Browse > Article
http://dx.doi.org/10.13067/JKIECS.2019.14.1.111

A Study on the Application of Modularization Technique to Standard Security Policy to Protect Information Assets and the Securement of Confidentiality and Integrity  

Seo, Woo-Seok (Dept. Security Consulting, Gyeonggi-do R&D laboratory)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.14, no.1, 2019 , pp. 111-118 More about this Journal
Abstract
For the security of a vast amount of information, it has been started to diagnose the site as a way of operating and managing the information owned by a company holding assets, to establish indexes to check the actual status and all kinds of standards to obtain security, and also to classify the information assets based on that. This has been extended to many different areas including policies to operate and manage information assets, services, the management of owned devices as physical assets, and also the management of logical assets for application software and platforms. Some of these information assets are already being operated in reality as new technology in new areas, for example, Internet of Things. Of course, a variety of electronic devices like Smart Home are being used in ordinary families, and unlike in the past, these devices generate a series of information life cycles such as accumulating and processing information. Moreover, as even distribution is now being realized, we are facing a task to secure the stability of information assets and also information that assets are holding. The purpose of this study is to suggest and apply standard security policy by moduling methods for information assets owned by companies and even families and obtain the enhancement of confidentiality as well as integrity.
Keywords
Confidentiality; Information Assets; Integrity; Modularization Techniques; Security Policy;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 Y. Lee, "A Design and Analysis of Multiple Intrusion Detection Model," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, 2016, pp. 619-626.   DOI
2 K. Kim, D. Wang, and S. Han, "Home Security System Based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 1, 2017, pp. 147-154.   DOI
3 K. Kim, Y. Park, S. Ro, and B. Kim, "Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method," J. of the Korea Institute of Electronic Communication Sciences, vol. 16 no. 9, 2012, pp. 1955-1962.
4 C. Choi, Y. Lee, and Tae. Lee, "Improvement Method of ELIS Local Laws and Regulations Format for Personal Information Protection," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 11, 2016, pp. 1017-1024.   DOI
5 S. Paik, S. Kim, and H. Park, "Design and Implementation of Network Access Control for Security of Company Network," J. of the Korea Institute of Electronic Communication Sciences, vol. 47, no. 12, 2010, pp. 90-96.
6 J. Yun, "A Study on the Short Term Curriculum for Strengthening Information Security Capability in Public Sector," Journal of the Korean Institute of Information Security and Cryptology, vol. 226 no. 3, 2016, pp. 769-776.   DOI
7 S. Park and N. Kim, "A Verification Case Study about the Authentication of a Network using AAA," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 2, 2017, pp. 295-300.   DOI
8 M. Yim, "Why Security Awareness Education is not Effective?," J. of digital convergence, vol. 12, no. 2, 2014, pp. 27-37.   DOI
9 J. Jang, C. Choi, and D. Kim, "Design of Smart Tourism in Big Data,"J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 4, 2017, pp. 637-644.   DOI
10 B. Cha, J. Kim, and S. Park, "Prototype Design of Hornet Cloud using Virtual Honeypot Technique," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 8, 2015, pp. 891-900.   DOI