• Title/Summary/Keyword: 보안 거버넌스

Search Result 54, Processing Time 0.02 seconds

A Study on the Enterprise security convergence strategy in the IoT(the Internet of Things) Era (IoT시대의 기업 융합보안 전략에 대한 연구)

  • Noh, Jong-ho;Lee, Jong-hyeong;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.33-39
    • /
    • 2017
  • In the age of full scale IoT, concept of "security convergence" has been popularized widely. However, it is not clear whether current "security convergence" concept reflects IoT characteristics and traits. In this thesis, a new concept, complementing "security convergence" concept researches up to date, has been suggested considering IoT characteristics. Required governance methodology and key technical factors are suggested for re-establishment of "security convergence" concept and for enterprise security strategy development.

A study on the Establishment of an Integrated Cyber Security Framework in the Era of the 4th Industrial Revolution (4차 산업혁명 시대의 통합 사이버 보안 프레임워크 구축에 대한 연구)

  • Lee, Jin Yong;Yang, Sun Joo;Jang, Hyoung Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.251-254
    • /
    • 2021
  • 국가 4차 산업혁명의 성장 동력으로 데이터 경제가 주목받고 있으며, 현(現)산업계는 초연결, 초지능, 초융합 사회로 진보하고 있다. 이와 같은 환경에서는 산업군 간의 경계가 사라지고 전방위적인 상호 유기적인 복합 생태계를 구성하게 된다. 따라서 사이버 보안사고 발생 시 단순 데이터 탈취 정도에 국한되지 않고 안보, 생명, 국가 경제 등에 돌이킬 수 없는 손실을 끼칠 것으로 예상된다. 그러나 현재 사이버 보안의 각종 제도 및 법령 등은 중복·혼재되어 있거나 특정 산업군에 적용하기에는 일부 미흡한 요소도 존재한다. 본 논문에서는 이와 같은 문제점을 개선하고 전방위적인 보안거버넌스를 달성하기 위한 통합 사이버 보안 프레임워크 구축 방안을 제언한다.

Brand Positioning of IT Governance System -Focused on Case study of Spin-off Venture- (IT 거버넌스시스템의 브랜드 포지셔닝 전략 -스핀오프벤처기업의 사례를 중심으로-)

  • Chun, Myung-Hwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.5
    • /
    • pp.110-119
    • /
    • 2007
  • In an extended enterprise, there is a shift to shared services, cosourcing and outsourcing, and extending out to partners, suppliers, and customers to accomplish business objectives more effectively. Along with this critical need, executives should be aware of the need to focus on optimizing the value of their information technology and reducing the related risks. So IT governance is critical, and many companies including spin-off venture are providing IT governance solution, but very little is known about brand management and marketing strategy of IT governance solution provider. The purpose of this study is to investigate brand positioning of IT governance solution company focusing on spin-off venture. The results of this study are summarized as follows. First, brand management is needed in the spin-off venture. second, IT governance solution companies including spin-off venture must provide something more than functional value. That is, they actively seek to emotional or symbolic value for their customers.

  • PDF

Analysis and New Agenda of e-Government program (전자정부의 의의와 추진실적 및 향후 과제)

  • HwangBo, Yeoul
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.141-158
    • /
    • 2003
  • This paper examines new phenomenon and transformation that arise from the expansion of knowledge-based economy, envisions the meaning of e-government through comparing traditional administration with new governance, formulates the e-government model, and presents a direction for next e-government for the conclusion. These new phenomenon include a transformation to product and service convergence model, cyber sovereignty dilemma, privacy and information security threats, and various others. Also, there is a gradual transformation from government-oriented administrative approach to a new governance model that strengthens the role of NGO. And, e-government must work together to realize this new governance ideology. New e-government must be transformed where government and citizens can implement and manage e-government together. Therefore, expanding applications of Public Key Infrastructure (PKI) technologies, promotion of e-Democracy, and improvement of user interface to improve usability must be emphasized.

The Effect of Organization's Industrial Security Management on Employees' Security Policy Compliance Intention (조직의 산업보안 활동이 구성원의 보안 정책 준수 의도에 미치는 영향)

  • Donghwan Lee;Seungwook Park
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.57-68
    • /
    • 2022
  • As the importance and awareness of security have recently expanded, companies and governments are making continuous efforts and investments for security management. However, there are still many security threats in the organization, especially security incidents caused by internal staff. Therefore, it is very important for members to comply with security policies for organizational security management. Therefore, this study classified industrial security management into technical security, physical security, and managerial security, and applied the theory of planned behavior to investigate the impact relationship on the intention to comply with security policies. SPSS 25 and AMOS 25 were used for statistical analysis, and the study found that technical security had a positive(+) effect on subjective norms, physical security had a positive(+) effect on perceived behavior control, and attitude and perceived behavior control had a positive(+) effect on security policy compliance intention.

