Threat scenario-based security risk analysis using use case modeling in information systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Young-Gab | - |
dc.contributor.author | Cha, Sungdeok | - |
dc.date.accessioned | 2021-09-06T08:22:02Z | - |
dc.date.available | 2021-09-06T08:22:02Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2012-03 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/105352 | - |
dc.description.abstract | Successful Security Risk Analysis (SRA) enables us to develop a secure information management system and provides valuable analysis data for future risk estimation. One of the qualitative techniques for SRA is the scenario method. This provides a framework for our explorations that raises our awareness and appreciation of uncertainty. However, the existing scenario methods are too abstract to be applicable to some situations and have not been formalized in information systems (ISs) because they do not explicitly define artifacts or have any standard notation. Therefore, this paper proposes the improved scenario-based SRA approach, which can create SRA reports using threat scenario templates and manage security risk directly in ISs. Furthermore, in order to show how to apply the proposed method in a specific environment, especially in a Broadband convergence Network (BcN) environment, a case study is presented. Copyright (C) 2011 John Wiley & Sons, Ltd. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.title | Threat scenario-based security risk analysis using use case modeling in information systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Young-Gab | - |
dc.contributor.affiliatedAuthor | Cha, Sungdeok | - |
dc.identifier.doi | 10.1002/sec.321 | - |
dc.identifier.scopusid | 2-s2.0-84863146130 | - |
dc.identifier.wosid | 000300710800009 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.5, no.3, pp.293 - 300 | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.volume | 5 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 293 | - |
dc.citation.endPage | 300 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | security risk analysis | - |
dc.subject.keywordAuthor | qualitative risk analysis | - |
dc.subject.keywordAuthor | scenario method | - |
dc.subject.keywordAuthor | use case modeling | - |
dc.subject.keywordAuthor | Broadband convergence Network (BcN) | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.