security standardization in the presence of unverifiable control chul ho lee with dr. geng and dr....
TRANSCRIPT
![Page 1: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/1.jpg)
The University of Texas at Dallas
![Page 2: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/2.jpg)
![Page 3: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/3.jpg)
3
–
ooo
“”
o
o
![Page 4: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/4.jpg)
4
Oct. 2010
Dec. 2004 Sep. 2006
Oct. 2008
![Page 5: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/5.jpg)
5
Relaxing of PCI-DSS standard
oo“”
![Page 6: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/6.jpg)
6
–
![Page 7: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/7.jpg)
7
“”
![Page 8: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/8.jpg)
8
–
oo
’
oo
![Page 9: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/9.jpg)
9
Introduction – A research on security standardization that highlights unverifiable controls and liability reduction effect
![Page 10: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/10.jpg)
10
–
![Page 11: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/11.jpg)
![Page 12: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/12.jpg)
12
••
••
••
••
••
••
••
••’
••
••
••’
••
•’••
•’••
![Page 13: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/13.jpg)
![Page 14: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/14.jpg)
( , ) 1V N V Ne e e e
( , ) (1 )(1 )V N V Ne e e e
( , ) 1 min( , )V N V Ne e e e
![Page 15: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/15.jpg)
o
’o
( , ) ( ) ( )SW SW V N SW V V N NU V e e D C e C e
( , )(1 ) ( ) ( )F F V N V F V V N NU V e e ke D C e C e
![Page 16: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/16.jpg)
![Page 17: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/17.jpg)
![Page 18: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/18.jpg)
18
–
’
’
![Page 19: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/19.jpg)
19
–
’
’
![Page 20: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/20.jpg)
20
–
’’
’’
![Page 21: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/21.jpg)
21
–
![Page 22: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/22.jpg)
22
–
’
ooo
![Page 23: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/23.jpg)
23
–
Ws s
Ws s
![Page 24: Security Standardization in the Presence of Unverifiable Control Chul Ho Lee With Dr. Geng and Dr. Raghunathan 2011. 6.15 The University of Texas at Dallas](https://reader036.vdocument.in/reader036/viewer/2022062423/56649e865503460f94b891e0/html5/thumbnails/24.jpg)
24
’
…