Intelligent Method for Building Security Countermeasures (original) (raw)

Abstract

It is critical to note that a weakness (or security hole) in any component of the IT systems may comprise whole systems. Applying of Security engineering and intelligent methods are needed to reduce security holes may be included in the software or systems. Therefore, more security-related intelligent researches are needed to reduce security weakness may be included in the systems. This paper proposes some intelligent methods for reducing the threat to the system by applying security engineering, and for building security countermeasure.

Preview

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ISO. ISO/IEC 21827 Information technology – Systems Security Engineering Capability Maturity Model (SSE-CMM)
    Google Scholar
  2. ISO. ISO/IEC 15408-1:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model
    Google Scholar
  3. Kim, T.-H., Lee, S.-Y.: Security Evaluation Targets for Enhancement of IT Systems Assurance. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 491–498. Springer, Heidelberg (2005)
    Chapter Google Scholar
  4. Kim, T.-H.: Draft Domestic Standard-Information Systems Security Level Management, TTA (2005)
    Google Scholar
  5. Kim, T.-H.: Approaches and Methods of Security Engineering. In: ICCMSE (2004)
    Google Scholar
  6. Kim, T.-H., Lee, S.-y.: Design Procedure of IT Systems Security Countermeasures. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 468–473. Springer, Heidelberg (2005)
    Chapter Google Scholar
  7. Kim, T.-H., Lee, S.-y.: A Relationship Between Products Evaluation and IT Systems Assurance. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3681, pp. 1125–1130. Springer, Heidelberg (2005)
    Chapter Google Scholar
  8. Kim, T.-H., Lee, S.-y.: Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim’s Block Model. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3682, pp. 1069–1075. Springer, Heidelberg (2005)
    Chapter Google Scholar
  9. Kim, T.-H., Hong, C.-h., Kim, M.-s.: Towards New Areas of Security Engineering. RSFDGrC. In: Ślęzak, D., Yao, J., Peters, J.F., Ziarko, W., Hu, X. (eds.) RSFDGrC 2005. LNCS (LNAI), vol. 3642, pp. 568–574. Springer, Heidelberg (2005)
    Chapter Google Scholar
  10. Kim, T.-H., Kim, H.-K.: A Relationship between Security Engineering and Security Evaluation. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 717–724. Springer, Heidelberg (2004)
    Chapter Google Scholar

Download references

Author information

Authors and Affiliations

  1. Department of Information Electronics Engineering, Ewha Womans University, Korea
    Tai-hoon Kim
  2. Department fo Computer Engineering, Daejun University, Korea
    Sun-myoung Hwang

Authors

  1. Tai-hoon Kim
  2. Sun-myoung Hwang

Editor information

Editors and Affiliations

  1. School of Design, Engineering and Computing, Bournemouth University, UK
    Bogdan Gabrys
  2. Centre for SMART Systems, School of Environment and Technology, University of Brighton, BN2 4GJ, Brighton, UK
    Robert J. Howlett
  3. School of Electrical and Information Engineering, Knowledge Based Intelligent Engineering Systems Centre, University of South Australia, SA, 5095, Mawson Lakes, Australia
    Lakhmi C. Jain

Rights and permissions

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, Th., Hwang, Sm. (2006). Intelligent Method for Building Security Countermeasures. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893004\_95

Download citation

Keywords

Publish with us