• Title/Summary/Keyword: 보안 평가

Search Result 1,590, Processing Time 0.03 seconds

A Derivation of Evaluation Item about Enterprise Security Management (통합보안관리시스템에 대한 평가항목 도출)

  • Kim, Seon Joo;Lee, Kong Seon;Shin, Seok Kyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.409-412
    • /
    • 2009
  • 통합보안관리시스템(Enterprise Security Management)은 기업의 보안 정책을 기반으로 다수의 보안시스템을 중앙에서 통합관제, 운영, 관리를 지원하는 시스템이다. 국내의 경우 정보보호시스템에 대한 보안성 평가는 국제공통평가기준을 근거로 평가 및 인증이 이루어지고 있는 반면, SW 품질관점에서의 ESM에 대한 평가 방안에 대한 연구는 미미한 실정이다. 이에 따라 본 논문에서는 SW 품질관점에서 ESM에 대한 평가항목을 제안하고자 한다.

A Design of SERDL(Security Evaluation Rule Description Language) and Rule Execution Engine for Evaluating Security of IPv6 Network (IPv6 네트워크 계층의 보안성 평가를 위한 평가규칙 표기 언어 및 평가 수행기의 설계)

  • Kwon, Hyeok-Chan;Kim, Sang-Choon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.471-484
    • /
    • 2004
  • Recently. many projects have been actively implementing IPsec on the various Operating Systems for security of IPv6 network. But there is no existing tool that checks the IPsec-based systems, which provide IPsec services, work Properly and provide their network security services well In the IPv6 network. In this paper, we design SERDL(Security Evaluation Rule Description Language) and rule execution tool for evaluating security of the IPv6 network, and we provide implementation details. The system Is divided into following parts : User Interface part, Rule Execution Module part, DBMS part and agent that gathering information needed for security test.

A study on Security Functional Requirement(SFR) of Applicable to the Cloud Environment in Common Criteria (공통평가기준에서의 클라우드 환경에 적용 가능한 보안기능요구사항(SFR)에 관한 연구)

  • Wi, Yukyeong;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.731-734
    • /
    • 2013
  • 클라우드 컴퓨팅이 활성화됨에 따라 다양한 클라우드 서비스가 대중적으로 보급되고, 그에 따른 클라우드 컴퓨팅 관련 제품들을 IT시장에서 쉽게 접할 수 있게 되었다. 일반적으로 IT 제품군에 대해서 보안성평가를 수행하고, 그 결과 값을 통해 소비자에게 객관적인 지침으로 활용될 수 있는 국제 표준인 공통평가기준에서는 보안 제품군에 대한 보안목표명세서인 보호프로파일을 제공하고 있다. 하지만 현재 일반적인 IT제품군에 대한 보호프로파일은 존재하나 클라우드 관련 제품군에 대해서는 보호프로파일이 존재하지 않아 보안성평가를 위한 방법이 없는 실정이다. 따라서 본 논문에서는 공통평가기준을 준수하는 클라우드 환경에 적용 가능한 보안기능요구사항을 도출하고자 한다. 도출한 보안기능요구사항을 통해 클라우드 제품군에 대한 보안성을 적용하기 위한 평가 방법으로 사용될 수 있다.

A Study on the Security Management System Model for the Information Security of the Aviation infrastructure (항공기반시설의 정보보호를 위한 보안관리체계 모델에 관한 연구)

  • Jung, Chang-Hwa;Lee, Joon-Taik;Chung, Dong-Keun
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.87-96
    • /
    • 2011
  • The importance of the security management system for the aviation infrastructure cannot be overemphasized. What is especially important on the security management system for it is the assessment that is detaild and systematic. This article presents a framework based on a Hanulcha-type security management system model for a Information security of the Aviation infrastructure. This system checks, estimates and analyzes the goal of security with effect, especially in case of the security-accident on the aviation infrastructure because this system model gives the integrated security assessment method.

Research on a Valuation Standard and the Actual Condition About Security Management in PACS (PACS에서 보안관리 평가기준 연구와 실태조사)

  • Jeong, Jae-Ho;Dong, Kyung-Rae;Kweon, Dae-Cheol;Son, Gi-Gyeong;Kim, Hyun-Soo;Kang, Hee-Doo
    • Journal of radiological science and technology
    • /
    • v.31 no.4
    • /
    • pp.347-353
    • /
    • 2008
  • This study is to prepare an evaluation standard about personal information protection and security management of a medical institution and to build up a grade standard of evaluation in PACS environment. We built up evaluation index based on 10 detailed items in four big categories (political security, technical security, data management security and physical security) by referring to ISO17799 (BS 7799), HIPPA (Health Insurance and Portability and Accountability Act of 1996) and domestic medical law. We have investigated at the thirty places where medical facility with the extracted security criteria and security evaluation index. Average score of physical security list, one of the big categories, was 18.5/20 (93%) at all medical institutions. Political security score was 18.5/30 (62%), data management security score was 12/20 (60%) and technical security score was 17.5/30 (58%). Therefore, security evaluation score was average 67 in 30 general hospitals, which was 4th level. The results showed that it is necessary to establish evaluation and management standard about personal information protection and security consciousness which are weak in PACS environment.

