Browse > Article

The Design and Implementation for Practical Risk Analysis Method & Modules  

정윤정 (국가보안기술연구소)
김인중 (국가보안기술연구소)
이철원 (국가보안기술연구소)
Abstract
In these days many Organizations recognize risk of information asset by rapid change of information system environments, and need suitable management for that. Also many organization which operate important information-communication infrastructure take interest in threat, vulnerability and risk analysis of important asset by enforcement of Act on protection of information and communication infrastructure. But, it is most that methodology and tools that analyze risk for organization's information asset are developed in abroad up to now, domestic research of this field is insufficient stage. An research of this field is necessary in domestic because it can't reflect domestic actuality by depending on most foreign methodology or a tool. In this paper we proposed design and implementation for the risk analysis methodology, a prototype and important modules that considers the user convenience. We expect that the result of this paper will for step improvement of domestic risk analysis methodology and tool development.
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Information technology - Security technique - Guedelines for the management of IT security (GMITS) - Part3 :Techniques for the management of IT security /
[] / ISO/IEC JTC 1/SC27 N1845
2 /
[ Practices of Leading Organizations, Exposure Draft, U.S.General Accounting Office ] / Information Securityi Risk Assessment
3 /
[] / BSI Global
4 Code of Practice for Information Security Management, British Standards Institute /
[] / BSI;BS7799
5 /
[ 한국전산원 ] / 전산망 보안을 위한 위험관리 기술지원서
6 Carnegie Mellon Software Engineering Institute /
[ OCTAVE ] / OCTVE Criteria, Version 2.0
7 /
[] / Risk analysis Method(KRAM)
8 /
[ CSE ] / Threat and Risk Assessment Working Guide, Government Canada
9 Information Security Management (2): Guidelines to The Management of Information Technology Security (GMITS) /
[ Solm,R. ] / Information Management & Computer Security   ScienceOn
10 /
[ Insight Consulting ] / CRAMM User Guide
11 /
[ OCATVE ] / Method Implementation Guide Version 2.0
12 Guidelines for Automatic Data Processing Risk Analysis /
[] / FIPS-65
13 /
[ 한국전산원 ] / 위험분석 방법론 및 자동화 도구 기술 이전 교육 교재