메뉴 건너뛰기




Volumn 109, Issue , 2011, Pages 247-269

Cyber security: Threat identification, risk and vulnerability assessment

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84883157791     PISSN: 18746519     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-94-007-0719-1_13     Document Type: Article
Times cited : (3)

References (34)
  • 1
    • 84883137949 scopus 로고    scopus 로고
    • PDD-63 - Defining America's Cyberspace: National Plan for Information Systems Protection, An Invitation to a Dialog, White House, Version 1.0
    • PDD-63 - Defining America's Cyberspace: National Plan for Information Systems Protection, Version 1.0, An Invitation to a Dialog, White House, 2000.
    • (2000)
  • 3
    • 84883167931 scopus 로고    scopus 로고
    • The National Strategy to Secure Cyberspace, February 2003, downloaded at, on 08 November
    • The National Strategy to Secure Cyberspace, February 2003, downloaded at http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf on 08 November, 2009.
    • (2009)
  • 5
    • 84883184326 scopus 로고    scopus 로고
    • Internet World Stats, accessed at, 10 November
    • Internet World Stats, accessed at http://www.internetworldstats.htm, 10 November, 2009.
    • (2009)
  • 6
    • 84883191910 scopus 로고    scopus 로고
    • http://www.w3.org/People/Berners-Lee/ShortHistory.html
  • 8
    • 70449347213 scopus 로고    scopus 로고
    • Mining intelligence data in the benefit of critical infrastructures security: Vulnerability modeling, simulation and assessment, system of systems engineering
    • Gheorghe, A.V. and Vamanu, D. (2008) 'Mining intelligence data in the benefit of critical infrastructures security: vulnerability modeling, simulation and assessment, system of systems engineering', Int. J. System of Systems Engineering, Vol. 1, Nos. 1/2, pp. 189-221.
    • (2008) Int. J. System of Systems Engineering , vol.1 , Issue.1-2 , pp. 189-221
    • Gheorghe, A.V.1    Vamanu, D.2
  • 10
    • 84883142351 scopus 로고    scopus 로고
    • Class Notes from ENMA 771, Module 1: Complex Interdependent Systems
    • Gheorghe, A.V., Class Notes from ENMA 771, Module 1: Complex Interdependent Systems, 2009.
    • (2009)
    • Gheorghe, A.V.1
  • 11
    • 84883142827 scopus 로고    scopus 로고
    • Cyber Security Bulletin SB09-278, Vulnerability Summary for the Week of September 28, Downloaded from, 09 Nov, 2009
    • Cyber Security Bulletin SB09-278, Vulnerability Summary for the Week of September 28, 2009, Downloaded from http://www.us-cert.gov/cas/bulletins/SB09-278.html 09 Nov, 2009.
    • (2009)
  • 12
    • 84883170328 scopus 로고    scopus 로고
    • Downloaded on 09 November
    • http://www.msisac.org, Downloaded on 09 November, 2009.
    • (2009)
  • 13
    • 84883142315 scopus 로고    scopus 로고
    • Overview by the US-CCU of the Cyber Campaign Against Georgia in August of
    • Overview by the US-CCU of the Cyber Campaign Against Georgia in August of 2008, www.registan.net/.../US-CCU-Georgia-Cyber-Campaign-Overview.pdf
    • (2008)
  • 15
    • 84883200562 scopus 로고    scopus 로고
    • United States General Accounting Office Chapter Report, 05/22/96, GAO/AIMD-96-84, Information Security: Computer Attacks at Department of Defense Pose Increasing Risks
    • United States General Accounting Office Chapter Report, 05/22/96, GAO/AIMD-96-84, Information Security: Computer Attacks at Department of Defense Pose Increasing Risks.
  • 16
    • 84883159575 scopus 로고    scopus 로고
    • Wikipedia online dictionary, Downloaded, 9/13
    • Wikipedia online dictionary, Downloaded, 9/13/2009.
    • (2009)
  • 17
    • 84883168034 scopus 로고    scopus 로고
    • Adapted from MIL STD 882D
    • Adapted from MIL STD 882D.
  • 18
    • 77952521018 scopus 로고    scopus 로고
    • Managing and Regulating Networked Industries for Sustainability and Resilience, Longstaff, P.H., April 22
    • Managing and Regulating Networked Industries for Sustainability and Resilience, Longstaff, P.H., April 22, 2008.
    • (2008)
  • 21
    • 84883151236 scopus 로고    scopus 로고
    • http://www.ncircle.com/index.php?s=solution_Web-Application-Vulnerability-Statistics
  • 22
    • 84883192863 scopus 로고    scopus 로고
    • http://www.sans.org/top-cyber-security-risks/
  • 23
    • 67349217470 scopus 로고    scopus 로고
    • Abstraction-Based Analysis of Known and Unknown Vulnerabilities of Critical Information Infrastructures
    • Rieke, R. (2008) Abstraction-Based Analysis of Known and Unknown Vulnerabilities of Critical Information Infrastructures, Int. J. System of Systems Engineering, Vol. 1, Nos. 1/2, pp. 59-77.
    • (2008) Int. J. System of Systems Engineering , vol.1 , Issue.1-2 , pp. 59-77
    • Rieke, R.1
  • 26
    • 84883157584 scopus 로고    scopus 로고
    • Downloaded 11 November
    • http://www.nist.gov, Downloaded 11 November, 2009.
    • (2009)
  • 27
    • 84883183266 scopus 로고    scopus 로고
    • www.irgc.org
  • 28
    • 84883196248 scopus 로고    scopus 로고
    • Risk Governance: Trends and Challenges, Future Forum for Public Security, 15 Nov
    • Risk Governance: Trends and Challenges, Future Forum for Public Security, 15 Nov 2007.
    • (2007)
  • 29
    • 77952380200 scopus 로고    scopus 로고
    • Advanced Trust Negotiation in Critical Infrastructures, August 28
    • Advanced Trust Negotiation in Critical Infrastructures, Braghin, S., Fovino, I., Trombetta, A., August 28, 2008.
    • (2008)
    • Braghin, S.1    Fovino, I.2    Trombetta, A.3
  • 30
    • 84883200042 scopus 로고    scopus 로고
    • Implications of Cyber Vulnerabilities on the Resilience and Security of the Electric Grid, Subcommittee on emerging threats, cyber security, and science and Technology, May 21
    • Implications of Cyber Vulnerabilities on the Resilience and Security of the Electric Grid, Subcommittee on emerging threats, cyber security, and science and Technology, May 21, 2008.
    • (2008)
  • 31
    • 84883169861 scopus 로고    scopus 로고
    • Federal Plan for Cyber Security and Information Assurance Research and Development, National Science and Technology Council, April 2006, downloaded at, on 11 Nov
    • Federal Plan for Cyber Security and Information Assurance Research and Development, National Science and Technology Council, April 2006, downloaded at www.nitrd.gov/Pubs/csia/csia_federal_plan.pdf on 11 Nov, 2009.
    • (2009)
  • 32
    • 84883197158 scopus 로고    scopus 로고
    • National Science Foundation, Downloaded at, on 11 November
    • National Science Foundation, Downloaded at http://www.nsf.gov on 11 November, 2009.
    • (2009)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.