Browse > Article
http://dx.doi.org/10.6109/jkiice.2014.18.3.761

The Design of Military Security Audit based on the M-ISMS Model  

Kim, Dae Gyu (Department of IT Convergence and Application Engineering, Pukyung National University)
Cho, Hee Joon (Department of Digital Management, Korea University)
Kim, Chang Soo (Department of IT Convergence and Application Engineering, Pukyung National University)
Abstract
We propose an improved M-ISMS(Military-ISMS) model which is based on common ISMS model for regarding military's unique characteristics. Our model focuses on 'Internal Security Audit' and 'Management of external activity' as military circumstances. So, we added the six control new items as internal security audits. Because the confidentiality is more important than availability in military service as compared with private sectors. In addition, we propose some control suggestions for establishing security management standards and keeping level maintenance when it will becomes to lose a value as confidential. The M-ISMS model in this paper has effectiveness which prevents security incidents in advance rapidly throughout a variety of common ISMS's advantages and security incidents of private sectors in consideration of military characteristics.
Keywords
M-ISMS; ISMS; Military-Information Security Management System; Information Security Management System; security inspection; security audit;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Jang-gyun Lee, "Let's build a system for monitoring of cyber terrorism" Hyundai Research Institute, Pending issue Reference, 2009.
2 KISA, 2013 National Information Security Whitepaper, 2013.
3 Ministry of National Defense, 2012 Military Whitepaper, ch. 6, pp. 136-140, 2013.
4 Telecommunications Technology Association. [Internet]. Available: http://word.tta.or.kr.
5 Kyoung-yun Ahn, "Design of Digital Forensics Control System based on ISMS Control Item," M.S. dissertation, Dongguk University, Seoul, 2011.
6 KISA, ISMS certification system guidebook v0.8, ch. 1, pp. 5, 2013.
7 Sang-soo Jang, "The effects of the operation of an information security management system on the performance of information security," Ph.D. dissertation, Chonnam University, Gwangju, 2011.
8 Dong-hee Park, "Probems of the Security Regulation and Improvement Measures," M.S. dissertation, Kyonggi University, Suwon, 2011.
9 S. S. Jang, B. N. Noh, and S. J. Lee, "The Effects of the Operation of an Information Security Management System on the Performance of Information Security," Journal of Korean Institue of Information Scientists and Engineers, vol. 40, no. 1, pp. 58-69, Feb. 2013.   과학기술학회마을
10 Hee-joon Cho, IT Governance Framework COBIT, ch. 2, pp. 41-46, 2010.
11 Seung-Han Ryu and Dae-Ryeong Jeong and Hoe-Kyung Jun, "Ways to establish public authorities information security governance utilizing E-government information security management system(G-ISMS)," Journal of KIICE, vol.17, no.4, pp.769-774, April 2013.