제어로봇시스템학회:학술대회논문집
- 2005.06a
- /
- Pages.1590-1593
- /
- 2005
Review of methodologies on network defects and vulnerability
- Park, Won-Joo (Information Security Development Division, ETRI) ;
- Seo, Dong-Il (Information Security Development Division, ETRI) ;
- Kim, Dae-Young (Dept. of Information Communications Engineering, CNU)
- Published : 2005.06.02
Abstract
Security defects occurring within corporate networks and the Internet may be abused by internal or external malicious attackers. Such abuses cause a financial toll through expenditures on additional human resources, the impact of down-time as problems are fixed, as well as damage from divulging corporate informational assets. Hence, through the precise analysis of the possible defects in network security and the identification of risks, preventative policy should be established to ensure maximum security. This report reviews methodologies that calculate and analyze levels of network security in order to resolve these problems, and generates appropriate test steps, test methods, and test items.