빅데이터 기반 침해사고 및 정보보호 정책 정량 분석 방법론
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 정성훈 | - |
dc.contributor.author | 김휘강 | - |
dc.contributor.author | 우지영 | - |
dc.date.accessioned | 2021-09-03T12:00:10Z | - |
dc.date.available | 2021-09-03T12:00:10Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2017 | - |
dc.identifier.issn | 1598-849X | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/85240 | - |
dc.description.abstract | In this paper, we propose an analysis framework to capture the trends of information security incidents and evaluate the security policy based on the incident analysis. We build a big data from news media collecting security incidents news and policy news, identify key trends in information security from this, and present an analytical method for evaluating policies from the point of view of incidents. In more specific, we propose a network-based analysis model that allows us to easily identify the trends of information security incidents and policy at a glance, and a cosine similarity measure to find important events from incidents and policy announcements. | - |
dc.language | Korean | - |
dc.language.iso | ko | - |
dc.publisher | 한국컴퓨터정보학회 | - |
dc.title | 빅데이터 기반 침해사고 및 정보보호 정책 정량 분석 방법론 | - |
dc.title.alternative | The big data analysis framework of information security policy based on security incidents | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | 김휘강 | - |
dc.identifier.doi | 10.9708/jksci.2017.22.10.073 | - |
dc.identifier.bibliographicCitation | 한국컴퓨터정보학회논문지, v.22, no.10, pp.73 - 81 | - |
dc.relation.isPartOf | 한국컴퓨터정보학회논문지 | - |
dc.citation.title | 한국컴퓨터정보학회논문지 | - |
dc.citation.volume | 22 | - |
dc.citation.number | 10 | - |
dc.citation.startPage | 73 | - |
dc.citation.endPage | 81 | - |
dc.type.rims | ART | - |
dc.identifier.kciid | ART002277299 | - |
dc.description.journalClass | 2 | - |
dc.description.journalRegisteredClass | kci | - |
dc.subject.keywordAuthor | big data | - |
dc.subject.keywordAuthor | information security policy | - |
dc.subject.keywordAuthor | information security incident | - |
dc.subject.keywordAuthor | text analysis | - |
dc.subject.keywordAuthor | policy evaluation | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.