Browse > Article
http://dx.doi.org/10.33778/kcsa.2020.20.4.187

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment  

Han, Choong-Hee (전력거래소 안전보안실/정보보안팀)
Han, ChangHee (육군사관학교 교수부/AI연구센터)
Publication Information
Abstract
In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.
Keywords
Information Security Management; Risk Assessment; ISMS; ESC Model; foreign IP blocking;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Jang Sang Soo, 'Information Security Management System Authorized Judgement Defected Matter Analysis Study', Journal of The Korea Institute of Information Security & Cryptology, Vol. 20(1), pp. 31-38, Feb. 2010.
2 Legal Knowledge Information System, Act for Information and Communication Network Usage Promotion, Information Security, etc,. 2011
3 KISA, 'Study of Enhancement of Information Security Safety Diagnosis System Operation', 2009.
4 KISA, 'National Information Protection White Paper', May. 2019.
5 KISA, 'Notification on Information Security and Personal Information Security Management', Jan. 2019.