• Title/Summary/Keyword: 보안산업 변화

Search Result 225, Processing Time 0.028 seconds

The Analysis of the Differences in the SME's Perception about Industrial Technology Security Support Policy (산업기술 보안 지원정책에 대한 중소기업의 인식차이 분석)

  • Jung, Yuhan;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.15-32
    • /
    • 2020
  • Increasing uncertainties in the technological innovation environment and increasing technology competition also present new challenges in terms of industrial technology security. Therefore, the purpose of this study was to identify the direction of policy change necessary for the improvement of related policies in the future by examining the importance and implementation of the government's industrial technology security support policies for small and medium-sized enterprises engaged in industrial technology innovation activities. As a result of the analysis, first of all, small and medium-sized enterprises that responded to the government's industrial technology security support policy were perceived to be less performing than the importance of the program. These results can be said to mean that selective budget expansion for related policy programs may be necessary, along with efforts to improve the quality of each program. Second, an analysis of the differences in group recognition between new technology certification firms and industrial technology verification(certification) companies showed that significant differences exist between groups for the program. These results suggest that more effective operation of the relevant policies may require policy enforcement in consideration of the level of security and will of each company in industrial technology, as much as the quantitative characteristics of the entity. This study is meaningful in providing the necessary policy directional basic information for the design and execution of more specific and effective industrial technology security policies by presenting empirical research results that domestic small and medium-sized enterprises are aware of about the government's industrial technology security policies.

Integrated Security Management System with Multi Agent (다중 에이전트를 이용한 통합 보안 관리시스템)

  • 이문구
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.8
    • /
    • pp.1015-1024
    • /
    • 2001
  • As the internet environment has been rapidly changed, the scale of internet network that needs to be managed has been magnified. In this way, the recognition for the importance of security became extensive, and numerous security systems for the protection of internal information were introduced. But decentralized security systems because of there use of different user interfaces undergo difficulties in effective security management as well as prompt coping when an obstacle happens causing a corpulence of in the security management part. In this paper, I propose an integrated security management system which can grasp the situation of each system and manage every system in the center so that we can consistently and integrally manage every system. Integrated security management system with multi agents has the advantages of prompt coping with obstacles, and the minimization of weaknesses that different security solutions have, and of consistent control and management for decentralized security systems.

  • PDF

Trend of standardization in the field of Industrial Security through ISO/TC 292 (ISO/TC 292에 의한 산업보안 분야 국제표준화의 동향)

  • Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.79-111
    • /
    • 2016
  • This study aims at analyzing the global trend of standardization in the field of Industrial Security through ISO/TC 292. It covers broad areas from risk management for industrial property protection and loss prevention through supply chain security, product and document fraud and counterfeiting countermeasures and control and community resilience. It also explores the historical background of the standardization in the security field, how ISO TC 292 came out as a leading group in order to standardize relevant security management systems. TC 292 deals with terminology, general security-related standards and supply chain security management. One of the major findings from this analysis is that security targets and threats are diversified and so organizations like enterprises should have proper flexibility to adapt themselves to new security environment and take appropriate resilience system to cope with the threats and incidents. Also the ISO standardization requires public or private entities to take holistic approaches in security management. Finally, it was found that South Korea has to prepare for this global trend of standardization in this field so that ISO certification market demand and the requirements for transnational trades can be well met.

  • PDF

A Study for New Paradigm Settlement on Business Security Management: Focus on Global Business (산업보안관리에 관한 뉴패러다임의 정립: 글로벌 비즈니스를 중심으로)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.355-386
    • /
    • 2014
  • Current business environment asks the fundamental changes about business security. The essences of these changes are that the security management of today's global business is important task of managers and the security practitioner is professional who needs very specialized education and training with business thinking. Rapid process of globalization of global village tore down the business limit that was restricted on the geological areas' limitation. Rapid business environments' change that is driving depends on development of science and technology with globalization needs new paradigm to keep business continuity. With the process of globalization, Korea, which importance is gradually increasing in the national economy, has trade dependent economic system, which keeps power of national economy through trade, so Korean economic tendency is accelerating. To keep competitiveness in global market, new strategy that is different with existing domestic business management is necessary. That is, capacity of coping with outside risk in domestic business management is established in some degree, but business activities in foreign countries faces at numerous unexpected risks that differ from country to country such as difference with the custom, changes of corporate governance etc. To cope with these new risks effectively, new paradigm for business risk is necessary. Especially, flexibility of thinking like new paradigm is necessary to cope with new security risk effectively. To cope with security risk that occurs in the new business environment effectively and competes against international company in global market, company management and members' changes of cognition about security and innovative changes in security policy is necessary. In the basement of these changes, there is expansion of business security tasks, improvement of report line, enhancement of professionalism and status of security officers, variation of hands-on workers and increasing of investment to the security etc.

