Detailed Information

Cited 0 time in webofscience Cited 8 time in scopus
Metadata Downloads

Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process

Full metadata record
DC Field Value Language
dc.contributor.authorShin, Jiho-
dc.contributor.authorYou, Ilsun-
dc.contributor.authorSeo, Jung Taek-
dc.date.accessioned2021-09-10T06:46:39Z-
dc.date.available2021-09-10T06:46:39Z-
dc.date.issued2020-11-27-
dc.identifier.issn1574-017X-
dc.identifier.issn1875-905X-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/19386-
dc.description.abstractThe industrial control system (ICS) inherits the attributes of the traditional information system, but because it has its own characteristics that availability of triad (CIA) of information security should be a top priority, it needs to be set differently from the traditional information security requirements. In response to the issue, TTAK.KO-12.0307 (Standard for Industrial Control System Information Security Requirements) proposed by the National Security Research Institute (NSRI) and established by the Telecommunications Technology Association (TTA) is being used. However, it is difficult to apply security requirements of TTAK.KO-12.0307 uniformly because of the reason that the characteristics of the ICS in each layer are different. There is also a limit to invest the security resources with equivalent priority for all requirements and ICS layers. It is still unresolved in the previous research studies which are related to information security resources, for example, Choi (2013), Ko et al. (2013), and Nah et al.'s (2016) studies. Therefore, this study tried to focus on what a top priority of information security requirements by the ICS in each layer is, using the analytic hierarchy process. As a result, we derived that the top priority requirement in the operation layer is "Identification Authentication Access Control," in the control layer is "Event Response," and in the field device layer is "Physical Interface Protection" with the highest importance. The results of this study can be utilized as a guideline for the security strategy and policy design by determining security requirements that should be prioritized in each layer of the ICS.-
dc.language영어-
dc.language.isoENG-
dc.publisherIOS Press-
dc.titleInvestment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1155/2020/8878088-
dc.identifier.scopusid2-s2.0-85097584138-
dc.identifier.wosid000598501500002-
dc.identifier.bibliographicCitationMobile Information Systems, v.2020-
dc.citation.titleMobile Information Systems-
dc.citation.volume2020-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE