Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2019.9.3.001

Study on Improvement of Vulnerability Diagnosis Items for PC Security Enhancement  

Cho, Jin-Keun (Division of Software Security, Korea University)
Publication Information
Journal of Convergence for Information Technology / v.9, no.3, 2019 , pp. 1-7 More about this Journal
Abstract
There are various cyber attacks on business PCs. In order to reduce the threat of PC security, we are preventing the vulnerability from being diagnosed beforehand. However, this guideline is difficult to cope with because the domestic vulnerability guide does not update the diagnostic items. In this paper, we examine the cyber infringement cases of PCs and the diagnostic items of foreign technical vulnerabilities in order to cope with security threats. In addition, an improved guide is provided by comparing the differences in the diagnostic items of technical vulnerability from abroad and domestic. Through 41 proposed technical vulnerability improvement items, it was found that various security threats can be coped with. Currently, it is mainly able to respond to only known vulnerabilities, but we hope that applying this guideline will reduce unknown security threats.
Keywords
PC Security; Technology Vulnerability Guide; Security incident; Information Security; Fishing attack;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 CISCO. (2018). Annual Cyber Security Report in 2018. USA : CISCO Publishing.
2 Ministry of Science and ICT. (2019). Number of hacking accident http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1363
3 Y. R. Jae & J. W. Cho. (2007). A Study on the Evaluation Consulting Methodology of Important Information Communication Base Facility 5(1), 55-68.
4 K. H. Han. (2015). A Study on Threat Analysis of PC Security and Countermeasures in Financial Sector. master dissertation. Korea University, Korea,
5 S. H. Kim. (2016). The Critical Information and Communication Infrastructure Technical Field Vulnerability Assessment Improvements Research. master dissertation. Konku University, Korea,
6 CIS. (2019). CIS Controls V7 in 2019. Center for Internet Security. https://www.cisecurity.org/controls/
7 S. H. Hong & J. A. Yu. (2018). Title. Ransomware attack analysis and countermeasures of defensive aspects 8(1), 139-145.   DOI
8 B. B. Jeon. (2018). A Study on the Countermeasures for Detecting Malicious Codes by Cyber Threats. master dissertation. Kongju National University, Korea,
9 L. D. Yu. (2015). Title. Threats and countermeasures of malware 5(1), 13-18.   DOI
10 S. Y. Hong. (2014). Title. Analysis and Countermeasure of Malicious Code, 4(2), 13-18.   DOI
11 M. S. Gu & Y. Z. Li. (2015). Title. A Study of Countermeasur es for Advanced Per sistent Threats attacks by malicious code, 5(4), 37-42.   DOI
12 KISA. (2018). Malicious code hidden site detection trend report Second half of 2018. Seoul : Korea Internet & Security Agency Publishing.
13 SK Infosec. (2018) Evolution of information deception and malicious code emote in 2018. http://blog.naver.com/PostView.nhn?blogId=skinfosec2000&logNo=221260804498&categoryNo=0&parentCategoryNo=0&viewDate=currentPage=1&postListTopCurrentPage=1&from=postView
14 KOREA COMMUNICATIONS COMMISSION. (2017). Virtual currency trading site Personal information leak in 2017. https://kcc.go.kr/user.do?mode=view&page=A05030000&dc=K05030000&boardId=1113&cp=1&ctx=ALL&searchKey=ALL&searchVal=%EB%B9%97%EC%8D%B8&boardSeq=45265
15 ACSC (2019). Hardening Microsoft Windows 10 in 2019. Australian Cyber Security Center. https://www.acsc.gov.au/publications/protect/hardening-win10.htm
16 S. H. Kim (2016). The Critical Information and Communication Infrastructure Technical Field Vulnerability Assessment Improvements Research. master dissertation. Konkuk University, Korea.
17 KISA. (2017). Critical Information Infrastructure Protection technical vulnerabilities analyze and evaluate Detail Guide in 2017. Seoul : Korea Internet & Security Agency Publishing.
18 STIG. (2018). Windows 10 Security Technical Implementation Guide in 2018. Security Technical Implementation Guide Viewer. https://www.stigviewer.com/stig/windows_10/