Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.2.513

A Study of Pre-inspection for Information Security in Information System  

Lee, Keun-Ho (Division of Information Communication, Baekseok University)
Publication Information
Journal of Digital Convergence / v.12, no.2, 2014 , pp. 513-518 More about this Journal
Abstract
According to the development of IT technology, various new technologies are being produced. As the complexity of the information system like using the network and convergence devices is increasing, threat and vulnerability against various security problems are increasing even though new IT services provide the convenience of users' accessibility to services. In order to secure the safety of information system, the weakness is being removed through the information protection vulnerability analysis starting from information and communication service construction stage and the system is being prepared for pre-inspection activities about whether the information protection measures were established and applied. In this paper, introduction and current status of each country about advanced check-up systems in the information system are to be identified. Progress direction about the advanced pre-inspection system which is driven by Korea Internet Security Agency and its activation plan to secure the safety are to be suggested.
Keywords
Information System; Pre-inspection; Secure Coding; Security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Pilyong Kang, "Security Risk Evaluation Scheme for Effective Threat Management", Journal of KIISE:Information Networking", Vo.36, No.5, pp.380-386, 2009
2 S. Drew, "Reducing Enterprise Risk with Effective Threat Management," Information Systems Security, vol.13, Jan. 2005, pp.37-42.   DOI
3 G. Stonebumer, A. Goguen, and A. Feringa, "RiskManagement Guide for Information Technology Systems," NIST SP 800-30, NIST, 2002
4 DHS Security in the Software 라이프사이클, 2006
5 ISO/IEC 27036:Information Security for supplier relationships
6 ISA Security Compliance Institute(ISCI), Security Development 라이프사이클 assurance, 2013
7 Keun-Ho Lee, "Analysis of Threats Factor in IT Convergence Security", Journal of the Korea Convergence Society, Vol.1, No.1, pp. 49-55, 2010
8 Keun-Ho Lee, "A Security Threats in Wireless Charger Systems in M2M", Journal of the Korea Convergence Society, Vol.4, No.1, pp. 1-5, 2013
9 Education Course of Information Security Pre-inspection, KISA, 2013.10.21-2013.10.23