A method of measuring the propagation of damage to information communication system

Dong Young Yoo, Wan S. Yi, Gang Shin Lee, Jin Young Choi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Nations and individuals are becoming increasingly dependent on information communication systems as they continue to evolve rapidly. As the number of information systems requiring protection increases, the costs also increase proportionally. Cyber attacks have the characteristic that preventive measures are not quite effective even when comprehensive information security measures are taken in advance, because the system's vulnerability is exploited. This paper presents a method of selecting an information communication system with high damage propagation to protect with priority, by measuring the ripple effect of damage to information communication system when a violation incident occurs. This paper may be referred to when selecting a system that will provide excellent cost-effectiveness by forecasting the degree of damage propagation in advance.

    Original languageEnglish
    Title of host publication2nd International Conference on Software Engineering and Data Mining, SEDM 2010
    Pages192-196
    Number of pages5
    Publication statusPublished - 2010
    Event2nd International Conference on Software Engineering and Data Mining, SEDM 2010 - Chengdu, China
    Duration: 2010 Jun 232010 Jun 25

    Publication series

    Name2nd International Conference on Software Engineering and Data Mining, SEDM 2010

    Other

    Other2nd International Conference on Software Engineering and Data Mining, SEDM 2010
    Country/TerritoryChina
    CityChengdu
    Period10/6/2310/6/25

    Keywords

    • Decision-making
    • Information communication system
    • Measuruing of damage

    ASJC Scopus subject areas

    • Software

    Fingerprint

    Dive into the research topics of 'A method of measuring the propagation of damage to information communication system'. Together they form a unique fingerprint.

    Cite this