DOI QR코드

DOI QR Code

A Security Evaluation Model On Multiple Protection Countermeasures

다중보호대책에 대한 보안성 평가모델

  • Published : 1998.09.01

Abstract

본 논문에서는 다중보호대책으로 구성된 정보보호시스템의 보호효과를 평가하기 위한 새로운 모델을 제안한다. 제안한 모델은 정보보호시스템이 요구되는 보호수준에 부합하는지 결정할 수 있게 하며, 또한 구축된 정보보호시스템의 위혐분석을 위하여 활용될 수 있다.

Keywords

References

  1. IEEE Conceptual Model for Computer Security Risk Analysis Bodeau, A.
  2. Common Criteria for Information Technology Security Evaluation, CCIB-98-028, Version 2.0 Common Criteria Implementation Board
  3. 9th Annual Canadian Information Technology Security Symposium Threat Assessments Addressing the Unknown in Risk Management John F. Clayton
  4. The Canadian Trusted Computer Product Evaluation Criteria, Version 3.0e Canadian System Security Centre
  5. A Guide to Risk Management Framework for Information Technology Systems Communications Security Establishment
  6. FIPS Pub 65, Guidelines for Automated Data Processing Risk Analysis U. S. Department of Commerce/NBS
  7. CSC-STD-001-83 Trusted Computer System Evaluation Criteria Department of Defense Standard
  8. Technical rationale behind CSC-STD-003-85: Computer security requirements, Guidance for applying the DOD TCSEC in specific environments, CSC-STD-004-85 Department of Defense
  9. Proceedings of the 17th National Computer Security Conference The Security-Specific Eight Stage Risk Assessment Methodology Drake, Morse
  10. Information Technology Security Evaluation Criteria(ITSEC), Version 1.2 (Provisional) Harmonised Criteria of France, Germany, the Netherlands, and the United Kingdom
  11. Guidelines for the Management of IT Security, TR 13335 ISO/IEC JTC1
  12. Federal Criteria for Information Technology Security(Version 1.0) National Institute of Standards and Technology and National Security Agency
  13. Computer System and Network Security White;Fisch;Pooch
  14. 정보통신망침입차단 시스템평가기준 정보통신부
  15. 대기행렬이론 이호우