Digital Library
Search: "[ keyword: Threat ]" (79)
취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구
현석우,
권태경,
Vol. 29, No. 5, pp. 1167-1177,
10월.
2019
10.13089/JKIISC.2019.29.5.1167
주제어: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
주제어: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
한국군 환경에 적합한 내부자(위협) 정의 및 완화방안 제안
원경수,
김승주,
Vol. 29, No. 5, pp. 1133-1151,
10월.
2019
10.13089/JKIISC.2019.29.5.1133
주제어: Insider, Insider threat, Mitigation, defense IT, military IT, Insider, Insider threat, Mitigation, defense IT, military IT
주제어: Insider, Insider threat, Mitigation, defense IT, military IT, Insider, Insider threat, Mitigation, defense IT, military IT
위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석
강수영,
김승주,
Vol. 29, No. 3, pp. 613-628,
6월.
2019
10.13089/JKIISC.2019.29.3.613
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
주제어: Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria), Threat modeling, STRIDE, IVI(In-Vehicle-Infotainment), SOTA(Security Over-The-Air), CC(Common Criteria)
위협 모델링을 이용한 선박 사이버보안 요구사항 연구
조용현,
차영균,
Vol. 29, No. 3, pp. 657-673,
6월.
2019
10.13089/JKIISC.2019.29.3.657
주제어: Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis, Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis
주제어: Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis, Threat-Modeling, MASS, Maritime Cyber Security, Ship Cyber Security, Threat Analysis
신뢰성 있는 스마트팩토리를 위한 사이버보안 아키텍처
김현진,
김성진,
김예솔,
김신규,
손태식,
Vol. 29, No. 3, pp. 629-643,
6월.
2019
10.13089/JKIISC.2019.29.3.629
주제어: Smartfactory, Architecture, Security Threats, Security requirement, Smartfactory, Architecture, Security Threats, Security requirement
주제어: Smartfactory, Architecture, Security Threats, Security requirement, Smartfactory, Architecture, Security Threats, Security requirement
전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구
한충희,
박순태,
이상준,
Vol. 29, No. 2, pp. 401-415,
4월.
2019
10.13089/JKIISC.2019.29.2.401
주제어: cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking, cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking
주제어: cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking, cyber threats, critical infrastructures, Cyber Security, cyber threats, IP blocking
데이터센터 물리 보안 수준 향상을 위한 물리보안 위협 분할도(PS-TBS)개발 연구
배춘석,
고승철,
Vol. 29, No. 2, pp. 439-449,
4월.
2019
10.13089/JKIISC.2019.29.2.439
주제어: Threat Breakdown Structure, Data Center Security, Physical Security, Threat Breakdown Structure, Data Center Security, Physical Security
주제어: Threat Breakdown Structure, Data Center Security, Physical Security, Threat Breakdown Structure, Data Center Security, Physical Security
X-box를 이용한 Session-oriented Cross play에 대한 보안 요구사항 분석
김동우,
강수영,
김승주,
Vol. 29, No. 1, pp. 235-255,
2월.
2019
10.13089/JKIISC.2019.29.1.235
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
주제어: Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game, Threat modeling, STRIDE, LINDDUN, Security Requirements, Cross-play, Console game
Threat Modeling을 이용한 PS4와 PC간의 Remote Play 상황 속 위험 분석
김혜민,
김휘강,
Vol. 28, No. 1, pp. 135-143,
2월.
2018
10.13089/JKIISC.2018.28.1.135
주제어: Remote Play, PS4, Internet, Threat modeling, Remote Play, PS4, Internet, Threat modeling
주제어: Remote Play, PS4, Internet, Threat modeling, Remote Play, PS4, Internet, Threat modeling
AHP를 활용한 IP-CCTV 위험 결정 모델(클라우드 컴퓨팅 기반으로)
정성후,
이경호,
Vol. 28, No. 1, pp. 229-239,
2월.
2018
10.13089/JKIISC.2018.28.1.229
주제어: IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP), IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP)
주제어: IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP), IP-CCTV, Cloud computing, Threat risk modeling, Analytic Hierarchy Process(AHP)