Information system modeling for analysis of propagation effects and levels of damage
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, InJung | - |
dc.contributor.author | Chung, YoonJung | - |
dc.contributor.author | Lee, YoungGyo | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.contributor.author | Won, Dongho | - |
dc.date.accessioned | 2022-12-21T11:35:52Z | - |
dc.date.available | 2022-12-21T11:35:52Z | - |
dc.date.created | 2022-08-26 | - |
dc.date.issued | 2006-05 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/181539 | - |
dc.description.abstract | The number of newly developed information systems has grown considerably in their areas of application, and their concomitant threats of intrusions for the systems over the Internet have increased, too. To reduce the possibilities of such threats, studies on security risk analysis in the field of information security technology have been actively conducted. However, it is very difficult to analyze actual causes of damage or to establish safeguards when intrusions on systems take place within the structure of different assets and complicated networks. Therefore, it is essential that comprehensive preventive measures against intrusions are established in advance through security risk analysis. Vulnerabilities and threats are increasing continuously, while safeguards against these risks are generally only realized some time after damage through an intrusion has occurred. Therefore, it is vital that the propagation effects and levels of damage are analyzed using real-time comprehensive methods in order to predict damage in advance and minimize the extent of the damage. For this reason we propose a modeling technique for information systems by making use of SPICE and Petri-Net, and methods for analyzing the propagation effects and levels of damage based on the epidemic model. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.title | Information system modeling for analysis of propagation effects and levels of damage | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.identifier.doi | 10.1007/11751595_7 | - |
dc.identifier.scopusid | 2-s2.0-33745895284 | - |
dc.identifier.wosid | 000237648300007 | - |
dc.identifier.bibliographicCitation | COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, v.3982, pp.54 - 63 | - |
dc.relation.isPartOf | COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3 | - |
dc.citation.title | COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3 | - |
dc.citation.volume | 3982 | - |
dc.citation.startPage | 54 | - |
dc.citation.endPage | 63 | - |
dc.type.rims | ART | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | Computer simulation | - |
dc.subject.keywordPlus | Electronic crime countermeasures | - |
dc.subject.keywordPlus | Mathematical models | - |
dc.subject.keywordPlus | Risk assessment | - |
dc.subject.keywordPlus | Security of data | - |
dc.subject.keywordPlus | Security systems | - |
dc.subject.keywordAuthor | risk analysis | - |
dc.subject.keywordAuthor | intrusion | - |
dc.subject.keywordAuthor | damage propagation | - |
dc.subject.keywordAuthor | safeguard | - |
dc.subject.keywordAuthor | epidemic | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/11751595_7 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.