• Title/Summary/Keyword: 보안 수준평가

Search Result 265, Processing Time 0.023 seconds

IT 시스템 보안수준관리를 위한 보안 평가 대상 항목 식별

  • Kim, Tae-Hun;Saquralee, Koleechi;Na, Yun-Ji
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.123-127
    • /
    • 2006
  • This paper identifies some components should be evaluated and certified to assure that IT systems are secure. Security objective of IT systems will be obtained by protecting all areas of IT systems, so not only visible parts but also non-visible parts must be protected. And for verifying all the parts of IT systems are protected, we should check the scope of evaluation and certification covers all necessary parts.

  • PDF

Research on the Level Evaluation Model of the Organization Research Security (조직의 연구보안 수준평가 모형 연구)

  • Na, Onechul;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.3
    • /
    • pp.109-130
    • /
    • 2020
  • Recently, the importance of research and development for technological innovation is increasing. The rapid development of research and development has a number of positive effects, but at the same time there are also negative effects that accelerate crimes of information and technology leakage. In this study, a research security level measurement model was developed that can safely protect the R&D environment conducted at the organizational level in order to prepare for the increasingly serious R&D result leakage accident. First, by analyzing and synthesizing security policies related to domestic and overseas R&D, 10 research security level evaluation items (Research Security Promotion System, Research Facility and Equipment Security, Electronic Information Security, Major Research Information Security Management, Research Note Security Management, Patent/Intellectual Property Security Management, Technology Commercialization Security Management, Internal Researcher Security Management, Authorized Third Party Researcher Security Management, External Researcher Security Management) were derived through expert interviews. Next, the research security level evaluation model was designed so that the derived research security level evaluation items can be applied to the organization's research and development environment from a multidimensional perspective. Finally, the validity of the model was verified, and the level of research security was evaluated by applying a pilot target to the organizations that actually conduct R&D. The research security level evaluation model developed in this study is expected to be useful for appropriately measuring the security level of organizations and projects that are actually conducting R&D. It is believed that it will be helpful in establishing a research security system and preparing security management measures. In addition, it is expected that stable and effective results of R&D investments can be achieved by safely carrying out R&D at the project level as well as improving the security of the organization performing R&D.

Development of Security Level Evaluation Tool(ISSPET) Based on Information Security System (정보보호 시스템기반의 보안 수준 평가 도구(ISSPET) 개발)

  • Soh, Woo-Young;Kim, Wan-Kyung;Kim, Seak-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1911-1919
    • /
    • 2009
  • Currently, the evaluation technology for the security systems of risk analysis level measurement is maintained by only the developed countries including U.S and U.K, and the evaluation technology and its infrastructure are insufficient for the evaluation technology of security threat analysis level measurement in Korea. Therefore this paper presents the development of the security control items and the evaluation tool(ISSPET) for the security level performance. It is expected to evaluate the security management level of the current system and its security environment through analyzing the security management level of security systems using ISSPET.

A Study on the Scope of Security Level Management for Information Systems (정보시스템 보안수준관리 필요성 및 범위에 관한 연구)

  • Kim, Tai-Hoon
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.05a
    • /
    • pp.167-171
    • /
    • 2007
  • 정보기술의 발달 및 정보화의 촉진으로 인해 정보시스템의 복잡도는 급격히 증가하고 있으며, 이에 따라 정보보호제품을 설치 ${\cdot}$ 운영함으로써 보안목적을 달성하는 과거의 보안정책은 한계에 도달하였다고 할 수 있다. 대부분의 정보시스템 사용자들은 해당 정보시스템의 보안대책에 대한 신뢰가 적절한 수준인지 판단할 수 있기를 원하고 있으며, 또한 이러한 수준이 지속적으로 유지되기를 바라고 있다. 보안수준을 유지하기 위해서는 지속적으로 해당 시스템의 보안수준을 확인하여야 하는데, 이러한 확인 및 판단의 근거를 제공하는 가장 기본적이고 전통적인 방법은 보안수준에 대한 평가이다. 본 논문에서는 정보시스템의 보안수준을 유지하기 위한 보안수준관리의 필요성과, 이를 위해 보안수준 확인이 필요한 평가 대상항목을 식별하였다.

