• Title/Summary/Keyword: 보안산업

Search Result 1,695, Processing Time 0.026 seconds

A Framework for Verifying Payment Protocol Security (지불프로토콜 보안 검증을 위한 구조)

  • 한국희;권영직
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.209-218
    • /
    • 2002
  • 보안의 형식검증은 시스템의 초기 상태를 정의하고 트랜잭션을 통해 그 상태를 추적하며 보안을 위해 각 상태를 체크하는 과정이다. 보안 증명이 잘못될 수 있는 경우는 시스템의 초기상태를 정의할 때와 상태가 안전하기 위한 조건을 정의할 때인데, 본 논문에서는 상태 트랜잭션을 위해 BAN 논리를 이용하여 대표적인 지불프로토콜인 NetBill 프로토콜에 대한 형식기법을 제안하였으며, 보안 프로토콜의 증명을 위해 BAN 논리의 확장을 제시했다. 이러한 확장된 연구결과는 원자성, 익명성 및 프라이버시와 같은 다른 중요한 보안의 특성을 증명하기 위해 이용될 수 있다.

  • PDF

국외 의료기기 보안위협 사례 및 보안 동향 조사

  • Choi, Seong-Ho;Kwak, Jin
    • Review of KIISC
    • /
    • v.25 no.3
    • /
    • pp.11-18
    • /
    • 2015
  • 정보시스템 산업의 발전은 다양한 서비스 분야에서 많은 편의성을 증가시키고 있다. 또한, IT 산업이 IoT 환경으로 집중됨에 따라 다양한 서비스가 개발 되고 있으며, 다양한 IoT 제품들은 의료기기를 포함한다, 의료 환경에서는 네트워크에 연결되는 의료기기를 통해 환자를 위한 다양한 건강관리 서비스, 생명유지 서비스 등을 제공할 수 있다. 그러나 의료기기에 대한 보안 위협이 부각되면서, 인명 피해로 확산되는 것을 막기 위한 보안 관리 체계가 필요한 실정이다. 따라서, 본 논문에서는 의료기기에 대한 보안 현황을 조사하기 위해 의료기기 관련 보안 위협 사례를 분석하고, 미국, 유럽, 일본의 의료기기 정보보호 대책 및 국제 표준화 현황을 분석한다.

ICS Security Risk Analysis Using Attack Tree (공격 트리를 이용한 산업 제어 시스템 보안 위험 분석)

  • Kim, Kyung-Ah;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.53-58
    • /
    • 2011
  • There is increasing use of common commercial operation system and standard PCs to control industrial production systems, and cyber security threat for industrial facilities have emerged as a serious problem. Now these network connected ICS(Industrial Control Systems) stand vulnerable to the same threats that the enterprise information systems have faced and they are exposed to malicious attacks. In particular Stuxnet is a computer worm targeting a specific industrial control system, such as a gas pipeline or power plant and in theory, being able to cause physical damage. In this paper we present an overview of the general configuration and cyber security threats of a SCADA and investigate the attack tree analysis to identify and assess security vulnerabilities in SCADA for the purpose of response to cyber attacks in advance.

Discussion on Renaming of the Act for Development of Security Industry : Amendment of Security Business Act (보안산업 육성을 위한 법률 제명 개정에 관한 논의 : 「경비업법」의 개정)

  • Kim, Tae Min;Shin, Sang Min
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.3-12
    • /
    • 2016
  • Developed countries have been taking their private security industry to the next advanced level to maintain safety of society, promote cooperative security in conjunction with public security such as the police, cultivate domestic security industry, and spur economic growth. In Korea, Service Security Business Act(currently, Security Business Act) enacted in 1976 laid groundwork for rapid institutional development. Nonetheless, the need to rename current title of Security Business Act has been discussed continuously among scholars and industry. Particularly, a bill(bill no.: 2389) was proposed in 2012 to rename 'Security Business Act' completely to 'Private Security Industry Act'. Under those circumstances, this study was intended to discuss proposals that had been made to rename the Act for underpinning development of security industry, along with its amendment, by gathering opinions from scholars in the field of security. It is undeniable that there is need for renaming the Act. As the renaming of the Act can have positive impact in many aspects for promotion of security industry, the urgency to rename the Act is indisputable. The results suggested that scholars specializing in security hoped the Security Business Act to be renamed primarily to Guard and Security Industry, and if not, to be renamed to Security Industry Act. The renaming of the Act will give rise to the need to amend many parts of provisions contained therein as follow-up action.

Revitalization Solutions for Industrial Security Activities in Universities (대학 내 산업보안활동 활성화 방안)

  • Jeong, Duke-Young;Jung, Byung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.314-324
    • /
    • 2010
  • As our nation's economy had grown in size and its possession of the cutting-edge science and technology had increased over the years, the damages received from the outflow of our industrial technology has become a serious issue. As of today, the outflow of Korea's industrial technology has reached a serious level, but in reality there were no adequate countermeasures carried out against it. Also, it is not too much to say that the effort to prevent the outflow of the university-developed industrial technology, which is one of the main pillars for the development of the nation's technological prowess, had been carried out in passive and lukewarm manner. Therefore, as a part of the industrial security activity, we have analyzed the overall situation and major cases related to industrial security activities that have been carried out so far, in order to emphasize the importance of those universities. Also, we tried to find appropriate solutions for the universities to invigorate the industrial security activities needed.

