Advanced security assessment for control effectiveness

Youngin You, Sangkyo Oh, Kyungho Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)


Initially, the field only dealt with sensitive security information. However, as operations on cyber space increases, the need for security in internet also increased. Thus, areas that requires security assessment also increased. But, to date, a security evaluation for each area is performed partially. Since security assessment does not reflect the characteristics of each area, the correct security level is difficult to determine. Therefore, new security indicator is required for the effective and efficient management. In this paper, we provide an advanced security assessment using edited indicators and common indicators.

Original languageEnglish
Title of host publicationInformation Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers
EditorsKyung-Hyune Rhee, Jeong Hyun Yi
PublisherSpringer Verlag
Number of pages11
ISBN (Electronic)9783319150864
Publication statusPublished - 2015
Event15th International Workshop on Information Security Applications, WISA 2014 - , Korea, Republic of
Duration: 2014 Aug 252014 Aug 27

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other15th International Workshop on Information Security Applications, WISA 2014
Country/TerritoryKorea, Republic of

Bibliographical note

Funding Information:
This research was supported by the MSIP(Ministry of Science, ICT and Future Planning), Korea, under the ITRC(Information Technology Research Center) support program (NIPA-2014-H0301-14-1004) supervised by the NIPA(National IT Industry Promotion Agency).

Publisher Copyright:
© Springer International Publishing Switzerland 2015.


  • ISMS
  • Security assessment
  • Security index

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Advanced security assessment for control effectiveness'. Together they form a unique fingerprint.

Cite this