jong-In, "Estimating Direct Costs of Enterprises by Personal Information Security Breaches", Journal of the Korean Institute of Information Security and Cryptology, v.19 no.4, pp.63-75, 2009.

11.
You, Seung Dong ; Yoo, Jinho, "Determinants of Willingness To Pay for Personal Information Protection." Journal of the Korean Institute of Information Security and Cryptology, v.24 no.4, pp 695-703, 2014. crossref(new window)

12.
ISO, "ISO/IEC 27001-information security management", 2013: The ISO 27000 family of standards helps organizations keep information assets secure.

13.
KISA, "Personal Information Protection and Management System (PIMS) certification by bulletin (Broadcasting Communications Commission Notice No. 2013-17), http://isms.kisa.or.kr/kor/notice/dataView.jsp ?p_No=132&b_No=132&d_No=12, Mar.12. 2014"