• Title/Summary/Keyword: 보안영역

Search Result 791, Processing Time 0.024 seconds

An Analysis of Industrial Security Curriculums in Colleges (국내 산업보안학과의 교과과정 분석: 교육 영역과 과목별 분류를 중심으로)

  • Jung, Jinhyo;Lee, Chang-Moo
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.29-53
    • /
    • 2019
  • Of all the 55 security departments in colleges, the information security departments occupies the majority of 45. Though existing security focused too much on information security, a new research stream on industrial security from a perspective of convergence has emerged. Since the first department of industrial security was established in a college in 2014, the total of four departments have been established until 2018. A new discipline to solve the existing problems and an opportunity to cultivate industrial security professionals have been greatly appreciated; however, the definition of industrial security is not yet specific, and more discussions on education categories and subjects with a focus on the characteristics of convergence are needed. The demand for industrial security professionals has gradually increasing and the departments of industrial security have been established to meet the demand. It is necessary, in this circumstance, to find out how the industrial security departments are teaching students. To this end, the purpose of this article is to deliver an overview of the educational curriculums of the four industrial security departments. This study analyzed 127 subjects in the curriculums, categorized educational areas, and employed Social Network Analysis to understand the relationships between subjects of each departments.

콜드 부트 공격 기술 및 최신 동향 분석

  • Won, Yoo-Seung;Han, Dong-Guk
    • Review of KIISC
    • /
    • v.31 no.1
    • /
    • pp.7-14
    • /
    • 2021
  • 일반·보안 기기에서 개인 정보 및 비밀 정보가 많은 부분에서 취급된다. 보안 기기라고 할지라도 전원이 인가되지 않으면 데이터가 초기화되는 RAM의 물리적 특성을 고려하여, 보안영역으로 간과될 수 있다. 하지만 2008년 이후, RAM의 표면 온도를 현저히 낮추면 전원이 인가되지 않아도 RAM 데이터가 초기화되지 않는 특징을 활용한 콜드 부트 공격이 제기되어, 지금까지 활발히 연구되어 하나의 보안이 필요한 영역으로 자리매김하고 있다. 본 논문에서는 콜드 부트 공격의 방법론과 발전 동향, 콜드 부트 공격에 대한 물리적 특성 및 디스크 암호화 솔루션에 적용 가능한 콜드 부트 공격을 설명한다. 또한, 국내 연구에 간과될 수 있는 콜드 부트 공격을 고취시키기 위하여, 이에 대한 대응기법도 소개한다.

A Study on WB(Water-Bubble) Based Highly Secure Flexible Network Section (WB(Water-Bubble) 기반의 강한 보안성을 갖는 탄력적 네트워크 구간에 관한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.737-746
    • /
    • 2017
  • In 2017, amid changes in the security market such as integrated security (IS) and convergence security (CS), a variety of security paradigms in terms of operation and management have been suggested. Rather than changing existing network infrastructure and bringing about fluid, multi-dimensional changes, these solutions and technologies focus entire security capacity on a primary protection, leading to network infrastructure suffering from unexpected inherent violations and problems in a continued manner. Therefore, it is time to propose and develop a flexible network section that can protect from attacks of similar pattern and concentrated traffic attacks by applying a new concept of WB (Water-Bubble) to network infrastructure and analyzing on the basis of experiment and installation. Methodology of the WB-based highly secure flexible network section proposed in this study is expected to provide materials for studies on how to achieve network section security taking into account three major limitations and security standards: fluidity, unpredictability, and non-area scalability by contact point ratio, by changing a network area predicted to be the final target of attack into resonant network section (area) with flexible area changes.

