Browse > Article
http://dx.doi.org/10.13067/JKIECS.2018.13.2.405

A Study on Securing Stability following the proposal and Application of Integration Procedure following the Diversification Process of Information Security Policies  

Seo, Woo-Seok (Dept. Security Consulting, Gyeonggi-do R&D laboratory)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.13, no.2, 2018 , pp. 405-410 More about this Journal
Abstract
Distribution of a series of procedure for establishment and revision for various instructions on information security for public institutions and diversified process of performance system following the compliance with the instruction are applied to the integrated procedure that any revision or change has led to the studies that are applied on the basis of all environment requirements and the facilitation of such studies in the integrated procedure for the entire information security. However, as the difference of possessing the work territory for each institution, maintaining and securing the security with the heterogeneous type for subject, the information still displays the issues to link to a series of process to the procedure to secure the foregoing as stability, In addition, the notice should be made by the public institutions for the result structured and notified on the basis of budget and the additional time and expenses for re-distributing to the private institutions would be another issue for the part to accomplish the purpose of such study. Therefore, under this study, the subject of information security of similar institutions should be sorted out and statistically classified, and it proposes the integration procedure through a series of diversity and multi-change process and summarize the same in the proposed procedure to engage in studies to secure the optimal stability.
Keywords
Information Security; Policy; Diversification Process; Unification Process; Safety Secure;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Y. Joung, "Legal Concept :Based on Analysis of Cases about Information Security," Public law journal, vol 14, no. 4, 2013, pp. 209-243.
2 J. Jeong and M. Choi, "A Study on Awareness of Information Security Influencing Trustness," Journal of the Korean Institute of Information Security and Cryptology, vol. 25, no. 5, 2015, pp. 1225-1233.   DOI
3 M. Lee, "A Development of Curriculum for Information Security Professional Manpower Training," Journal of the Institute of Electronics and Information Engineers, vol 54, no. 1, 2017, pp. 46-52.   DOI
4 K. Son, "Status and Prospects of IT Security Industry in Korea," Communications of the Korean Institute of Information Scientists and Engineers, vol 28, no. 11, 2010, pp. 72-78.
5 M. Yim, "Why Security Awareness Education is not Effective?," Journal of digital convergence, vol 12, no. 2, 2014, pp. 27-37.   DOI
6 S. Son, J. Park, and S. Moon, "A Study on Improvement Measures of Information Security Relevant Laws for IoT Service Providers," Institute of Law Studies College of Law and Political Science, Pusan National University, vol 57, no. 1, 2016, pp. 181-215.
7 S. Kim and Y. Song, "An Empirical Study on Motivational Factors Influencing Information Security Policy Compliance and Security Behavior of End-Users(Employees) in Organizations," Global e-Business Association, vol 12, no. 3, 2011, pp. 327-349.
8 J. Yun, "A Study on the Short Term Curriculum for Strengthening Information Security Capability in Public Sector," Journal of the Korean Institute of Information Security and Cryptology, vol 226 no. 3, 2016, pp. 769-776.
9 B. Cha, J. Kim ,and S. Park, "Prototype Design of Hornet Cloud using Virtual Honeypot Technique," Korea Institute of Electronic Communication Sciences, vol 10, no. 8, 2015, pp. 891-900.   DOI
10 J. Jang, C. Choi ,and D. Kim, "Design of Smart Tourism in Big Data," Korea Institute of Electronic Communication Sciences, vol 12, no. 4, 2017, pp. 637-644.