http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Farkhod Alisherov,Haeng-kon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Ethical hacking is obviously a very controversial area with prosecution under the Computer Misuse Act only a stone's throw away if you overstep the mark and hack into a system or any mobile device without categorical authorisation from the relevant person(s). [1While everyone is concerned about penetration testing methodologies, and/or penetration testing certification, it is also important to consider a policy that should be followed by both the tester and the client to reduce financial and confidencial disparaties, and to bring conformity to the operations between the both parties, so this research suggests a policy that should be followed by penetration testers and clients of the penetration tests.
Considerations for Penetration Testing Policy Establishment
Farkhod Alisherov 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.5
Ethical hacking is obviously a very controversial area with prosecution under the Computer Misuse Act only a stone's throw away if you overstep the mark and hack into a system or any mobile device without categorical authorization from the relevant person(s). While everyone is concerned about penetration testing methodologies, and/or penetration testing certification, it is also important to consider a policy that should be followed by both the tester and the client to reduce financial and confidential disparities, and to bring conformity to the operations between the both parties, so this research suggests a policy that should be followed by penetration testers and clients of the penetration tests.
Secure SCADA Network Technology and Methods
Farkhod Alisherov,Seung-Hwan Jeon,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
The loss of integrity or of availability of data has the potential to adversely affect power utility core operations. The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a power outage, or it originates from inadvertent actions, equipment failure, or similar. Electric utilities require secure network and control system. This paper illustrates solutions for control networks and equipment, SCADA data and communications.
Farkhod Alisherov,Min-kyu Choi,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
With the familiarization of the penetration testing, more and more companies look for professionals in penetration testing to perform a penetration test. While professional skills are required in order for the test to be effective, certification of the penetration tester or penetration team is required and is more and more demanded. This paper suggests a methodology in choosing a penetration tester or a penetration testing team, and a brief certification listing is given.
Farkhod Alisherov(박호드 알리셀로브),Min-kyu Choi(최민규),Maricel O. Balitanas(마리셀 발리타나스),Tai-hoon Kim(김태훈) 한국멀티미디어학회 2009 한국멀티미디어학회 학술발표논문집 Vol.2009 No.1
The integration of SCADA systems with technologies such as the Internet and wireless network means that security became an important issue for these systems. While physical security has always been a priority for such systems, the new threat is that of cyber or electronic attacks. Such attacks can come from a manyof sources ranging from hackers to terrorists, employees or contractors. This research shows issues due to which SCADA systems are at risk and some suggestions, which need to be considered to protect your SCADA system.