Earticle

현재 위치 Home

International Journal of Advanced Science and Technology

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJAST) [Science & Engineering Research Support Center, Republic of Korea(IJAST)]
  • pISSN
    2005-4238
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
vol.8 (4건)
No
1

Penetration Testing for Hire

Debnath Bhattacharyya, Farkhod Alisherov A.

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.8 2009.07 pp.1-8

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the familiarization of the penetration testing, more and more companies look for professionals in penetration testing to perform a penetration test. While professional skills are required in order for the test to be effective, certification of the penetration tester or penetration team is required and is more and more demanded. This paper suggests a methodology in choosing a penetration tester or a penetration testing team, and a brief certification listing is given.

2

Vulnerabilities of VPN using IPSec and Defensive Measures

Byeong-Ho Kang, Maricel O. Balitanas

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.8 2009.07 pp.9-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Data security plays a crucial role in modern times most business is transacted over the internet and even to wireless devices. This paper presents the vulnerabilities found in VPN using IPsec and suggested a set of Policy as a Defensive measure. Such policy suggested applies to implementations of VPN that are directed through an IPsec concentrator and to all company’ s employee, contractors, consultants, temporaries and other workers including all personnel affiliated with the third parties utilizing VPNs to access the company’ s network.

3

Categorization of Critical Infrastructures and Critical Information

Furkhat Tadjibayev A., Feruza Sattarova Y.

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.8 2009.07 pp.19-26

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A research on current condition and problems of critical infrastructures and critical information infrastructures is described in this paper. This article includes issues, the discussion of problems and comments about each of the common Critical Infrastructures from an international, national, local and individual perspective. There are many threats to these infrastructures. And it remains a challenge to the society to deliver solutions to problems such as these. Also the situation in Korea on each sector of Critical Infrastructure is considered in the article.

4

Compartmentalization of Protocols in SCADA Communication

Dong-joo Kang, Rosslin John Robles

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.8 2009.07 pp.27-36

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In SCADA systems, Communication is very important. In communication, protocols are needed to be implemented to avoid some problems. In the current state of SCADA communication, two protocols are widely used, the T101 or IEC 60870-5-101 (IEC101) and the DNP3 (Distributed Network Protocol). In this paper, we present each protocol and discuss the specifications of T101 and DNP3. This can help SCADA operators to select which protocol is suited for the operations of their SCADA systems.

 
페이지 저장