Analysis and Security Evaluation of Security Threat on Broadcasting Service
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Jong Han | - |
dc.contributor.author | Kim, Seung Joo | - |
dc.date.accessioned | 2021-09-03T03:28:05Z | - |
dc.date.available | 2021-09-03T03:28:05Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2017-08 | - |
dc.identifier.issn | 0929-6212 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/82691 | - |
dc.description.abstract | This paper defines and maps all possible threats to broadcasting services. Viewers currently use various types of broadcasting services-including cable TV, IPTV, and mobile TV, among others-and broadcast business operators are now developing the appropriate security mechanisms for each medium to safely and reliably provide broadcasting services to their audiences. Unlike mobile TV, which uses of a public network as in an over-the-top configuration, cable TV and IPTV are basically closed networks in terms of network security. However, they also link with external networks to provide additional services (bidirectional services or commerce-related services). Therefore, broadcast business operators of with various types of broadcast media are susceptible to security threats from which their broadcasting services may come to a halt or may be abused by hackers, such as with well-developed APT attacks, as well as other common external attacks. The common vulnerability scoring system for IT security is used to conduct a quantitative evaluation of the risk to security threats for broadcasting services. We also derive the results of a penetration test for the STB through the results presented with respect to a security threat. This result will help address potential security vulnerabilities in broadcasting services. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | MANAGEMENT | - |
dc.title | Analysis and Security Evaluation of Security Threat on Broadcasting Service | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Seung Joo | - |
dc.identifier.doi | 10.1007/s11277-017-4056-z | - |
dc.identifier.scopusid | 2-s2.0-85014071178 | - |
dc.identifier.wosid | 000407399800035 | - |
dc.identifier.bibliographicCitation | WIRELESS PERSONAL COMMUNICATIONS, v.95, no.4, pp.4149 - 4169 | - |
dc.relation.isPartOf | WIRELESS PERSONAL COMMUNICATIONS | - |
dc.citation.title | WIRELESS PERSONAL COMMUNICATIONS | - |
dc.citation.volume | 95 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 4149 | - |
dc.citation.endPage | 4169 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | MANAGEMENT | - |
dc.subject.keywordAuthor | Broadcasting service | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Threat | - |
dc.subject.keywordAuthor | Security evaluation | - |
dc.subject.keywordAuthor | CVSS | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.