The Design and Implementation for Practical Risk Analysis Method & Modules 


Vol. 27,  No. 11, pp. 1081-1089, Nov.  2002


PDF
  Abstract

In these days many Organizations recognize risk of information asset by rapid change of information system environments, and need suitable management for that. Also many organization which operate important information-communication infrastructure take interest in threat, vulnerability and risk analysis of important asset by enforcement of Act on protection of information and communication infrastructure. But, it is most that methodology and tools that analyze risk for organization's information asset are developed in abroad up to now domestic research of this field is insufficient stage. An research of this field is necessary in domestic because it can't retlect domestic actuality by depending on most foreign methodology or a tool. In this paper we proposed design and implementation for the risk analysis methodology, a prototype and important modules that considers the user convenience. We expect that the result of this paper will for step improvement of domestic risk analysis methodology and tool developmenl.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Jung, I. Kim, C. Lee, "The Design and Implementation for Practical Risk Analysis Method & Modules," The Journal of Korean Institute of Communications and Information Sciences, vol. 27, no. 11, pp. 1081-1089, 2002. DOI: .

[ACM Style]

Yoon-Jung Jung, In-Jung Kim, and Cheol-Won Lee. 2002. The Design and Implementation for Practical Risk Analysis Method & Modules. The Journal of Korean Institute of Communications and Information Sciences, 27, 11, (2002), 1081-1089. DOI: .

[KICS Style]

Yoon-Jung Jung, In-Jung Kim, Cheol-Won Lee, "The Design and Implementation for Practical Risk Analysis Method & Modules," The Journal of Korean Institute of Communications and Information Sciences, vol. 27, no. 11, pp. 1081-1089, 11. 2002.