Security Policy Negotiation Model Design for Secure Network Management (안전한 망 관리를 위한 보안정책 협상모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.171-176
    • /
    • 2004
  • This paper presents the design of a certain highly efficient security policy negotiation of SPS(Security Policy System) for secure network management using mobile agent system. The conventional IP security systems for secure network management have some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through the same path by both directions and is protected by the same policy due to the topology of the network. Unlike conventional systems, the model developed herein can be resolved by using a mobile agent technology. If each domain needs a negotiation of security policy, a mobile agent manages the result of the negotiation in the form of a passport and guarantees the authentication and reliability each other by using the passport.

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System (Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법)

  • Noh, Si-Choon;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.

A Study on the Optimized Balance Module of Security Policy to Enhance Stability in the Service-Based Information System (서비스 기반 정보시스템의 안정성 증대를 위한 보안정책 최적화 균형모듈에 관한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1155-1160
    • /
    • 2018
  • Presently in 2018, the security market is requiring progressive development and innovation in the area of security on account of new changes and technologies. This means the rapid and prompt development of the service platforms and service-based information systems. Here, this study is going to examine the process of operating a number of services and obtaining security, not the criteria for selecting particular service in online environment where the various services exist. Within a series of flows to protect the manager's authority about the platforms operated by information systems, and to provide and destroy services, this author limits the entire service platforms of the optimized balance module into four categories maximum for the security of the area apt for illegal invasion and access, and the proper area. Also, about the area with limited security, this researcher again applies subordinate security policy and technology respectively. This author here will suggest a method to provide and to extend safety and security for the information system and also propose the process of applying it as well.

A Study on Security Metrics and Research Trend Analysis on Cyber Resilence (보안메트릭과 사이버 내성에 대한 연구동향분석에 관한연구)

  • Lee, Sujin;Ahn, Seongjin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.3-11
    • /
    • 2018
  • The emerging field of Science of Security (SoS) is a new paradigm that emerged in the field of security as a research field that applied the scientific approach to cyber security. It is a direction to study the formal model and automation field to secure the security of such a network environment in the present that dynamic change of complex, large scale network environment and a lot of protocol and mechanism environment exists. Therefore, this study analyzes the latest cyber security research trends such as SoS and examines the research trends of advanced countries to examine a new approach to cyber security development direction in Korea. We also analyze the current state of domestic scientific research on the scientific security research methods for various cyber security paradigms and present directions for revitalizing domestic cyber security.

  • PDF

The Study for the Method of Network Security Domain Architecture Designing (네트워크 보안도메인 아키텍처 설계방법 연구)

  • Noh, Si-Choon
    • Journal of Digital Contents Society
    • /
    • v.8 no.2
    • /
    • pp.165-171
    • /
    • 2007
  • The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security domain is the concept to distinguish the domain from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security domain could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every domain. For the establishment of security domain it is needed to show what criterion of net work should be set up. This study is to research the criterion for topology factor, security domain. structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture. The purpose of this paper is to suggest the necessity of development of security mechanism and the distinguished blocking function according to the level of security domain.

  • PDF

Design and Implementation of a Security System for Portable Storage Devices (이동식 저장장치를 위한 보안 시스템의 설계 및 구현)

  • Lee, Jun;Seo, Wonsuk;Chang, Jae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1190-1193
    • /
    • 2007
  • 최근 들어 저장장치의 획기적인 기술의 발달로 인하여 고용량의 작고 간편한 이동식 저장장치들이 많이 선보이고 있다. 그러나 이동식 저장장치는 도난이나 분실 등으로 인한 데이터에 대한 보호 및 안전성에 있어서 많은 문제를 노출한다. 본 논문에서는 이동식 저장장치 환경에서 가상 드라이브 연동, 실시간 암/복호화를 통한 보안 시스템의 설계와 구축 결과를 제시한다. 소개된 시스템은 기본적으로 저장장치에 보안영역을 설정하여 사용자 인증을 통해서 보안영역에 접근하도록 하였으며, 데이타 입출력 시 암/복호화를 통해 데이타에 무단 접근을 차단하는 방법을 사용하였다.

  • PDF