A Study on the Enterprise security convergence strategy in the IoT(the Internet of Things) Era

IoT시대의 기업 융합보안 전략에 대한 연구

  • 노종호 (고려대학교 정보보호대학원) ;
  • 이종형 (고려대학교 정보보호대학원) ;
  • 권헌영 (고려대학교 정보보호대학원)
  • Received : 2017.05.15
  • Accepted : 2017.06.30
  • Published : 2017.06.30

Abstract

In the age of full scale IoT, concept of "security convergence" has been popularized widely. However, it is not clear whether current "security convergence" concept reflects IoT characteristics and traits. In this thesis, a new concept, complementing "security convergence" concept researches up to date, has been suggested considering IoT characteristics. Required governance methodology and key technical factors are suggested for re-establishment of "security convergence" concept and for enterprise security strategy development.

사물인터넷(IoT) 시대의 본격화와 더불어, 융합보안이라는 개념은 어디서나 쉽게 접하고 있다. 그러나 기존의 융합보안이라는 개념이 IoT 특성을 제대로 반영하고 있다고 보기에는 다소 어려움이 있다. 이에, 기존의 융합보안 개념을 IoT 특성을 고려하여 보완된 개념을 제시하였다. 더불어, 융합보안의 개념 모델 재정립과 기업의 융합보안전략을 수립하는 데 있어 필요한 거버넌스 체계와 기술적 요인에 대해 기술하였다.

Keywords

References

  1. Lee Chang-Moo, A Study on the Conceptual Definition of Industrial Security, The Journal of Korean Association for Industry Security, The Korean Association for Research of Industrial Security, 2011. 6.
  2. Jeon Jeong-Hoon, A study on the classification systems of domestic security fields, Journal of the Korea Society of Computer and Information 20(3), 2015.3, 81-88, https://doi.org/10.9708/jksci.2015.20.3.081
  3. Booz, Allen, Hamilton, "Convergence of Enterprise Security Organizations", The Alliance for Enterprise Security Risk Management (AESRM), November 8, 2005.
  4. Woo Kwang Jea, "Research trend and Cocentualization of Defense Industry Security from Convergence security perspective" Korea Convergence Security Association, Vol 15, issue 6, pp.69-78, Oct. 2015.
  5. Kim Jungduk, Kim kunwoo, Lee Yongduk, "the concept of security convergence and approach method", Journal of The Korea Institute of information Security & Cryptology, pp. 68-74, Dec. 2009.
  6. J.Kang, J. Lee, C. Hwang, and H. Chang. "The study on a convergence security service for manufacturing industries", Telecommunication Systems, Vol. 52, No. 2, pp. 1389-1397, 2013.
  7. Deloitte, "The Convergence of Physical and Information Security in the Context of Enterprise Risk Management", The Alliance for Enterprise Security Risk Management, 2007.
  8. The Open Security Exchange (OSE), "Physical/IT Security Convergence: What It Means, Why It's Needed, and How to Get There", 2007.
  9. Scalet S.D., "Convergence: Case Study", COSO online, 2005. W. Diffie and M.E, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
  10. Nicole S. Latimer-Livingston, "Let's Get Physical What Clients Are Asking About the Integration of Physical and Logical (IT) Security", Gartner, November 9, 2007.
  11. Ha Ok Hyun, "A Study on Convergence Security Control System for Industrial Security", Korea Convergence Security Association, Vol 9. issue 4, pp.1-6, 2009
  12. Kim Dong Hee, "A Study on the Establishment of Cyber Security Governance in the Age of Convergence", Korea University, Doctoral thesis, 2017.