  • PDF

Development of Security Metrics of Enterprise Security Management System (통합보안관리시스템의 보안성 메트릭 개발)

  • Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.303-311
    • /
    • 2017
  • As new information technology emerges, companies are introducing an Enterprise Security Management system to cope with new security threats, reducing redundant investments and waste of resources and counteracting security threats. Therefore, it is necessary to construct a security evaluation metric based on related standards to demonstrate that the Enterprise Security Management(ESM) System meets security. Therefore, in order to construct a metric for evaluating the security of the ESM, this study analyzed the security quality related requirements of the ESM and constructed a metric for measuring the degree of satisfaction. This metric provides synergies through the unification of security assessments that comply with ISO/IEC 15408 and ISO/IEC 25000 standards. It is expected that the evaluation model of the security quality level of ESM will be established and the evaluation method of ESM will be standardized in the future.

A Study Certification and Accreditation Process of Application Systems (응용체계 보안성 평가.승인 절차에 관한 고찰)

  • 김종기
    • Review of KIISC
    • /
    • v.8 no.4
    • /
    • pp.47-62
    • /
    • 1998
  • 응용체계 보안성 평가. 승인 제도는 정보시스템의 보안성에 대한 품질보증을 위한 핵심적인 수단이다. 응용체계는 동일한 구성요소로 이루어져 있다고 할지라도 운영환경과 이용목적에 따라 보안 요구사항을 달이함으로 적절한 수준의 보안성을 확보하고 있는지를 확인하는 것은 매우 중요하다. 본 연구에서는 응용체계의 보안성을 평가하기 위한 몇 가지 방법론을 절차의 측면에서 살펴보고, 평가. 승인 절차에 있어서 핵심적인 고려사항을 기술하였다.

  • PDF

A Study on Common Criteria for Developer's Perspective Guide (개발자를 위한 합성제품 평가 지침에 관한 연구)

  • Jung, Sung-Mo;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.7-13
    • /
    • 2008
  • In domestic and international, evaluation of product with Common Criteria(CC) for security product estimation is expanding standard of product estimation. This expansion is due to multi aspects of product versions. However, it is very difficult to approach the most suitable form of security estimation guide in the developer's perspective, because estimation basis presented to developers is indefinite. With this pending dilemma, we are presenting a composition product introduce definite security standard for information security products.

  • PDF

A Study on Evaluation Methodology for Security Performance and Property (네트워크 보안성능 및 보안성 평가 방법에 관한 연구)

  • 정지환;김상영;황선명
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11b
    • /
    • pp.711-714
    • /
    • 2003
  • 인터넷의 발달로 네트워크 업무가 점점 더 많이 도입이 됨으로써 네트워크 상에 노출되어 있는 데이터와 시스템들의 보안은 중대한 문제로 대두되기 시작했다. 그러나 장비나 소프트웨어 등의 보안성과 보안성능 평가에 대한 기준이 명확하지 않아 이들의 객관적인 평가에 많은 어려움이 따르고 있다. 본 논문에서는 관련 연구 기관들의 평가 방법들을 분석하여 이들을 객관적으로 평가 할 수 있는 방법을 제시하고자 한다.

  • PDF

Quantitative Scoring Criteria on the Importance of Software Weaknesses (소프트웨어 보안약점의 중요도에 대한 정량 평가 기준 연구)

  • Ahn, Joonseon;Bang, Ji-Ho;Lee, Eunyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1407-1417
    • /
    • 2012
  • In order to protect a software system from security attacks, it is important to remove the software security weaknesses through the entire life cycle of software development. To remove the software weaknesses more effectively, software weaknesses are prioritized and sorted continuously. In this paper, we introduce the existing scoring systems for software weakness and software vulnerability, and propose a new quantitative standard for the scoring system, which helps evaluate the importance of software weakness objectively. We also demonstrate the practicability of the proposed standard by scoring 2011 CWE/SANS Top 25 list with the proposed standard and comparing it to the original score of MITRE.