Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability |
Min, So-Yeon
(Dept. of Information and Communcation Eng., Seoil University)
Jung, Chan-Suk (N.O.BIZ Co. Ltd.) Lee, Kwang-Hyong (Dept. of Software Eng., Seoil University) Cho, Eun-Sook (Dept. of Software Eng., Seoil University) Yoon, Tae-Bok (Dept. of Software Eng., Seoil University) You, Seung-Ho (N.O.BIZ Co. Ltd.) |
1 | B. W. Jin, J. O. Park, M. S. Jun, A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment, The Journal of The Institute of Internet, Broadcasting and Communication (IIBC), vol. 16, no. 6, pp. 25-31, Dec. 31, 2016. DOI: https://doi.org/10.7236/JIIBC.2016.16.6.25 DOI |
2 | H. W. Noh, "A Study on the effective management of Critical Information Infrastructure Protection ", Soongsil University Information and Communications University, Master Thesis, 2012. |
3 | S. H. Jang, "A Study on Improvement of Evaluation Criteria for Information Security in Information Infrastructure", Dongguk University Graduate School of International Information Studies, Master Thesis, 2015. |
4 | H. S. Lee, "Implementation of Shell Script to Improve Security Vulnerabilities of Linux Server", Kyungpook National University Graduate School of Industry, Master Thesis, 2012. |
5 | N. K. Baik, Y. H. Lee, Design and caomparision of DDoS Attack and Defence Mechanism Classification system, Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, vol. 6, no. 12, pp. 595-604, Dec. 2016. DOI: http://dx.doi.org/10.14257/AJMAHS.2016.12.59 DOI |
6 | KISA, "Strategies for the improvement of the protections of the major information and communications infrastructures", 2013. |
7 | Ministry of Future Creation and Science, "Vulnerability Analysis and Evaluation Criteria for Information and Communication Infrastructure Facilities", Ministry of Future Creation and Science, 2013-37, 2013. |
8 | J. B. Kim, "A Study on the Successful Implementation about Vulnerability Supplmention and Effective Recovery from Damage related with web Application", Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, vol. 6, no. 1, pp. 53-60, Jan. 2016. DOI: http://dx.doi.org/10.14257/AJMAHS.2016.02.22 DOI |
9 | J. T. Kim, "Analyses of Requirement of Security based on Gateway Architecture for Secure Internet of Thing", Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, vol. 6, no. 3, pp. 461-470, Mar. 2016. DOI: http://dx.doi.org/10.14257/AJMAHS.2016.03.02 DOI |
10 | C. H. Cho, J. K. Bae, "An Exploratory Study on the Key Components of Financial Information Technology Compliance Systems: Focusing on the In-depth Interviews with Experts", Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, vol. 7, no. 6, pp. 785-795, Jun. 2017. DOI: http://dx.doi.org/10.14257/ajmahs.2017.06.48 DOI |
11 | S. T. Park, et al., "Vulnerability Analysis and Evaluation Management for the Protection of Major IT Infrastructure", Journal of Information Security 19th volume no. 6, 2009. |
12 | B. G. Joo,N. W. Min, M. S. Chang, C. K. Ahn, D. H. Yang, Development of Vulnerability Scanner using Search Engine, The Journal of The Institute of Webcasting, Internet Television and Telecommunication vol. 9 no. 1, pp. 19-24, 2009. |
13 | H. K. Yang, A Study of Security Weaknesses of QR Codes and Its Countermeasures, The Journal of The Institute of Webcasting, Internet and Telecommunication vol. 12 no. 1, pp. 83-89, 2012. DOI: http://dx.doi.org/10.7236/JIWIT.2012.12.1.83 |
14 | M. K. Yi, H. J. Hwang, "A Study on Security Weakness and Threats in Personal Health Record Services", The Journal of The Institute of Internet, Broadcasting and Communication (IIBC), vol. 15, no. 6, pp. 163-171, Dec. 2015. DOI: http://dx.doi.org/10.7236/JIIBC.2015.15.6.163 DOI |
15 | KISA, "IT Security Evaluation and Certification Guide", 2009. |
16 | KISA, "Establishment of information technology management system for new technology", 2010. |
17 | K. H. Han, I. S. Kim, "A Study on Threat Analysis of PC Security and Countermeasures in Financial Sector", The Journal of The Institute of Internet, Broadcasting and Communication(IIBC), vol. 15, no. 6, pp. 283-290, Dec. 2015. DOI: http://dx.doi.org/10.7236/JIIBC.2015.15.6.283 DOI |
18 | S. H. Kim, "(The)critical information and communication infrastructure technical field vulnerability assessment improvements research", 2016. |
19 | Moon-sung Hwang, Yong-Hee Lee, Jung-Ah Shim, Keun-Heiu Kim, "Study on Countermeasures and Security Vulnerability of Fintech Services", Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, vol. 6, no. 3, pp. 71-79, Mar. 2016. DOI: http://dx.doi.org/10.14257/AJMAHS.2016.03.24 DOI |
20 | Hee-Hoon Cho, Dal-Soo Weon, Jong-Bae Kim, "A Study on the Security Vulnerability of Android", Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, vol. 5, no. 6, pp. 1-8, Mar. 2015. DOI |
21 | Security Trends, "Need to upgrade system vulnerability check", 2016. |