• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Development of CC Based Security Risk Analysis Tool


Kim In-Jung, Chung Yoon-Jung, Koh Jae-Young, Won Dong-Ho, Journal of Internet Computing and Services, Vol. 7, No. 1, pp. 31-38, Feb. 2006
Full Text:
Keywords: Risk Analysis, Asset, Threat, Vulnerability, Safeguard

Abstract

The importance of the Security Risk Analysis has emerged as security breaches and information leaks has occurred in the companies and organization: threats toward information system and its vulnerabilities has grown up as the dependence on the information-communication systems goes higher as a result of technological advances in IT industry, A Risk Analysis Tool helps to mitigate overall risk of an organization by analysing and evaluating critical information systems and providing security measures against threats to systems and its vulnerabilities as a means to identify the inherent dangers and prevent security intrusion incident, This paper defines risk analysis process by introducing Common Criteria Scheme and suggest a risk analysis tool that can be easily implemented by an information security manager.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Kim In-Jung, Chung Yoon-Jung, Koh Jae-Young, & Won Dong-Ho (2006). Development of CC Based Security Risk Analysis Tool. Journal of Internet Computing and Services, 7(1), 31-38.

[IEEE Style]
K. In-Jung, C. Yoon-Jung, K. Jae-Young and W. Dong-Ho, "Development of CC Based Security Risk Analysis Tool," Journal of Internet Computing and Services, vol. 7, no. 1, pp. 31-38, 2006.

[ACM Style]
Kim In-Jung, Chung Yoon-Jung, Koh Jae-Young, and Won Dong-Ho. 2006. Development of CC Based Security Risk Analysis Tool. Journal of Internet Computing and Services, 7, 1, (2006), 31-38.