Browse > Article
http://dx.doi.org/10.9708/jksci.2014.19.7.047

An Implementation Strategy for the Physical Security Threat Meter Using Information Technology  

Kang, Koo-Hong (Dept. of Information and Communication Engineering, Seowon University)
Abstract
In order to publicly notify the information security (Internet or Cyber) threat level, the security companies have developed the Threat Meters. As the physical security devices are getting more intelligent and can be monitored and managed through networks, we propose a physical security threat meter (PSTM) to determine the current threat level of physical security; that is a very similar compared with the one of information security. For this purpose, we investigate and prioritize the physical security events, and consider the impact of temporal correlation among multiple security events. We also present how to determine the threshold values of threat levels, and then propose a practical PSTM using the threshold based decision. In particular, we show that the proposed scheme is fully implementable through showing the block diagram in detail and the whole implementation processes with the access controller and CCTV+video analyzer system. Finally the simulation results show that the proposed PSTM works perfectly under some test scenarios.
Keywords
Physical security; Threat level; Information security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Suprema, Introduction of Bio Star Lite, Technical Columns, http://supremainc.com, June 2001
2 McAfee, Security Advice: Threat Meter Levels, http://home.mcafee.com
3 Symantec Corporation, DeepSight Threat Management System, http://www.symantec.com/security_response/threatconlearn.jsp
4 AhnLab, Security Alert, http://ahnlab.co.kr
5 Korea Emergency Response Team Coordination Center, KrCERT Internet Threat http://www.krcert.or.kr/kor/main/main.jsp
6 DVTtel Inc, Intelligent Video System Technology, DVTEL White Paper, http://info.dvtel.com/WhitePaper.html, 2006
7 B. Shin, "Study on Technical trend of physical security and future service, " Journal of the Korea Industrial Information System Society, Vol. 15, No. 5, pp. 159-166, Dec. 2009.
8 J. Kim, G. Kim, and Y. Lee, "The Concept and Approach of the Converged Security, " Review of Korean Institute of Information Security and Cryptology, Vol. 19, No. 6, pp. 68-73, Dec. 2009.
9 Y. Mehdizadeh, "Convergence of Logical and Physical Security, " SANS Institute InfoSec Reading Room, 2010. 12.
10 K. Kang, D. Kang, J. Na, and I. Kim, "Utilization of Physical Events for the Converged Security using Analytic Hierarchy Process: focus on Information Security, " Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 3, pp. 553-564, June 2012.
11 J. Han, and H. Jo, "Technical Trends of Image Security System, " Review of Korean Institute of Information Security and Cryptology, Vol. 9, No. 5, pp. 29-37, Oct. 2009.
12 Y. An, "Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards" Journal of the Korea Society of Computer and Information, Vol. 17, No. 2, pp. 159-166, Feb. 2012.
13 T.L. Saaty, and L.G. Vargas, "Prediction Projection and Forecasting" Kluwer Academic Publishers, 1991.
14 D.A. Kravitz, and B. Martin, "Ringelmann rediscovered: The original article" Journal of Personality and Social Psychology, Vol. 50, No. 5, pp. 936-941, May 1986.   DOI