Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.4.3

Measure of the loss resulting from the threat in the University  

이현숙 (고려대학교 정보보호대학원 정보보호학과)
변진욱 (고려대학교 정보보호대학원 정보보호학과)
기주희 (고려대학교 정보보호대학원 정보보호학과)
이동훈 (고려대학교 정보보호대학원)
임종인 (고려대학교 정보보호대학원)
박영우 (한국정보보호진흥원 연구원)
윤재석 (한국정보보호진흥원 연구원)
Abstract
In this paper we classify the possible threat and introduce the method that measures the loss resulted from the threat in the university. This is the method that the amount of the loss minimized in the case of the same quality in damage as establish a economical prediction model. The method of measuring the loss is as follows. First, asset should be clearly identified and valued. Second, threats which may result in harm to asset should be classified. Third, vulnerabilities which is weaknesses associated with asset should be analyzed. Fourth, measure the value of the loss. we explain the valued method by the example.
Keywords
가치분석지수;취약성 분석;손실;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 /
[ ISO/IEC JTCL/SC27 N720 ] / Guidelines for the Management of IT System Security (GMITS):Part1-Concepts and Mode;s for IT Security
2 /
[ Bernstein,T;Bhmani.A;Schultz,E;C.A.Seigel ] / Internet Security for Business
3 취약성 평가에 의한 정보보호지표의 계량화: 정보자산가치가중치법 /
[ 김기윤;나관식 ] / 정보보호학회지   과학기술학회마을
4 정보보호를 위한 위험분석 방법: 분류와 선택기준 /
[ 김정덕 ] / 한국정보보호학회학술대회
5 정보기술 위험관리 과정과 기법 /
[ 김정덕;이성일 ] / 정보보호학회지   과학기술학회마을
6 Issues in Qunatitative Versus Qualitative Risk analysis /
[ Ozier,Will ] / Datapro Reorts on Information Security
7 /
[ Haimens,Y.Y.Haimens ] / Assessment
8 /
[ Committee on Institutional Cooperation ] / Incident Cost Analysis and Modeling Report I,II
9 정보기술(IT)부분 검사업무 /
[ 금융감독원 ] / 검사업무편람
10 /
[ Guidelines for the Management of IT System Security:Part 3-Techniques for the Management of IT Security ] / ISO/IEC JTCL/SC27 TR 13335-3