A Study on Application Method of Crypto-module for Industrial Control System (산업제어시스템(ICS) 암호모듈 적용방안 연구)

  • Seok, Byoungjin;Kim, Yeog;Lee, Changhoon
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.1001-1008
    • /
    • 2017
  • Because cyber attacks on industrial control systems can lead to massive financial loss or loss of lives, the standardization and the research on cyber security of industrial control systems are actively under way. As a related system, the industrial control system of social infrastructures must be equipped with the verified cryptographic module according to the e-government law and appropriate security control should be implemented in accordance with the security requirements of the industrial control system. However, the industrial control system consisting of the operation layer, the control layer, and the field device layer may cause a problem in performing the main function in each layer due to the security control implementation. In this paper, we propose things to check when performing security control in accordance with the security control requirements for each layer of the industrial control system and proper application.

A Study on the 4th Industrial Revolution and E-Government Security Strategy -In Terms of the Cyber Security Technology of Intelligent Government- (제4차 산업혁명과 전자정부 보안연구 -지능형 정부의 빅데이터 사이버보안기술 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.369-376
    • /
    • 2019
  • This paper studies desirable form of future e-government in terms of intelligent government research in response to new intelligent cyber security services in the fourth industrial revolution. Also, the strategic planning of the future e-government has been contemplated in terms of the centralization and intellectualization which are significant characteristics of the fourth industrial revolution. The new system construction which is applied with security analysis technology using big data through advanced relationship analysis is suggested in the paper. The establishment of the system, such as SIEM(Security Information & Event Management), which anticipatively detects security threat by using log information through big data analysis is suggested in the paper. Once the suggested system is materialized, it will be possible to expand big data object, allow centralization in terms of e-government security in the fourth industrial revolution, boost data process, speed and follow-up response, which allows the system to function anticipatively.

The Analysis of the Differences in the SME's Perception about Industrial Technology Security Support Policy (산업기술 보안 지원정책에 대한 중소기업의 인식차이 분석)

  • Jung, Yuhan;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.15-32
    • /
    • 2020
  • Increasing uncertainties in the technological innovation environment and increasing technology competition also present new challenges in terms of industrial technology security. Therefore, the purpose of this study was to identify the direction of policy change necessary for the improvement of related policies in the future by examining the importance and implementation of the government's industrial technology security support policies for small and medium-sized enterprises engaged in industrial technology innovation activities. As a result of the analysis, first of all, small and medium-sized enterprises that responded to the government's industrial technology security support policy were perceived to be less performing than the importance of the program. These results can be said to mean that selective budget expansion for related policy programs may be necessary, along with efforts to improve the quality of each program. Second, an analysis of the differences in group recognition between new technology certification firms and industrial technology verification(certification) companies showed that significant differences exist between groups for the program. These results suggest that more effective operation of the relevant policies may require policy enforcement in consideration of the level of security and will of each company in industrial technology, as much as the quantitative characteristics of the entity. This study is meaningful in providing the necessary policy directional basic information for the design and execution of more specific and effective industrial technology security policies by presenting empirical research results that domestic small and medium-sized enterprises are aware of about the government's industrial technology security policies.

The Effect of Organization's Industrial Security Management on Employees' Security Policy Compliance Intention (조직의 산업보안 활동이 구성원의 보안 정책 준수 의도에 미치는 영향)

  • Donghwan Lee;Seungwook Park
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.57-68
    • /
    • 2022
  • As the importance and awareness of security have recently expanded, companies and governments are making continuous efforts and investments for security management. However, there are still many security threats in the organization, especially security incidents caused by internal staff. Therefore, it is very important for members to comply with security policies for organizational security management. Therefore, this study classified industrial security management into technical security, physical security, and managerial security, and applied the theory of planned behavior to investigate the impact relationship on the intention to comply with security policies. SPSS 25 and AMOS 25 were used for statistical analysis, and the study found that technical security had a positive(+) effect on subjective norms, physical security had a positive(+) effect on perceived behavior control, and attitude and perceived behavior control had a positive(+) effect on security policy compliance intention.

미래 신가치 창출을 위한 통섭형 산업보안 인력양성방안

  • Gang, Seon-Jun;Kim, Min-Ji;Won, Yu-Hyeong;Jeong, Sang-Bae
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2017.05a
    • /
    • pp.95-99
    • /
    • 2017
  • 초연결사회(Hyper-connected society)인 제4차 산업혁명시대는 사람과 과학기술의 융합이 필수적인 상황이다. 이러한 변화에 선제적으로 대응하기 위해서는 산업기술보호의 패러다임의 변화가 필요한 시점이다. 이는 국가 사회가 융 복합적으로 적정한 비용을 투자하여 총체적 위험관리를 수행하여야 하며 그 핵심은 산업기술보호 전문인력 양성과 관리를 강화하는 것이다. 이에 따라 본 연구에서는 산업기술보호 전문인력 양성관련 현황을 진단하고 앞으로 개선해야할 점에 대해 각 분야 전문가들의 심층 토론을 통해서 시사점을 도출하고자 한다.

  • PDF