A Study on Interface Security Enhancement

KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 5, pp. 171-176, May. 2015
10.3745/KTCCS.2015.4.5.171,   PDF Download:


Because the specific security technology alone can not cope with sophisticated attacks, various security management models are applied. But, they do not focus on the vulnerability of the highest part because they offer so many common security management criteria. By analyzing the main information and confidential leakage cases inflicting enormous damage to our society, we found that attackers are using mainly an interface vulnerabilities - the paths that connect the internal and external of the organization, such as e-mail, web server, portable devices, and subcontractor employees. Considering the reality that time and resources to invest in security domain are limited, we point out the interface security vulnerabilities the possibility of attackers to exploit and present a convergence method of security measures. Finally, based of ROI(Return on Investment), we propose the real-time security management system through the intensive and continuous management.

Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.

Cite this article
[IEEE Style]
J. J. Park, S. R. Kim, S. H. Ahn, C. H. Lim and K. J. Kim, "A Study on Interface Security Enhancement," KIPS Transactions on Computer and Communication Systems, vol. 4, no. 5, pp. 171-176, 2015. DOI: 10.3745/KTCCS.2015.4.5.171.

[ACM Style]
Joon Jeong Park, So Ra Kim, Soo Hyun Ahn, Chae Ho Lim, and Kwang Jo Kim. 2015. A Study on Interface Security Enhancement. KIPS Transactions on Computer and Communication Systems, 4, 5, (2015), 171-176. DOI: 10.3745/KTCCS.2015.4.5.171.