  • PDF

A Study on the Importance Classification of Semiconductor Technical Documents Using Knowledge Graphs and Embedding Models (임베딩 모델과 지식맵 분석을 활용한 반도체 기술문서 중요도 분류에 관한 연구)

  • Hong, Giwan;Chang, Hangbae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.288-289
    • /
    • 2021
  • 4차산업혁명과 함께 기존 산업구조가 급속하게 변화하고 기술패권주의가 심화되면서, 기술 패권의 승패에 따라 국가의 글로벌 경쟁력이 크게 좌우된다. 세계 주요국들은 기술경쟁력 확보를 위해 기술혁신과 기술연대의 경쟁을 벌이고 있고, 우리나라도 이러한 동향 속에서 적극적인 R&D 연구 투자와 정책적 지원을 통해 미래 산업 분야의 기술경쟁력 확보를 위해 노력하고 있다. 현재 중국에 의한 기술 탈취나 인력 유출이 발생하고 있고, 이는 산업경쟁력 상실로 이어져 막대한 경제적 피해를 야기할 수 있다. 기술경쟁력을 잃지 않기 위해, 반드시 우리의 산업기술 보호 수단도 마련되어야 한다. 선제적으로 중요한 산업기술을 적절히 식별하여 중요도에 따라 보호수단을 이행하는 것이 산업기술 보호의 시작일 것이다. 이에 따라, 본 논문에서는 지식그래프와 임베딩 모델을 활용하여 우리나라의 핵심산업분야 중 하나인 반도체 분야의 기술문서를 중요도에 따라 수직적으로 분류할 수 있는 방안에 대해 연구하고자 한다.

A Study on the Development of Convergence Security with the Changes in Security Environments (시큐리티 환경변화에 따른 융합보안의 대두와 물리보안업체의 대응)

  • Ahn, Hwang-Kwon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.31-40
    • /
    • 2011
  • As new technologies emerge and threats become increasingly complex and unpredictable, security professionals who are living in the age of information face an increasingly complex array of challenges. In recent, virtually all organizations with physical and IT assets protect those assets in a variety of methods. There are physical systems to protect facilities and their contents from unlawful trespassing. It is important to note that the integration of physical and IT security is to be required: When done correctly, the integration starts with laws, strategies, policies and procedures. Integration of physical and IT security systems is done not for its own sake but in support of security policies and procedures. Significant security improvements can be made by integrating physical and IT security management without necessarily integrating physical and logical electronic security systems. Up to now, the private security industries of the Republic of Korea have been operated and developed by the separation of physical security and industrial security. However, considering the fast changing security environments, physical security companies should turn their attention to security convergence field to cope with the new trends in the security matters. At the same time, governmental supports on the improvement of various laws, regulations and policies in such a way to meet the realistic needs of the industries should be followed.

A Study on the Trend of Technology Development Related to Smart Car Security ; Based on Patent Analysis (특허분석을 통한 국내외 스마트카 보안 기술개발 동향 연구)

  • Lee Kang Hyun;Jung Yu Han
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.147-159
    • /
    • 2022
  • This study conducted a patent analysis to explore the trend of technology development in the field of smart car security. As a result of the analysis, it was confirmed that along with the growth of the smart car market, the development of smart car security related technology is also increasing. In particular, as related technology development has been rapidly taking place in recent years, it has been confirmed that competition among leading smart car countries and major companies is also expanding due to the commercialization of smart car. This study is meaningful in that it examines trends related to smart car security through quantitative analysis using patent data and presents implications accordingly.

