Browse > Article
http://dx.doi.org/10.5573/ieie.2016.53.6.069

Forecast System for Security Incidents  

Lee, Dongkun (Korea University)
Lim, Jong In (Korea University)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.53, no.6, 2016 , pp. 69-79 More about this Journal
Abstract
If the security incidents are occurred then, the company concentrates on the quick reaction to security incidents, reports the reason of incidents, it's problem, the result of measure to the top management team. There will be the case that actively finding problems and taking it's actions with linking the internal problems whenever external security incidents are occurred or that having only interest of problems at the moment. It is important that lasting the preventing action to prevent security incidents than not concentrating on only the security incidents are occurred. To do this, the systematical and consistent method for this should be provided. In this paper, we will provide a security incident forecast system. The security incident forecast system updates the incident induction factor which helping to forecast the potential security incidents on the database inferred from the direct security incidents which are occurred inside the company as well as the indirect security incidents which are occurred outside the company and makes interact with the incident experience and the measure process systematically. The security incident forecast system is the efficient measure about the potential security incidents in taking precaution.
Keywords
Security Incident; Security Management;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 KISA, "Personal Information Protection and Management System (PIMS) certification by bulletin (Broadcasting Communications Commission Notice No. 2013-17), http://isms.kisa.or.kr/kor/notice/dataView.jsp ?p_No=132&b_No=132&d_No=12, Mar.12. 2014"
2 Anonymous attack http://www.datanews.co.kr/news/article.html?no=90099
3 Dae-Young Lee, "A Study on Personal Data Hacking Case to build Corporate Security and Counter Strategy: Focused on HYUNDAI CAPITAL hacking case(2011)", Journal of Security Engineering, v.10, n.4, 2013. 08.
4 Dae-Young Lee, Jin-Hong Jeong, "A Case Study of Employee Privacy leaks and Fraud during B2B transaction -Focused on Man in the Middle attack case-", Journal of Security Engineering, V.12, N.5, pp.501-514, 2015.   DOI
5 The industrial espionage technology leakage situation of the domestic industry: http://m.blog.daum.net/torabora/13653348
6 Shipbuilding technology leaks: http://www.boannews.com/media/view.asp?idx=8511
7 March 1st Cyber attacks http://www.dt.co.kr/contents.html?article_no=2010030202010251739002
8 NIST, Computer Security Incident Handling Guide.
9 NIST, Cyber Security Framework, Cyber Security Issue, 2013.10.
10 Jungduk Kim, "The Management System and Governance for Personal Information", Journal of the Korean Institute of Information Security and Cryptology, v.18, n.6, pp 1-5, 2008.12.
11 Yoo, Jin-Ho ; Jie, Sang-Ho ; Lim, Jong-In, "Estimating Direct Costs of Enterprises by Personal Information Security Breaches", Journal of the Korean Institute of Information Security and Cryptology, v.19 no.4, pp.63-75, 2009.
12 You, Seung Dong ; Yoo, Jinho, "Determinants of Willingness To Pay for Personal Information Protection." Journal of the Korean Institute of Information Security and Cryptology, v.24 no.4, pp 695-703, 2014.   DOI
13 ISO, "ISO/IEC 27001-information security management", 2013: The ISO 27000 family of standards helps organizations keep information assets secure.