@article{ART001898119},
author={Koohong Kang},
title={An Implementation Strategy for the Physical Security Threat Meter Using Information Technology},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2014},
volume={19},
number={7},
pages={47-57}
TY - JOUR
AU - Koohong Kang
TI - An Implementation Strategy for the Physical Security Threat Meter Using Information Technology
JO - Journal of The Korea Society of Computer and Information
PY - 2014
VL - 19
IS - 7
PB - The Korean Society Of Computer And Information
SP - 47
EP - 57
SN - 1598-849X
AB - In order to publicly notify the information security (Internet or Cyber) threat level, the securitycompanies have developed the Threat Meters. As the physical security devices are getting moreintelligent and can be monitored and managed through networks, we propose a physical securitythreat meter (PSTM) to determine the current threat level of physical security; that is a verysimilar compared with the one of information security. For this purpose, we investigate andprioritize the physical security events, and consider the impact of temporal correlation amongmultiple security events. We also present how to determine the threshold values of threat levels, and then propose a practical PSTM using the threshold based decision. In particular, we show thatthe proposed scheme is fully implementable through showing the block diagram in detail and thewhole implementation processes with the access controller and CCTV+video analyzer system.
Finally the simulation results show that the proposed PSTM works perfectly under some testscenarios.
KW - Physical security;Threat level;Information security
DO -
UR -
ER -
Koohong Kang. (2014). An Implementation Strategy for the Physical Security Threat Meter Using Information Technology. Journal of The Korea Society of Computer and Information, 19(7), 47-57.
Koohong Kang. 2014, "An Implementation Strategy for the Physical Security Threat Meter Using Information Technology", Journal of The Korea Society of Computer and Information, vol.19, no.7 pp.47-57.
Koohong Kang "An Implementation Strategy for the Physical Security Threat Meter Using Information Technology" Journal of The Korea Society of Computer and Information 19.7 pp.47-57 (2014) : 47.
Koohong Kang. An Implementation Strategy for the Physical Security Threat Meter Using Information Technology. 2014; 19(7), 47-57.
Koohong Kang. "An Implementation Strategy for the Physical Security Threat Meter Using Information Technology" Journal of The Korea Society of Computer and Information 19, no.7 (2014) : 47-57.
Koohong Kang. An Implementation Strategy for the Physical Security Threat Meter Using Information Technology. Journal of The Korea Society of Computer and Information, 19(7), 47-57.
Koohong Kang. An Implementation Strategy for the Physical Security Threat Meter Using Information Technology. Journal of The Korea Society of Computer and Information. 2014; 19(7) 47-57.
Koohong Kang. An Implementation Strategy for the Physical Security Threat Meter Using Information Technology. 2014; 19(7), 47-57.
Koohong Kang. "An Implementation Strategy for the Physical Security Threat Meter Using Information Technology" Journal of The Korea Society of Computer and Information 19, no.7 (2014) : 47-57.