최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지. Journal of KIISE. 시스템 및 이론, v.36 no.5, 2009년, pp.380 - 386
강필용 (한국인터넷진흥원 정보보호본부)
It is most important that identifying security threats(or vulnerabilities) of critical IT assets and checking the propriety of related security countermeasures in advance for enhancing security level. In this paper, we present a new security risk evaluation scheme based on critical assets and threat...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
S. Drew, "Reducing Enterprise Risk with Effective Threat Management," Information Systmes Security, vol.13, Jan. 2005, pp.37-42.
S. J. Scott, "Threat Management Systems - The State of Intrucsion Detection," Snort Documents, Aug. 2002, hppt://www.snort.org/docs/threatmenagement.pdf
Cisco Threat Response, http://www.cisco.com
Symantec DeepSight Threat Management System, http://www.symantec.com
G. Stonebumer, A. Goguen, and A. Feringa, "Risk Management Guide for Information Technology Systems," NIST SP 800-30, NIST, July 2002.
British Standard Institute, "Guide to BS7799 Risk Assessment," PD 3002:2002, 2002.
ISO/IEC JCT 1/SC 27, "Guidelines for the Management of IT Security(GMITS) - Park 3: Techniques for the Management of IT Security," ISO/IEC TR 13335-3:1998, 1998,
P. Kan and W. Si, "Mesage-basd Open EFramewor orSecurity ncidents Prevention and Respnse," Proceeding ofthe JWIS2007, Japan (Tkyo), Aug. 207, pp.395-408.
CVE - Common Vulnerabiliie and Expsures, MITRE,http://w.cve.itre.org
SNORT - Th OpenSourc etwork Inrusion Detection System, http://www.snort.org
NESSUS - Vuneablity Scanner, http://www.nessus.org
SARA - Security Auitor's Research Assistant,http://www.arc.com/sara/
BUGtrag,http://www.securityfocus.com
※ AI-Helper는 부적절한 답변을 할 수 있습니다.