본문 바로가기
  • Home

An Implementation Strategy for the Physical Security Threat Meter Using Information Technology

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2014, 19(7), pp.47-57
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science

Koohong Kang 1

1서원대학교

Accredited

ABSTRACT

In order to publicly notify the information security (Internet or Cyber) threat level, the securitycompanies have developed the Threat Meters. As the physical security devices are getting moreintelligent and can be monitored and managed through networks, we propose a physical securitythreat meter (PSTM) to determine the current threat level of physical security; that is a verysimilar compared with the one of information security. For this purpose, we investigate andprioritize the physical security events, and consider the impact of temporal correlation amongmultiple security events. We also present how to determine the threshold values of threat levels, and then propose a practical PSTM using the threshold based decision. In particular, we show thatthe proposed scheme is fully implementable through showing the block diagram in detail and thewhole implementation processes with the access controller and CCTV+video analyzer system. Finally the simulation results show that the proposed PSTM works perfectly under some testscenarios.

Citation status

* References for papers published after 2023 are currently being built.