Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
As the information age matures, major social
infrastructures such as communication, finance, military and energy,
have become ever more dependent on information communication
systems. And since these infrastructures are connected to the Internet,
electronic intrusions such as hacking and viruses have become a new
security threat. Especially, disturbance or neutralization of a major
social infrastructure can result in extensive material damage and social
disorder. To address this issue, many nations around the world are
researching and developing various techniques and information
security policies as a government-wide effort to protect their
infrastructures from newly emerging threats. This paper proposes an
evaluation method for information security levels of CIIP (Critical
Information Infrastructure Protection), which can enhance the security
level of critical information infrastructure by checking the current
security status and establish security measures accordingly to protect
infrastructures effectively.
[1] The White House (The Department of Homeland Security),
http://www.whitehouse.gov/deptofhomeland/
[2] NIST SP800-53(Recommended Security Controls for Federal Information
System) http://www.nist.gov/
[3] NIST SP800-26 (Security Self-Assessment Guide for Information
Technology System) http://www.nist.gov
[4] SSE-CMM
[5] http://www.kisa.or.kr/isms/
[6] http://www.iwar.org.uk/
[1] The White House (The Department of Homeland Security),
http://www.whitehouse.gov/deptofhomeland/
[2] NIST SP800-53(Recommended Security Controls for Federal Information
System) http://www.nist.gov/
[3] NIST SP800-26 (Security Self-Assessment Guide for Information
Technology System) http://www.nist.gov
[4] SSE-CMM
[5] http://www.kisa.or.kr/isms/
[6] http://www.iwar.org.uk/
@article{"International Journal of Information, Control and Computer Sciences:63234", author = "Soon-Tai Park and Jong-Whoi Shin and Bog-Ki Min and Ik-Sub Lee and Gang-Shin Lee and Jae-Il Lee", title = "Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)", abstract = "As the information age matures, major social
infrastructures such as communication, finance, military and energy,
have become ever more dependent on information communication
systems. And since these infrastructures are connected to the Internet,
electronic intrusions such as hacking and viruses have become a new
security threat. Especially, disturbance or neutralization of a major
social infrastructure can result in extensive material damage and social
disorder. To address this issue, many nations around the world are
researching and developing various techniques and information
security policies as a government-wide effort to protect their
infrastructures from newly emerging threats. This paper proposes an
evaluation method for information security levels of CIIP (Critical
Information Infrastructure Protection), which can enhance the security
level of critical information infrastructure by checking the current
security status and establish security measures accordingly to protect
infrastructures effectively.", keywords = "Information Security Evaluation Methodology,Critical Information Infrastructure Protection.", volume = "2", number = "2", pages = "598-4", }