Browse > Article
http://dx.doi.org/10.33778/kcsa.2022.22.1.039

A Study on Cybersecurity Data Sharing System Model with a Hierarchical Structure for Effective Data Sharing  

Ho-jei Yu (호서대학교 정보보호학과 )
Chan-hee Kim (호서대학교 정보보호학과 )
Ye-rim Cho (호서대학교 정보보호학과 )
Sung-sik Im (호서대학교 정보보호학과 )
Soo-hyun Oh (호서대학교 컴퓨터공학부 )
Publication Information
Abstract
Recently, the importance of collecting, analyzing, and real-time sharing of various cybersecurity data has emerged in order to effectively respond to intelligent and advanced cyber threats. To cope with this situation, Korea is making efforts to expand its cybersecurity data sharing system, but many private companies are unable to participate in the cybersecurity data sharing system due to a lack of budget and professionals to collect cybersecurity data. In order to solve such problems, this paper analyzes the research and development trends of existing domestic and foreign cyber security data sharing systems, and based on that, propose a cybersecurity data sharing system model with a hierarchical structure that considers the size of the organization and a step-by-step security policy that can be applied to the model. In the case of applying the model proposed in this paper, it is expected that various private companies can expand their participation in cybersecurity data sharing systems and use them to prepare a response system to respond quickly to intelligent security threats.
Keywords
Cyber threat; Cybersecurity data; Cybersecurity information sharing system; Security policy;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 권정수, "[시장동향] '사이버 위협 인텔리전스', 차세대 보안 전략의 핵심으로 주목", 컴퓨터월드, 2020. 
2 유진상, ""고도화된 사이버 위협에 공동 대응"...韓 보안기업이 뭉쳤다", IT조선, 2020. 
3 과학기술정보통신부, "K-사이버방역 추진전략", 2021. 
4 한국인터넷진흥원, "2020년 4분기 사이버 위협 동향 보고서", pp. 38-44, 2020. 
5 한국인터넷진흥원, "사이버 위협정보 분석공유(C-TAS) 시스템",https://www.krcert.or.kr/webprotect/ctas.do 
6 the White House, "Presidential Decision Directive(PDD)-63: Critical Infrastructure Protection", 1998. 
7 "Critical Infrastructure Information Act", 6 U.S.C, 2002. 
8 김동희, 박상돈, 김소정, 윤오준.(2017).사이버 위협정보 공유체계 구축방안에 관한 연구 - 미국 사례를 중심으로 -.융합보안논문지 ,17(2),53-68. 
9 Mirko Manea, "D7.4 C3ISP Final Reference Architecture", 2019. 
10 Francesco Di Cerbo, "D4.3 C3ISP First implementation, test and validations of the Enterprise Pilot", 2018. 
11 Ali Sajjad, "D5.3 First implementation, test and validations of the SME Pilot", 2018. 
12 한국인터넷진흥원, "빅데이터 개인정보보호 가이드라인 해설서", 2015. 
13 ENISA, "Big Data Threat Landscape and Good Practice Guide", 2016. 
14 European Commission, "Proposal for a Regulation of the european parliament and of the council on European data governance", 2020. 
15 박상돈, "미국 사이버안보 정보공유법(CISA)의 규범적 의의", 융합보안논문지, 제17권, 제1호, pp..45-52, 2017. 
16 DHS, "Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under th Cybersecurity Information Sharing Act of 2015", 2020.