首页    期刊浏览 2024年12月12日 星期四
登录注册

文章基本信息

  • 标题:A Study on The Process Model for Security Level Management
  • 本地全文:下载
  • 作者:Jeong- ah Kim1) ; Eun- su k Ch o
  • 期刊名称:Journal of Security Engineering
  • 印刷版ISSN:1738-7531
  • 出版年度:2008
  • 卷号:5
  • 期号:3
  • 出版社:SERSC
  • 摘要:It is more impo rtant to b uild strategies and proced ures can be u sed when new threat is detected. Byfollo win g th ese strategies and procedures, op erato rs can man ag e IS optimally and en coun ter to theth reat s ystematically. Sin ce than imp lem en tatio n of security co untermeasu res and manag em en t sy stemswere m erged to be used together [1 -5]. Comb ination o f th e security cou nterm easures and m an agements ystems is a go od solution bu t can n ot be a perfect o ne. Many vu lnerabilities are in clu ded in IS asev er. Th es e vu ln erabilities can b e foun d from eith er th e sub -sy stem s con stitute IS o r the process forco mbination o f sub-systems into whole systems. Even thou gh secu rity coun termeas ures are d esig ned an dm an aged well, vuln erabilities included in somewhere can be the cau se o f com pro mise of IS, basically.A new method that con siderin g s ecurity from the initial con cept design step was p ro posed to reducep otential v ulnerab ilities. B y ap plyin g th is meth od
  • 关键词:Security Level M an ag em en t Process ; Information Assu rance
国家哲学社会科学文献中心版权所有