Browse > Article
http://dx.doi.org/10.12673/jkoni.2013.17.4.442

A System for Supporting The Cyber Security Control of I&C System  

Jung, Hyun-Mi (Korea Institute of Science and Technology Information)
Kim, Seok-Hun (Department of MobileMedia, Suwon Women's College)
Sung, Kyung (Department of ComputerEducation, Mokwon University)
Abstract
I&C (Instrumentation & Control) system is different from information system and the security design of the two systems are also different. The modeling activity is needed based on the security control guide in order to build I&C system security control. In this paper, the role and by the security control, we designed the relationship (that is, the relation schema) between the documents for 'The system for supporting the cyber security control of I&C system design' based on the security control guide. The designed schema plans 'The system for supporting the cyber security control of I&C system' for observing the security control guide, and is used as the database and content that supports its design and implementation. The process and system of the proposed schema is utilized and designed. The design of the schema and system is intensified in the design phase with the proposed mode and supporting the I&C system cyber security design.
Keywords
cyber security; security management; regulatory guide; relational schema; role - based schema;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hyun-Mi Jung, Kyung-Su Han and Gang-Soo Lee ," A Schema Design for Supporting The Cyber Security Control of SCADA ," Journal of Korea Knowledge Information Technology, vol 7, No 6, 2012
2 The Nuclear Regulatory Commission, http://nrcstp.ornl.gov/slo/regguide571.pdf
3 Cyber security programs for nuclear facilities; Regulatory Guide 5.71, U.S. Nuclear Regulatory Commission , 2010
4 Hyun-Mi Jung , Kyung-Su Han, Gang-Soo Lee and Su-Jin Jang "A role-based access analysis for the cyber security management," Journal of Future Game Technology (JFGT), vol. 2, No. 1, 2012
5 2004 The White Paper of National Information Security, http://www.nist.go.kr
6 Ron Derynck , "Cyber-Security and System Integrity for Transportation Networks," VeronoWhitepaper, 2004
7 Sylvia Osborn, Ravi Sandhu, Qamar Munawer, " Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Transactions on Information and System Security, vol. 3, No. 2, Pages 85-106, 2000   DOI
8 National Institute of Standards and Technology , http://hissa.nist.gov/prject/rbac.html
9 http://www.ecs.syr.edu/chin/cse774/readings/rbac/p34-ferraio.pdf
10 National Institute of Standards and Technology , http://csrc.nist.go.kr/rbac
11 http://en.wikipedia.org/wiki/Role-based_access_control