摘要:It is more impo rtant to b uild strategies and proced ures can be u sed when new threat is detected. Byfollo win g th ese strategies and procedures, op erato rs can man ag e IS optimally and en coun ter to theth reat s ystematically. Sin ce than imp lem en tatio n of security co untermeasu res and manag em en t sy stemswere m erged to be used together [1 -5]. Comb ination o f th e security cou nterm easures and m an agements ystems is a go od solution bu t can n ot be a perfect o ne. Many vu lnerabilities are in clu ded in IS asev er. Th es e vu ln erabilities can b e foun d from eith er th e sub -sy stem s con stitute IS o r the process forco mbination o f sub-systems into whole systems. Even thou gh secu rity coun termeas ures are d esig ned an dm an aged well, vuln erabilities included in somewhere can be the cau se o f com pro mise of IS, basically.A new method that con siderin g s ecurity from the initial con cept design step was p ro posed to reducep otential v ulnerab ilities. B y ap plyin g th is meth od
关键词:Security Level M an ag em en t Process ; Information Assu rance