An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification


KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 8, pp. 271-276, Aug. 2014
10.3745/KTCCS.2014.3.8.271,   PDF Download:

Abstract

This study analyzed that N/A check items affect the results of the security level degree, when performing vulnerability analysis. evaluation. For this, we were used vulnerability analysis.evaluation range, check items and quantitative calculation method. Furthermore, were applied grade and weight for the importance of the items. In addition, because technology develop rapidly, the institution is always exposed risk. therefore, this study was carried out empirical analysis by applying RAL(Risk Acceptabel Level). According to the analyzed result N/A check items factors affecting the level of security has been proven. In other words, this study found that we shall exclude inspection items irrelevant to the institution characteristics, when perform vulnerability analysis.evaluation. In this study suggested that security level evaluation shall performed, after that exclude items irrelevant to the institution characteristics based on empirical verification. And also, it proposed that model research is required for establish check items for which analysis-evaluate vulnerability based on empirical verification.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. H. Lee, K. S. Sung, H. S. Oh, "An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification," KIPS Transactions on Computer and Communication Systems, vol. 3, no. 8, pp. 271-276, 2014. DOI: 10.3745/KTCCS.2014.3.8.271.

[ACM Style]
Jun Ho Lee, Kyung Sang Sung, and Hea Seok Oh. 2014. An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification. KIPS Transactions on Computer and Communication Systems, 3, 8, (2014), 271-276. DOI: 10.3745/KTCCS.2014.3.8.271.