  • PDF

Intranet Security Evaluation Using Hacking Techniques (해킹 기법을 이용한 내부망 보안 평가 방법)

  • Seo, Dong-Il;Choi, Byeong-Choel;Sohn, Sung-Won;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.337-342
    • /
    • 2002
  • In this paper, we proposed the ISL for evaluating the security level of Intranet. This method is composed of two parts First, Hacking Scenarios are the hacking stories by hacking/hackers levels. Second, Network Model is composed of the zone and intrusion paths. Our method is very active and practical. We divide ISL into five levels ISL1∼ISL5. Among the levels, ISL5 is the highest security level. Main purpose of this paper is to promote the security of Intranet. In this paper, we designed and analyzed the test-bed for ISL3.

A Study on Web-Site Application Security Level Measurement and Improvement of Using Six Sigma method. (6 시그마 방법론을 이용한 웹사이트 응용프로그램의 보안 수준 평가 및 개선)

  • Hwang, Woo;Lee, Hee Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1222-1225
    • /
    • 2007
  • 보안수준 평가 및 개선에 있어서 온라인 웹사이트 응용프로그램의 경우 측정 기준 설정과 보안 수준 표시에 많은 어려운 점이 있다. 이에 모토롤라부터 도입한 경영혁신 도구로서의 6 시그마 수준 표현 및 개선 기법을 웹사이트 보안수준 평가에 적용할 수 있도록, WASC(Web Application Security Consortium)에서 제공하고 있는 웹 애플리케이션 보안 평가 체크리스트를 사용하여 Bottom-Up 방식으로 웹 사이트에 대한 실제 침해 시도의 결과를 측정, 이를 보안수준 측정 및 개선에 활용할 수 있는 방안을 제시한다.

A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System (보안관리체계 분석을 통한 산업중심 보안수준평가 모형 설계 방향 연구)

  • Bae, Je-Min;Kim, Sanggeun;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.177-191
    • /
    • 2015
  • Recently, the necessity of systematic security management system that consider company' character and environment has appeared because of increasing security accident continuously in domestic companies. However, most of companies has applied to only K-ISMS which is existing information security management system, although They are different from object, purpose and way of security level evaluation by companies. According to this situation, Many experts have questioned that there are many problems with effectiveness of introducing security management system. In this study, We established definition of information security management system, industrial security management system and research security management system through analysis of previous study and developed evaluation item which can implement security in whole industry comparing and analyzing the control items of them. Also, we analyzed existing security level evaluation and suggest design direction of industry-centric security level evaluation model considering character of industry.

안전한 모바일 게임서비스를 위한 보안 점검항목

  • Kang, Sun Myung
    • Review of KIISC
    • /
    • v.26 no.3
    • /
    • pp.22-29
    • /
    • 2016
  • 최근 다양한 모바일 기기의 보급과 함께 향상된 모바일 컴퓨팅 환경으로 인해 게임서비스의 트렌드가 빠르게 모바일 환경으로 변화하고 있다. 그러나 모바일 게임서비스의 그 역사가 아직까지 길지 않아 보안 수준평가를 위한 점검항목들이 충분히 개발되지 못하였다. 이에 기존에 알려진 모바일 게임 관련 보안 취약점을 분석하여 게임 내 보안수준을 평가하기 위한 사전 점검항목을 열거해보도록 한다.

A Study on the Verification Tool for the Security Level in Development Environment (개발 환경 보안수준 점검도구 연구)

  • Ko, Il-Seok
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.133-140
    • /
    • 2006
  • For the verification of the security level against a IT product development environment, we should analyze the vulnerability and the various threatening factors which exists in the IT product development environment. Also we need the evaluation criteria and tools for the evaluation and improvement of the level of information security. For that, we need evaluation indices and the standard it will be able to improve the evaluation methodology in the actual IT product development environment which will reach it will be able to apply must be researched. In this study, our aims are the development of verification tools for the security level of IT product development environment.

  • PDF

A Study on Development of Multi-level Security Architecture(MLSA) (Multi-level 보안 아키텍처(MLSA) 구축 방안)

  • Choi, Kyong-Ho;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.107-114
    • /
    • 2007
  • We need development methodology of security architecture which offered various levels of security management in case of the organization required more than two security certifications. In this study, therefore, development methodology of Multi-level Security Architecture(MLSA) proposed. Specifically, we should consider factors of commonness and difference between information security management level evaluation of multiple security architecture. This kinds of endeavor can suggest the direction of the improvement of the evaluating security management and the dynamic plan for the security architecture, and it will make the continuous and systematic security management.

  • PDF