DOI QR코드

DOI QR Code

Information Security Activity of Analysis Phase in Information Security Model in Accordance with SDLC

  • Shin, Seong-Yoon (School of Computer Information & Communication Engineering, Kunsan National University) ;
  • Lee, Tae-Wuk (Dept. of Computer Education, Korea National University of Education)
  • Received : 2016.10.14
  • Accepted : 2016.11.22
  • Published : 2016.11.30

Abstract

In this paper, we define four levels of analysis, design, implementation, and testing of the configuration of the development phase by S/W development life cycle. In particular, it dealt with the stage of the analysis phase to prepare an information system developed intensively. Details of the derivation of the information security requirements, it can be seen that comes from the perspective of confidentiality, integrity, availability and accountability, etc. It dealt with from the first manifestations of the projects planning to final planning to establish information security in activities of the Information Security requirements. As an example exhibited by assessing the information security analysis phase activities of S corporations, it can be seen that the improved sales rise in information security activities.

Keywords

References

  1. Myoung-Yong Um, Moon-Ki Rhee, Tae-Ung Kim, "Empirical Study on Internet Users' Information Privacy Concerns and Information Protection Behavior," J. of The Korean Association of Computer Education, Vol. 18, No. 1, pp. 69-79, Jan. 2016
  2. Kunwoo Kim, Jongduk Kim, "A study on effects of implementing information security governance by information security committee activities, " J. of The Korean Institute of Information Security & Cryptology, Vol. 25, No. 4, pp. 915-920, Aug. 2015 https://doi.org/10.13089/JKIISC.2015.25.4.915
  3. Dong-Keun Choi, Mi-Sun Song, Jong In Im, Kyung-Ho Lee, "Study the role of information security personnel have on an organization's information security level, " J. of The Korean Institute of Information Security & Cryptology, Vol. 25, No. 1, pp. 197-209, Feb. 2015 https://doi.org/10.13089/JKIISC.2015.25.1.197
  4. Byung-chul Kim, "The SME Informatization Level Analysis and Design for Privacy," J. of The Digital Convergence, Vol. 13, No. 2, pp. 121-126, Feb. 2016 https://doi.org/10.14400/JDC.2015.13.2.121
  5. Chang-Soo Moon, Sun-Hyung Kim, "A Study on Advanced Model for Personal Information Security Management," J. of KIIT, Vol. 13, No. 1, pp. 93-99, Jan. 2015
  6. Yeon-ho Jo, Yong-pil Lee, Jong-in Lim, Kyoung-ho Lee, "A Study on Policy for cost estimate of Security Sustainable Service in Information Security Solutions," J. of The Korean Institute of Information Security & Cryptology, Vol. 25, No. 4, pp. 905-914, Aug. 2015 https://doi.org/10.13089/JKIISC.2015.25.4.905
  7. Hyojik Lee, Onechul Na, Soyong Sung, Hangbae Chang," A Design on Security Governance Framework for Industry Convergence Environment," Journal of the Korea Convergence Society, Vol. 6, No. 4, pp. 33-40, Aug. 2015 https://doi.org/10.15207/JKCS.2015.6.4.033
  8. Yonghee Noh, Tae-Kyung Kim, "A Study on Developing Guidelines for Personal Information Protection in Library," J. of Korea Society for Information Management, Vol. 32, No. 2, pp. 21-61, Jun. 2015 https://doi.org/10.3743/KOSIM.2015.32.3.021
  9. Dal-mi Seo, Ki-Jong Cha, Yo-Soon Shin, Choong-Heui Jeong, Young-Mi Kim, "Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle," Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 2, pp. 363-374, Apr. 2015 https://doi.org/10.13089/JKIISC.2015.25.2.363
  10. Dae-Ha Park, Sang-Nyeong Yoo, Heung-Youl Youm, "Development of Information System Operational Audit Checklist for Personal Information Protection in Public Organizations," Journal of Security Engineering, Vol. 12, No. 1, pp. 47-64, Feb. 2015 https://doi.org/10.14257/jse.2015.02.02