안전한 핀테크 서비스를 위한 지침

  • Nah, Jae Hoon
    • Review of KIISC
    • /
    • v.29 no.4
    • /
    • pp.19-24
    • /
    • 2019
  • 디지털 전환(Digital Transformation)은 산업 각 분야에서 진행되고 있는 혁신이며, 금융권에서도 디지털 전환의 영향이 크게 미치고 있다. 전산화 되어 있지만 폐쇄적인 네트워크로 구축되어 있던 금융 네트워크가 점점 데이터의 공개를 필요로 하였으며, 그 공개된 데이터를 기반으로 새로운 서비스가 창출되는 산업적 태동이 있었다. 개별적 서비스의 처리나 단계(부품)의 개선이 아니라 플랫폼의 개방을 통한 융합화와 이를 조화롭게 통제하는 거버넌스의 필요성이 대두되었다. 이러한 동향에 편승하여 새로운 기업(스타트업)이 창출하였고, 공개된 정보를 기반으로 융합 서비스를 창출하여 서비스의 발전이 눈부시게 진행하고 있다. 핀테크 서비스가 공개 API(Application program interface)로 제공되고 있으며, 이를 이용하여 빠른 발전을 하고 있으나, 공개성으로 인하여 취약점마저도 공개되어 정보보안의 위협으로 작용 될 수 있으므로, 개방형 플랫폼의 정보보안을 중심으로 핀테크 정보보안 표준의 동향을 살펴본다.

A study on effects of implementing information security governance by information security committee activities (정보보호 위원회 활동에 따른 정보보호 거버넌스 구현 효과에 관한 연구)

  • Kim, Kunwoo;Kim, Jungduk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.915-920
    • /
    • 2015
  • The commitment of top management is still insufficient for information security even the core of information security governance is dependent on the leadership of top management. In this situation, information security committee can be a good way to vitalize the commitment of top management and its activities are essential for implementing information security governance. The purpose of this study is to test that information security committee affects implementing information security governance and security effect. For a empirical analysis, questionnaire survey was conducted and the PLS(Partial Least Square) was used to analyze the measurement and structural model. The study result shows that a hypothesis related value delivery is not accepted and it is required to study various methods about how the information security provides positive value to business.

Analysis of the Global Data Law & Policy and its Implications: Focusing on the cases of the United States, the United Kingdom, and the European Union (국내외 데이터법·정책 분석 및 시사점: 미국, 영국, EU의 사례를 중심으로)

  • Yoon, Sang-Pil;Kwon, Hun-Yeong
    • Informatization Policy
    • /
    • v.28 no.2
    • /
    • pp.98-113
    • /
    • 2021
  • This study presents implications of the Global Data Law & Policy by comparing national data strategies, data regulations and policies, and governance in South Korea, the United States, the United Kingdom, and the European Union. According to the result of the comparative analysis, the biggest difference is in data governance, in other words, the management and coordination of policies at the pan-government level and data ethics. Therefore, this study proposes the establishment of a presidential special committee on data policy or the creation of a 'National Digital Innovation Office' at the Presidential Secretariat as a national CDO for the governance of data policies. Furthermore, this paper suggests a) to enact 'the Framework Act on the Development of Data Industry' that can regulate data practices in the private sector, b) to institutionalize the data-centric security and data protection, c) to settle the public ethics and personnel management based on data expertise and professional ethics, including explainability and responsibility, and d) the education and training systems.

The government role in digital era innovation: the case of electronic authentication policy in Korea (디지털 혁신시대의 정부역할: 한국의 전자 인증정책 사례)

  • Son, Wonbae;Park, Mun-su
    • International Commerce and Information Review
    • /
    • v.19 no.4
    • /
    • pp.29-50
    • /
    • 2017
  • In emerging technologies, innovation processes are dynamic in that the government needs to regularly review its policies to resonate with rapid technological advancements, changing public needs, and evolving global trends. In the 1990s, the Internet grew at an explosive rate, but many applications were constrained due to security concerns. Public Key Infrastructure (PKI) seemed to be the fundamental technology to address these concerns by providing security functions. As of 2017, PKI is still one of the best technologies for electronic authentication in an open network, but it is used only in limited areas: for user authentications in closed networks and for server authentications within network security infrastructure like SSL/TLS. The difference between expectation and reality of PKI usage is due to the evolution of the Internet along with the global adoption of new authentication policies under the Internet governance in the early 2000s. The new Internet governance based on the cooperation between multi-stakeholders is changing the way in which a government should act with regard to its technological policies. This paper analyzes different PKI policy approaches in the United States and Korea from the perspective of path-dependence theory. Their different policy results show evidence of the rise of the Internet governance, and may have important implications for policy-makers in the current global Internet society.

  • PDF

A Study on the Methodology in Classifying the Importance of Information System (정보시스템 중요도 분류 방법론에 관한 연구)

  • Choi, Myeonggil;Cho, Kang-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1329-1335
    • /
    • 2014
  • The importance of information security is increasing in the public and private organizations. The interruption of the information system might cause massive disorder. To protect information systems effectively, information systems would be categorized and managed in terms of degree of importance. In this study, we suggest a new evaluation method that categorizes information systems based on the three nature of security, confidentiality, integrity and availability. For validation of the method, we use a case study in a public sector. Through the validation of method, the availability of applying the method for categorization information systems to other domains could be suggested.