Security threats to Internet: a Korean multi-industry investigation

Abstract In recent years, a number of security problems with the Internet became apparent. New and current Internet users need to be aware of the likelihood of security incidents and the steps they should take to secure their sites. Before designing a secure system, it is advisable to identify the specific threats against which protection is required. The threats may be classified into interruption, interception, modification, and fabrication. The extents of these threats are examined across four industries in Korea — manufacturing, banking/financial, research institution/university, and distribution/service. Banking/financial firms generally perceive the four categories of threats more seriously than other industries. The companies in the manufacturing industry consider interruption to be the most serious. Research institutions/universities and distribution/service companies regard modification and interruption as critical threats. The appropriate security technique is recommended for each threat.

[1]  Lance J. Hoffman,et al.  A survey of issues in computer network security , 1986, Comput. Secur..

[2]  Steve Webb Crimes And Misdemeanours: How to Protect Corporate Information in the Internet Age , 2000, Comput. Secur..

[3]  Houston H. Carr,et al.  Risk Analysis for Information Technology , 1991, J. Manag. Inf. Syst..

[4]  Gerald L. Kovacich,et al.  Internet Targets , 2000, Comput. Secur..

[5]  M. Smith Computer security-threats, vulnerabilities and countermeasures , 1989 .

[6]  A. Lyman Chapin,et al.  Open Systems Networking: Tcp/Ip and Osi , 1993 .

[7]  Lawrence K. Cooper,et al.  Is Electronic Commerce Ready for the Internet? A Case Study of a Financial Services Provider , 1996, Inf. Syst. Manag..

[8]  Aime J. Bayle Security in open system networks: A tutorial survey , 1988 .

[9]  D. Parker Computer Security Management , 1981 .

[10]  Günther Pernul,et al.  Information systems security: Scope, state-of-the-art, and evaluation of techniques , 1995 .

[11]  Edward L. Witzke,et al.  A security methodology for computer networks , 1988, AT&T Technical Journal.

[12]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[13]  John Braun,et al.  Internet security , 2001 .

[14]  Steven Furnell,et al.  Computer hacking and cyber terrorism: the real threats in the new millennium? , 1999, Comput. Secur..

[15]  Amarnath Prakash The Internet as a Global Strategic IS Tool , 1996, Inf. Syst. Manag..

[16]  Monica J. Garfield,et al.  Planning for Internet Security , 1997, Inf. Syst. Manag..

[17]  Sead Muftic Security Mechanisms for Computer Networks , 1988, Comput. Networks.

[18]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[19]  Joyce K. Reynolds,et al.  Site Security Handbook , 1991, RFC.