DOI QR코드

DOI QR Code

Security Analysis and Improvement of Integrated Security Management System

통합보안관리시스템 보안 분석 및 개선

  • Kim, Kyung-Shin (Dept. of Broadcasting & Media Engineering, Induk College)
  • 김경신 (인덕대학교 방송영상미디어과)
  • Received : 2015.01.20
  • Accepted : 2015.02.13
  • Published : 2015.02.28

Abstract

This thesis proposes how data security has changed since the emergence of 'Big Data' in 2012 and the type of Integrated Security Management System that needs to be built against security threats, based on an analysis of Big Data. Much research has been conducted in Big Data. I need to think about what an Integrated Security Management System requires in order to safeguard against security threats such as APT. I would like to draw a comparison between the current Integrated Security Management System and one that is based on Big Data, including its limitations and improvements, so that I can suggest a much improved version of Integrated Security Management System.

본 논문은 지난 2012년 이후 떠오른 개념인 '빅 데이터'의 등장으로 정보보안 환경이 어떻게 변화되고 있는지, 빅 데이터와 관련된 분석 기술을 바탕으로 보안위협으로부터 어떤 통합보안시스템을 구축해야 하는지 제안하고자 한다. 빅 데이터 분야에 대해서는 최근 활용 분야에 대한 연구가 활발히 진행 중이며 APT(Advanced Persistent Threats)와 같은 보안 위협으로부터 보호하기 위해 빅 데이터 기반 통합보안관리시스템에서는 어떤 요구사항이 필요한 지 살펴보고자 한다. 또한, 기존 통합보안관리시스템과 현재 빅 데이터 기반 통합보안관리시스템을 비교 분석하며 한계점은 무엇이며 보완되어야 할 점을 제안하여 개선된 통합보안관리시스템을 제안하고자 한다.

Keywords

References

  1. James Manyika etc, "Big data: The next frontier for innovation, competition, and productivity", McKinsey Global Institute, 2011
  2. Jyung Hyun Kim, "BigDataplatform-based socia-l net workdata analysis paractices", 2012
  3. John P. Wack, "Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls", NIST Special Publication, 1994
  4. KISA Internet Weekly, 2012.08.02
  5. Tyler Bell, "Big Data: An oppertunity in search of a metaphor", rader.oreilly.com/2011/02/big-datameterphor.html
  6. NACS : Client/Server Security Assessment and Awareness, Accessed; 2009.04
  7. Ahn, C. W. and S. G. Hwang, "Big Data technologies and main issues", Journal of Korean Institute of Information Scientist and Engineers, Vol.30, No.6, pp.10-17, 2012
  8. Kyung-Bae Min, Jang-Mook Kang, "Rights to Control Information and Related Security Technologies on the CyberSpace", Journal of the institute of internet, broadcasting and communicaion, Vol.10, No.2, pp.136-142, 2010