• Title/Summary/Keyword: 보안체계

Search Result 1,461, Processing Time 0.028 seconds

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.

The Study of a Development Plan of the Industrial Security Expert System (산업보안관리사 자격제도 발전 방안에 대한 고찰)

  • Cho, Yong-Sun
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.175-207
    • /
    • 2014
  • This paper focuses on the study of a development direction of the industrial security Expert system. First of all, in order to manage Industrial security system, we need to have law, criminology, business and engineering professionals as well as IT experts, which are the multi-dimensional convergence professionals. Secondly, industrial organizations need to have workforce who can perform security strategy; security plan; security training; security services; or security system management and operations. Industrial security certification system can contribute to cultivate above mentioned professional workforce. Currently Industrial Security Expert(ISE) is a private qualification. However, the author argued that it have to be changed to national qualification. In addition, it is necessary that the system should be given credibility with verifying the personnel whether they are proper or not in the their field. In terms of quality innovation, it is also necessary that distinguish the levels of utilization of rating system of the industrial security coordinator through a long-term examination. With respect to grading criteria, we could consider the requirements as following: whether they must hold the degree of the industrial security-related areas of undergraduate or postgraduate (or to be); what or how many industrial security-related courses they should complete through a credit bank system. If the plan of completing certain industrial security-related credits simply through the credit bank system, without establishing a new industrial security-related department, has established, then industrial security study would be spreaded and advanced. For private certification holders, the problem of the qualification succeeding process is important matter. Additionally, it is necessary to introduce the certifying system of ISMS(Industrial Security Management System) which is a specialized system for protecting industrial technology. To sum up, when the industrial security management system links the industrial security management certification, industrial security would realize in the companies and research institutions dealing with national key technology. Then, a group synergy effect would occurs.

  • PDF

Risk Management Frameworks - review and direction (위험관리의 체계 (framework) 연구)

  • 신동익
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1994.11a
    • /
    • pp.277-287
    • /
    • 1994
  • 많은 정보시스템이 점차적으로 전산망으로 연결되므로서, 보안성에 대한 위협이 더욱 증대되고 있다. 적절한 보안성을 유지하기 위해서는 시스템이 어느 정도 위험한지를 파악하여 이를 관리하는 노력이 필요하다. 이와 같은 노력의 가장 중심이 되는 것은 위험관리의 체계를 세우고 이에 따른 방법론을 개발하는 것이다. 본 논문은 기존의 위험관리 체계를 검토하고 분석하여, 이를 기초로 단순하면서도 실용적인 위험관리의 체계를 제시하고자 한다.

  • PDF

Security Evaluation Method for Secure Operating Systems during Development Process (보안 운영체계의 개발 과정 중 보안성 검증방법)

  • 강호석;김남창;심영철;이진석;장인숙
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.853-855
    • /
    • 2003
  • 표준으로 정의된 IT제품의 보안성 평가 방안들은 CC나 ITSEC, TCSEC과 같이 많이 나와있다. 그러나 이러한 표준은 너무 추상적이고 소프트웨어의 각 단계에 따른 보안성을 측정하는데 불충분하다. 또 SSE-CMM같은 프로세스를 평가하는 방법의 경우 역시 너무 추상적이고 포괄적인 면만을 설명하였고 프로세스 자체에 대한 평가에 중점을 두었을 뿐 각 단계의 보안강도를 평가하는데는 부족하다. 이 논문에서는 이러한 단정을 보안하고자 각 공정단계에서, 특히 제품을 계획하는 단계인 요구분석단계와 디자인 단계에서 그래프 모델링과 모듈 다이어그램 통한 검증방법을 제시하였다. 여기서는 보안 운영체계라고 특정 제품을 명시하였지만 실제로 다양한 IT제품에 적용될 수 있다.

  • PDF

Enhancing Education Curriculum of Cyber Security Based on NICE (NICE 기반 사이버보안 교육커리큘럼 개선 연구)

  • Park, Wonhyung;Ahn, Seongjin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.321-328
    • /
    • 2017
  • As the cyber threats become more sophisticated and intelligent, the cases of cyber-infringement accidents are rapidly increasing. As a result, awareness of the importance of cyber security professionals has led to many cyber security-related educational programs. These programs provided with education curriculum aimed because cyber security workforce and job-based cyber security education research are not properly done. In this study, we developed a new cyber security education curriculum that defines and reflects cyber security personnel and knowledge system. In this study is not composed solely of the education contents related to the defenses emphasized in the existing education curriculum, but developed education curriculum to train a professional and balanced cyber security manpower by adding education contents in the attack field.

