Security threats to internet: a Korean multi-industry investigation

作者: Bumsuk Jung , Ingoo Han , Sangjae Lee

DOI: 10.1016/S0378-7206(01)00071-4

关键词:

摘要: Abstract In recent years, a number of security problems with the Internet became apparent. New and current users need to be aware likelihood incidents steps they should take secure their sites. Before designing system, it is advisable identify specific threats against which protection required. The may classified into interruption, interception, modification, fabrication. extents these are examined across four industries in Korea — manufacturing, banking/financial, research institution/university, distribution/service. Banking/financial firms generally perceive categories more seriously than other industries. companies manufacturing industry consider interruption most serious. Research institutions/universities distribution/service regard modification as critical threats. appropriate technique recommended for each threat.

参考文章(21)
Rex Kelly Rainer, Charles A. Snyder, Houston H. Carr, Risk analysis for information technology Journal of Management Information Systems. ,vol. 8, pp. 129- 147 ,(1991) , 10.1080/07421222.1991.11517914
M. Smith, Computer security-threats, vulnerabilities and countermeasures Information Age archive. ,vol. 11, pp. 205- 210 ,(1989)
David M. Piscitello, A. Lyman Chapin, Open Systems Networking: Tcp/Ip and Osi ,(1993)
Moshe Morris Mano, Computer Security Management ,(1981)
Sead Muftic, Security mechanisms for computer networks Computer Networks. ,vol. 15, pp. 67- 71 ,(1989)
Karen D. Loch, Houston H. Carr, Merrill E. Warkentin, Threats to Information Systems: Today's Reality, Yesterday's Understanding Management Information Systems Quarterly. ,vol. 16, pp. 173- 186 ,(1992) , 10.2307/249574
Lawrence K. Cooper, Dennis J. Duncan, John Whetstone, Is Electronic Commerce Ready for the Internet?: A Case Study of a Financial Services Provider Information Systems Management. ,vol. 13, pp. 25- 36 ,(1996) , 10.1080/10580539608906999
J. P. Holbrook, J. K. Reynolds, Site Security Handbook RFC. ,vol. 1244, pp. 1- 101 ,(1991)
Charles P. Pfleeger, Security in Computing ,(1988)
Monica J. Garfield, Patrick G. McKeown, Planning for Internet security Information Systems Management. ,vol. 14, pp. 41- 46 ,(1997) , 10.1080/10580539708907029