Abstract
Recently computer incidents have increased rapidly and their ripple effects have also grown. Since computer systems become critical infrastructures in various areas, it is more and more important to protect the network and computer system assets from malicious incidents. Attackers try to search the vulnerabilities of the network and system, and penetrate to the network and system to do some malicious actions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
British Standard Institution. BS7799: Guide to BS7799 Risk Assessment and Risk Management (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, E., Seo, JT., Im, E.G., Lee, CW. (2004). Vulnerability Analysis and Evaluation within an Intranet. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_45
Download citation
DOI: https://doi.org/10.1007/978-3-540-25952-7_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22125-8
Online ISBN: 978-3-540-25952-7
eBook Packages: Springer Book Archive