Browse > Article
http://dx.doi.org/10.5762/KAIS.2010.11.8.2801

A Study on Applying Information Security Requirement for WiBro System  

Kim, Min-Sun (Department of Distribution Management, Hyupsung University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.11, no.8, 2010 , pp. 2801-2808 More about this Journal
Abstract
The technology of WiBro, combining advantages of high speed internet and wireless internet provides the effectiveness and convenience provided by broadband and convergence. WiBro has developed due to supports of the related industries. The advancement of WiBro have created driving force for network advancement. WiBro is a niche market among high speed Internet, wireless LAN, Mobile phone, wireless internet. Through building relationship between market share and the existed telecommunication service, WiBro could improve the convenience of users. The security controls have to be built considering vulnerabilities of WiBro. Based on the study, the architecture of WiBro was suggested through reviewing the vulnerabilities and security controls in the wireless network and wire network. The appropriate security measures to be applied in the environment of WiBro. The outcomes of the study could improve the usage of WiBro.
Keywords
Information security requirement; WiBro; WiBro service;
Citations & Related Records
연도 인용수 순위
  • Reference
1 김종기, 김기윤, 이경석, 김정덕, "정보시스템 재해에 대비한 업무 지속성 관리," 정보보호학회지, Vol. 11, No. 1, pp. 9-19, 2001.   과학기술학회마을
2 Anderson R., "Why Information Security is Hard - An Economic Perspective," 17th Annual Computer Security Applications Conference, Dec. 2001.
3 Brink, D., A Guide to Determining Return on Investment for e-security, RSA Security Inc. 2001.
4 Cavusoglu, H., Mishra, B. and Raghunathan, S., "A Model for Evaluating IT Security Investments", Communications of the ACM, Vol. 47, No. 7, pp. 87-92, July 2004.   DOI   ScienceOn
5 Fung, A.R.W., Farn K.J., and Lin, A.C., "A Study on the Certification of the Information Security Management Systems," Computer Standards and Interfaces, Vol. 25, No. 5, pp. 447-461, 2003.   DOI
6 Lee, S., Park, S., Cho, C., Lee, H. and Ryu, S., "The Wireless Broadband(WiBro) System for Broadband Wireless Internet Services," IEEE Communications Magazine, Vol. 44, No. 7, pp. 106-112, 2006.
7 Eloff, M. and Solms, S.H., "Information. Security Management, An Hierachical Framework for Various Approaches," Computers and Security, Vol. 19, No. 3, pp. 243-256, 2000.   DOI
8 알엔디비즈 편집부, "와이브로 시장동향 리포트," (주)알엔디비즈, p. 13,, 2006.
9 Gentile, F., Giuri, L., Guida, F., Montolivo, E., and Volpe, M., "Security Evaluation in Information Technology Standards," Computers and Security, Vol. 13, No. 8, pp. 647-650, 1994.   DOI