Skip to main content

Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim’s Block Model

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3682))

Abstract

Because the networks and systems become more complex, the implementation of the security countermeasures becomes more critical consideration. The designers and developers of the security policy should recognize the importance of building security countermeasures by using both technical and non-technical methods, such as personnel and operational facts. Security countermeasures may be made for formulating an effective overall security solution to address threats at all layers of the information infrastructure. This paper uses the security engineering principles for determining appropriate security countermeasures. This paper proposes a intelligent method for building security countermeasures by modeling and dividing IT systems and security components into some blocks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, T.-H., No, B.-G.: Threat Description for the PP by Using the Concept of the Assets Protected by TOE. In: Sloot, P.M.A., Abramson, D., Bogdanov, A.V., Gorbachev, Y.E., Dongarra, J., Zomaya, A.Y. (eds.) ICCS 2003. LNCS, vol. 2660, pp. 605–613. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Kim, T.-h., Kim, H.-k.: The Reduction Method of Threat Phrases by Classifying Assets. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, Springer, Heidelberg (2004)

    Google Scholar 

  3. Kim, T.-h., Kim, H.-k.: A Relationship between Security Engineering and Security Evaluation. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, Springer, Heidelberg (2004)

    Google Scholar 

  4. Lee, E.-s., Lee, K.W., Kim, T.-h., Jung, I.-H.: Jung: Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 451–460. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Kim, T.-h., Hong, C.-w., Jung, S.-h.: Countermeasure Design Flow for Reducing the Threats of Information Systems. In: ICCMSE 2004 (2004)

    Google Scholar 

  6. Kim, T.-h., Lee, T.-s., Cho, K.-m., Lee, K.-g.: The Comparison Between The Level of Process Model and The Evaluation Assurance Level. The Journal of The Information Assurance 2(2), KIAS (2002)

    Google Scholar 

  7. Kim, T.-h., Sung, Y.-g., Cho, K.-m., Kim, S.-h., No, B.-g.: A Study on The Efficiency Elevation Method of IT Security System Evaluation via Process Improvement. The Journal of The Information Assurance 3(1) (2003)

    Google Scholar 

  8. Kim, T.-h., Lee, T.-s., Kim, M.-c., Kim, S.-m.: Relationship Between Assur- ance Class of CC and Product Development Process. In: The 6th Conference on Software Engineering Technology, SETC (2003)

    Google Scholar 

  9. Shin, H.-J., Kim, H.-K., Kim, T.-H., Kim, S.-H.: A study on the Requirement Analysis for Lifecycle based on Common Criteria. In: Proceedings of The 30th KISS Spring Conference, KISS (2003)

    Google Scholar 

  10. Kim, H.-K., Kim, T.-H., Kim, J.-s.: Reliability Assurance in Development Process for TOE on the Common Criteria. In: 1st ACIS International Conference on SERA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, Th., Lee, Sy. (2005). Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim’s Block Model. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_148

Download citation

  • DOI: https://doi.org/10.1007/11552451_148

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28895-4

  • Online ISBN: 978-3-540-31986-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics