Browse > Article
http://dx.doi.org/10.9723/jksiis.2014.19.6.107

A Case Study on NAC System Implementation for Infringement Prevention of Information Assets  

Song, Yung Min (동아대학교 경영대학원)
Hong, Soon Goo (동아대학교 경영정보학과)
Kim, Hyun Jong (동아대학교 경영정보학과)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.19, no.6, 2014 , pp. 107-117 More about this Journal
Abstract
The importance of a network security to protect infringement of corporate assets has been issued due to the increasing various threats such as warm virus, vicious codes, and hacking. Thus, the goal of this research is to discover the procedure and methods for a NAC system implementation. In this case study, we suggest that the critical management issues during the implementing a NAC system as well as measure its performance in qualitative and quantitative perspective. The contribution of this paper is both to lead to the further research in this network security field and to provide a guideline for companies willing to introduce a NAC system.
Keywords
NAC; Network Access Control; Infringement Prevention; Case Study;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Samsung Electronics Security Group, "Loss Prevention Technology Direction for the Information Systems Security," 2007.
2 S. S. J, "The Improved-Scheme of Two Factor Authentication using SMS," Vol 17, No 6, pp.25-30, 2012.   과학기술학회마을   DOI
3 H. W. Kim, "A Priority Analysis on E-Commerce Security Factors-Focused on Researchers and Practitioners," Journal of the Korea Industrial Information System Society, Vol 16, No 2, pp.163-171, 2011.   과학기술학회마을   DOI
4 Korea Internet & Security Agency, "2014 National Information Security," White Papers, 2014.
5 Y. M. Lee, "Internet Security and Security Management System (ESM) Building Plan," Beaje University, Master Thesis, 2004.
6 J. W. Cha, C. H. Kim, "Design of FPGA Hardware Accelerator for Information Security System," Journal of the Korea Industrial Information System Society, Vol 18, No 5, pp.1-12, 2013.   과학기술학회마을   DOI
7 Korea Internet & Security Agency, "Information Security Survey 2012," 2012.
8 Mirage Networks, "Getting the Knack of NAC, 2006.
9 National Information Society Agency, "2007 Trends in the Domestic Market and the Industry Survey," 2007.
10 Korea Internet & Security Agency, "2013 National Information Security," White Papers, 2013.
11 J. S. Kim, "A Study on the Method of Applying NAC to End-point Security in University Computer Network," Seoul National University, Master Thesis, 2008.
12 H. S. Jun, "Effective Network Security Model for Dynamic Network Access Control," Korea University, Master Thesis, 2008.