Analysis and Security Evaluation of Security Threat on Broadcasting Service
- Authors
- Lee, Jong Han; Kim, Seung Joo
- Issue Date
- 8월-2017
- Publisher
- SPRINGER
- Keywords
- Broadcasting service; Security; Threat; Security evaluation; CVSS
- Citation
- WIRELESS PERSONAL COMMUNICATIONS, v.95, no.4, pp.4149 - 4169
- Indexed
- SCIE
SCOPUS
- Journal Title
- WIRELESS PERSONAL COMMUNICATIONS
- Volume
- 95
- Number
- 4
- Start Page
- 4149
- End Page
- 4169
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/82691
- DOI
- 10.1007/s11277-017-4056-z
- ISSN
- 0929-6212
- Abstract
- This paper defines and maps all possible threats to broadcasting services. Viewers currently use various types of broadcasting services-including cable TV, IPTV, and mobile TV, among others-and broadcast business operators are now developing the appropriate security mechanisms for each medium to safely and reliably provide broadcasting services to their audiences. Unlike mobile TV, which uses of a public network as in an over-the-top configuration, cable TV and IPTV are basically closed networks in terms of network security. However, they also link with external networks to provide additional services (bidirectional services or commerce-related services). Therefore, broadcast business operators of with various types of broadcast media are susceptible to security threats from which their broadcasting services may come to a halt or may be abused by hackers, such as with well-developed APT attacks, as well as other common external attacks. The common vulnerability scoring system for IT security is used to conduct a quantitative evaluation of the risk to security threats for broadcasting services. We also derive the results of a penetration test for the STB through the results presented with respect to a security threat. This result will help address potential security vulnerabilities in broadcasting services.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.