Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.2.439

On Physical Security Threat Breakdown Structure for Data Center Physical Security Level Up  

Bae, Chun-sock (The University Of Suwon)
Goh, Sung-cheol (The University Of Suwon)
Abstract
The development of information technology represented by ICBMA (IoT, Cloud, Big Data, Mobile, AI), is leading to a surge in data and a numerical and quantitative increase in data centers to accommodate it. As the data center is recognized as a social infrastructure, It is very important to identify physical security threats in advance in order to secure safety, such as responding to a terrorist attack. In this paper, we develop physical security threat breakdown structure (PS-TBS) for easy identification and classification of threats, and verify the feasibility and effectiveness of the PS-TBS through expert questionnaires. In addition, we intend to contribute to the improvement of physical security level by practical use in detailed definition on items of PS-TBS.
Keywords
Threat Breakdown Structure; Data Center Security; Physical Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Gary Stoneburner, Alice Goguen, and Alexis Feringa, "Risk management guide for information technology systems," NIST SP 800-30, Jul. 2002
2 Everett Cath, "A risky business: ISO 31000 and 27005 unwrapped," Computer Fraud & Security, vol. 2011, no. 2, pp. 5-7, 2011   DOI
3 Adil Sayouti, Siham Benhadou, Hicham Medromi and Mohamed Ghazouani, "An integrated use of ISO27005, mehari and multi-agents system in order to design a comprehensive information security risk management tool," International journal of applied information systems, vol. 7, no. 2, pp. 10-15, 2014   DOI
4 OWASP Foundation, "OWASP top 10 - 2017 most critical web application security risks," OWASP Foundation, https://owasp.org, Jun. 2018
5 Elena Ramona Stroie and Alina Cristina Rusu, "Security risk management - approaches and methodology," Informatica Economica, vol. 15, no. 1, pp. 228-240, 2011
6 Christian Cowan and Chris Gaskins, Monitoring physical threats in the data center, Schneider Electric - Data Center Science Center, Dec. 2006
7 KISA, IDC safety . reliability appraisal item research, Technology support sponsorship project 02-01 result Report, Dec. 2002
8 "KaKao Talk service stop, because of IDC cable line cut down incident", Money Today News, May 25, 2012
9 "Failure experienced by 6 of 10 among data center operators in recent 1 year", ZDNet Korea News, Apr. 4, 2016
10 "SKbroadband, BTV service stopped by data center service failure", Newspim, Dec. 16, 2015
11 Sang-jin Jung and Jun-hwa Song, "The trend of standardization on energy efficient and safe data center," TTA Journal, 158, pp.87-93, Mar. 2015
12 "NHN Entertainment, IT new business went down, because of data center service failure", Digital Times, Jun. 20, 2017
13 "KT, Connection to game and other service stopped by data center service failure", YTN News, Feb, 2, 2018
14 Do-young, Park, Server room and data center operation status research and improvement proposal in south korea, IDC Korea, Jun. 2016
15 Hyun-sun Kang, "An efficient and secure physical security method of data center," Journal of Security Engineering, 12(6), pp. 609-620, Dec. 2015   DOI
16 Ki-uk Kim and Chang-soo Kim, "A study on the construction and site selection of the cloud data center considering disaster information," Journal of Communications and Networks, 16(12), pp. 2575-2580, Jun. 2012
17 Moon-goo Lee and Chun-sock Bae, "Next generation convergence security framework for advanced persistent threat," Journal of The Institute of Electronics Engineers of Korea, 50(9), pp. 2336-2343, Sep.2013
18 Chun-sock Bae, "A study on data center physical security requirements standardization," M.E. Thesis, Konkuk university Graduate School of Information and telecommunications, Feb. 2017
19 Jin-kyun Cho and Byung-seon Kim, "The cooling and air distribution systems for the optimal IT environment control in the (internet) data center," Architectural Institute of Korea, 24(2), pp. 313-320, Feb. 2008
20 Gil-heon Song and Taek-soo shin, "A study on the introduction of green IT based on the cases of implementing green internet data center," Information Systems Review, 11(2), pp. 147-167, Aug. 2009
21 Barbra Guttman and Edward Roback, "An introduction to computer security: the NIST handbook," NIST SP 800-12, Oct. 1995