Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Advanced approach to information security management system utilizing maturity models in critical infrastructure

Full metadata record
DC Field Value Language
dc.contributor.authorYou, Youngin-
dc.contributor.authorOh, Junhyoung-
dc.contributor.authorKim, Sooheon-
dc.contributor.authorLee, Kyungho-
dc.date.accessioned2021-09-02T05:00:19Z-
dc.date.available2021-09-02T05:00:19Z-
dc.date.created2021-06-19-
dc.date.issued2018-10-31-
dc.identifier.issn1976-7277-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/72425-
dc.description.abstractAs the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities. Currently, these methods of measuring information security are a concrete method of recommendation in related standards. However, the security controls used in these methods are lacking in connectivity, causing silo effect. In order to solve this problem, there has been an attempt to study the information security management system in terms of maturity. However, to the best of our knowledge, no research has considered the specific definitions of each level that measures organizational security maturity or specific methods and criteria for constructing such levels. This study developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. The proposed model is simulated using the thermal power sector in critical infrastructure of the Republic of Korea to confirm the possibility of its application to the field and derive core security processes and goals that constitute infrastructure security maturity. The findings will be useful for future research or practical application of infrastructure ISMSs.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherKSII-KOR SOC INTERNET INFORMATION-
dc.subjectAWARENESS-
dc.titleAdvanced approach to information security management system utilizing maturity models in critical infrastructure-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kyungho-
dc.identifier.doi10.3837/tiis.2018.10.020-
dc.identifier.scopusid2-s2.0-85057217012-
dc.identifier.wosid000448833400020-
dc.identifier.bibliographicCitationKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.12, no.10, pp.4995 - 5014-
dc.relation.isPartOfKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.citation.titleKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.citation.volume12-
dc.citation.number10-
dc.citation.startPage4995-
dc.citation.endPage5014-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART002401762-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusAWARENESS-
dc.subject.keywordAuthorCritical infrastructure-
dc.subject.keywordAuthorInformation Security Management System-
dc.subject.keywordAuthorMaturity model-
dc.subject.keywordAuthorSecurity evaluation-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Kyung Ho photo

Lee, Kyung Ho
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE