Intelligent Method for Building Security Countermeasures (original) (raw)
Abstract
It is critical to note that a weakness (or security hole) in any component of the IT systems may comprise whole systems. Applying of Security engineering and intelligent methods are needed to reduce security holes may be included in the software or systems. Therefore, more security-related intelligent researches are needed to reduce security weakness may be included in the systems. This paper proposes some intelligent methods for reducing the threat to the system by applying security engineering, and for building security countermeasure.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
- ISO. ISO/IEC 21827 Information technology – Systems Security Engineering Capability Maturity Model (SSE-CMM)
Google Scholar - ISO. ISO/IEC 15408-1:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model
Google Scholar - Kim, T.-H., Lee, S.-Y.: Security Evaluation Targets for Enhancement of IT Systems Assurance. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 491–498. Springer, Heidelberg (2005)
Chapter Google Scholar - Kim, T.-H.: Draft Domestic Standard-Information Systems Security Level Management, TTA (2005)
Google Scholar - Kim, T.-H.: Approaches and Methods of Security Engineering. In: ICCMSE (2004)
Google Scholar - Kim, T.-H., Lee, S.-y.: Design Procedure of IT Systems Security Countermeasures. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 468–473. Springer, Heidelberg (2005)
Chapter Google Scholar - Kim, T.-H., Lee, S.-y.: A Relationship Between Products Evaluation and IT Systems Assurance. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3681, pp. 1125–1130. Springer, Heidelberg (2005)
Chapter Google Scholar - Kim, T.-H., Lee, S.-y.: Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim’s Block Model. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3682, pp. 1069–1075. Springer, Heidelberg (2005)
Chapter Google Scholar - Kim, T.-H., Hong, C.-h., Kim, M.-s.: Towards New Areas of Security Engineering. RSFDGrC. In: Ślęzak, D., Yao, J., Peters, J.F., Ziarko, W., Hu, X. (eds.) RSFDGrC 2005. LNCS (LNAI), vol. 3642, pp. 568–574. Springer, Heidelberg (2005)
Chapter Google Scholar - Kim, T.-H., Kim, H.-K.: A Relationship between Security Engineering and Security Evaluation. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 717–724. Springer, Heidelberg (2004)
Chapter Google Scholar
Author information
Authors and Affiliations
- Department of Information Electronics Engineering, Ewha Womans University, Korea
Tai-hoon Kim - Department fo Computer Engineering, Daejun University, Korea
Sun-myoung Hwang
Authors
- Tai-hoon Kim
- Sun-myoung Hwang
Editor information
Editors and Affiliations
- School of Design, Engineering and Computing, Bournemouth University, UK
Bogdan Gabrys - Centre for SMART Systems, School of Environment and Technology, University of Brighton, BN2 4GJ, Brighton, UK
Robert J. Howlett - School of Electrical and Information Engineering, Knowledge Based Intelligent Engineering Systems Centre, University of South Australia, SA, 5095, Mawson Lakes, Australia
Lakhmi C. Jain
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, Th., Hwang, Sm. (2006). Intelligent Method for Building Security Countermeasures. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893004\_95
Download citation
- .RIS
- .ENW
- .BIB
- DOI: https://doi.org/10.1007/11893004\_95
- Publisher Name: Springer, Berlin, Heidelberg
- Print ISBN: 978-3-540-46537-9
- Online ISBN: 978-3-540-46539-3
- eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science