A Study on Convergence of Cyber Security Monitoring and Industrial Security (기밀유출방지를 위한 융합보안 관리 체계)

  • Lee, Chang-Hun;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.61-67
    • /
    • 2010
  • Information communication the dazzling development life was convenient with to join in and planned an industrial technical advance. Not only the nation with technical security of the enterprise between the description competition keenly in the present point of view which rushes to technical competitive time of the nation between is become accomplished. The damage which is caused by with outflow of industrial secrecy that company prevents this effectively because is threatening at the degree which will threaten the existence of the nation and the technique which manages is become accomplished with the domestic foreign enemy. Prevents an industrial secret outflow the research for on a large scale with physical security technique and information security to be divided, is researched.

Revitalizing Measures of an Operating System on Casino Security Management - Focusing on Domestic Casino Only for Foreigners - (카지노 기업 보안관리 운영시스템 활성화 방안 - 국내 외국인 전용 카지노를 중심으로 -)

  • Kim, Jae Il;Lee, Julak
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.57-73
    • /
    • 2018
  • The domestic casino industry is attempting to change from the existing single form to the advanced-type of complex casino resort. In addition, the importance of the security management system, which prevents and responds to accidents caused by negative influences of gambling, is emphasized at the casino enterprise level. Therefore, this study aimed to find measures to revitalize the security management system for domestic casinos only for foreigners through an analysis of relevant literature and case studies. As a result of the analysis, it was found that in order to effectively cope with changes in the casino industry, three areas were needed to be revamped: (1) a lack of protocols which intend to protect casino security personnel, (2) an inefficient operational system due to the dualized casino security management system, and (3) a lack of systematic educational system for casino security personnel. This study therefore proposed three measures: (1) a review of revisions of related laws to protect casino security personnel, (2) enhancement of professionalism of casino security personnel and (3) establishment of a single operating system of the casino security management operating system.

Security Threats to Enterprise Generative AI Systems and Countermeasures (기업 내 생성형 AI 시스템의 보안 위협과 대응 방안)

  • Jong-woan Choi
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.9-17
    • /
    • 2024
  • This paper examines the security threats to enterprise Generative Artificial Intelligence systems and proposes countermeasures. As AI systems handle vast amounts of data to gain a competitive edge, security threats targeting AI systems are rapidly increasing. Since AI security threats have distinct characteristics compared to traditional human-oriented cybersecurity threats, establishing an AI-specific response system is urgent. This study analyzes the importance of AI system security, identifies key threat factors, and suggests technical and managerial countermeasures. Firstly, it proposes strengthening the security of IT infrastructure where AI systems operate and enhancing AI model robustness by utilizing defensive techniques such as adversarial learning and model quantization. Additionally, it presents an AI security system design that detects anomalies in AI query-response processes to identify insider threats. Furthermore, it emphasizes the establishment of change control and audit frameworks to prevent AI model leakage by adopting the cyber kill chain concept. As AI technology evolves rapidly, by focusing on AI model and data security, insider threat detection, and professional workforce development, companies can improve their digital competitiveness through secure and reliable AI utilization.

Study of applicable security tunneling technique for military wireless network (군 무선네트워크 환경에서 적용 가능한 보안 터널링 기법 연구)

  • Kim, Yun-young;Namkung, Seung-Pil
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.107-112
    • /
    • 2015
  • Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.

Through the Remote-based hard Disk Memory Analysis Audit (AUDIT) System of Metabus Companies, Protecting Big Data (메타버스 기업 원격기반 하드디스크 메모리 상시분석 감사(AUDIT)체계로 주요 빅데이타 보호)

  • Bae, Sang Hyun;Yun, Seong Do;Lee, Jae Chul
    • Journal of Integrative Natural Science
    • /
    • v.14 no.4
    • /
    • pp.205-210
    • /
    • 2021
  • 최근 메타버스 산업체 pc 하드디스크 메모리 저장 데이타에 대한 사이버 침해 공격 및 기밀유출 사고대응 방안으로 원격기반 상시 실시간 감시 및 분석 보안 체계를 검토 및 발전 시 요구된다. 이러한 사유는 정보보안 유출 90% 이상은 Edge단 pc에서 발생 되는 것으로 메타버스 산업보안기밀 유출 1건당 평균 10억 2,000만원 등의 유형 및 무형 피해(2018보안과 관련된 가장 중요한 팩트와 수치통계 2018.10.16일 IT WORLD) 발생의 근본에 대한 대응과 동시에 IT인프라 구축 시 연동 통합으로 네트웍 시스템 웹 등 영역에서 발생되는 악성코드 공격 대상 등의 대상이 되므로 이에 대한 대응책으로 Deep-Acess기반 상시 실시간 원격 메모리 분석 및 감사(audit)체계 개념이 핵심이다.