기반시설 침해사고 및 제어시스템 표준 동향

  • Oh, Jun Hyoung;You, Young in;Lee, Kyung Ho
    • Review of KIISC
    • /
    • v.27 no.2
    • /
    • pp.5-11
    • /
    • 2017
  • 산업 제어 시스템은 사회 기반 시설이나 산업체의 설비를 감시하고 제어하는 시스템을 의미한다. 제어시스템의 효율적 관리를 위해 상용 기술과의 유사성이 증가함에 따라 기존 정보시스템들이 가지는 보안 취약점 또한 수반하게 되었다. 따라서 제어시스템에 대한 침해사고 또한 증가하게 되었으며, 우리나라의 경우 대표적으로 한수원 해킹 사건이 있다. 이렇듯 기반시설에 대한 침해 사고가 늘어나 산업제어시스템 보안에 대한 중요성이 강조되면서 국내외로 제어시스템 보안 표준이 제정 개정되고 있다. 특히, NERC CIP, ISA/IEC 62443, NIST 800 series 와 같은 표준은 매년 또는 격년마다 개정이 되는 등 매우 활발히 변화하는 사이버 위협에 적극적으로 대응하고 있다. 본 논문에서는 2006년부터 현재까지 발생한 주요 침해 사고에 대해 알아보고, 동 기간 내 국제 표준 동향 및 국내 정보보호 관리체계를 조사한다. 이를 통해 국내 정보보호 관리체계의 구체적인 문제점을 파악하여 보다 나은 산업제어시스템의 안전성을 확보하고자 한다.

Suggestion of Home Network using IoT (IoT를 활용한 홈네트워크 제언)

  • Kim, YoungChul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2017.06a
    • /
    • pp.151-152
    • /
    • 2017
  • 최근에 제4차 산업혁명을 거론하면서 사물인터넷(IoT)을 하나의 중요한 요소로 보고 있으며, 사물인터넷의 한 방향으로 홈네트워크인 홈IoT가 주목을 받고 있다. 최근의 경제적, 사회적인 변화로 1인 가구, 독거노인, 맞벌이 가구의 증가로 인한 주거환경 변화가 사물인터넷 디바이스의 새로운 수요 증가를 시키고 있는 상황이다. 따라서 홈IoT와 관련하여 다양한 이슈화가 있지만 크게 두 부분으로 제언을 하고자 한다. 하나는 사물인터넷(IoT)가 가지고 있는 근본적인 문제인 전원으로 에너지 자립형 IoT와 관련하여 에너지 하베스팅을 기반으로 연구되고 있으나, 홈IoT 설비의 관점에서 단순하게 접근하고자 한다. 두번째로 정보보안 관련으로 최근에 랜섬웨어와 같은 네트워크 침입을 통한 해킹 및 접근이 지속적으로 이루어지고 있음으로 네트워크 보안관점을 보고하고자 한다. 결과적으로 홈IoT는 무선전력방식이나 전원접근방식을 저전력 방식으로 새롭게 표준화나 전원 서비스를 함으로서 좀 더 용이하게 IoT를 설치할 수 있도록 하여야 하며, 네트워크 보안은 개인의 경각심과 더불어서 IoT 장비 개발사의 지속적인 보안 업데이트가 가능하도록 인증절차가 필요할 것으로 판단이 된다.

  • PDF

SDN/OpenFlow의 기술 분석 및 보안 측면의 이용 가능성

  • Kim, Jong-Soo;Im, Sul-Hwa;Kim, Hak-Beom
    • Review of KIISC
    • /
    • v.24 no.1
    • /
    • pp.65-74
    • /
    • 2014
  • 최근 네트워크 시장의 큰 화두가 되고있는 SDN(Software-Defined Network)은 OpenFlow를 활용한 차세대 네트워크 기술로 각광받고 있다. 아직까지의 SDN은 초기단계에 이르고 있으나 현재의 네트워크 산업이 가지는 한계점을 근본적으로 변화시킬 수 있는 기술로 상당한 잠재력이 내재되어 있다. 특히 SDN 기술을 보안 측면에서 이용하게 되면, 기존의 IDS/IPS 제품의 대응 범위를 게이트웨이에서 엔드 포인트까지의 인프라 전반으로 확장시킬 수 있다. 또한 유연한 트래픽 경로 재설정을 통한 DoS나 DDoS 공격에도 효과적으로 대비할 수 있다. 이에 따라 OpenFlow 및 SDN의 기술 분석과 보안 측면에서의 이용 가능성에 대해 기술하고자 한다.