Improved Security Monitoring and Control Using Analysis of Cyber Attack in Small Businesses

Jun Suk Hong, Young Hwan Lim, Won Hyung Park, Kwang Ho Kook

Abstract


Recent, Secure the small and medium-sized enterprises from advanced and intelligence cyber threat, 24 hours of prevention, detection and analysis is essential. Small and Medium Business monitoring center is operated by government financial support to protect and prevent these threats. Currently it provides security to about 900 small and medium-sized enterprises. This paper studies abnormal and attack packets from small and medium-sized businesses[enterprises] which is monitored by Small and Medium Business monitoring center and provides improvement of security control for small and medium-sized enterprises.


Full Text:

PDF

References


Ahn, S. J., Lee, K. H., and Park, W. H., “Security Monitering and Control,” Ehanmidia, pp. 212-244, 2014.

Center for Strategic and International Studies, “Net Losses : Estimating the Global Cost of Cybercrime,” Mcafee, 2014. 6. 9.

Han, C. H., Chai, S. W., and Yoo, B.-J., “A Quantitative Assessment Model of Private Information Breach,” Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 17-31, 2011.

Hyun, T. W., “Attack Method and Countermeasure using SNMP Vulnerability,” Dongseo University CNSL, 2009.

Inca Internet Inc. Ltd, “2014 year security report,” 2013. 11. 29.

Kim, C. H., “Security Threat and Coun- termeasure of financial transactions,” Privacy Security Conference, 2010.

KISA, “Internet Incident Response Report,” 2014.

Korea Technology and Information Promotion Agency for SMBs, “2013 Small and Medium Business Technology Security and Research,” 2013.

Lee, Y. and Larsen, K. R., “Threat of Coping Appraisal:Determinants of SMB Executives’ Decision to Adopt Anti-Malware Software,” European Journal of Information Systems, Vol. 18, pp. 177-187, 2009.

Nho, M. S. and Lee, S. Y., “Industrial Security of Small and Medium Business Research,” Korea Association for Public Administration, Vol. 44, No. 3, pp. 239- 259, 2013.

Park, S. T., “2013 year Main Incident Case and Response,” 2013 Hacking Defance Work shop, 2013.


Refbacks

  • There are currently no refbacks.