• Title/Summary/Keyword: 보안 평가 지표

Search Result 85, Processing Time 0.023 seconds

Evaluating Information Security Investment using TCO-based Security ROI (TCO기반 Security ROI를 활용한 정보보호 투자성과 평가방법)

  • Lee, Jong-Sun;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1125-1128
    • /
    • 2007
  • 보안 취약성이 끊임없이 보고되고 있다. 이는 보안솔루션의 초기 효과수준을 유지하기 위해서는, 새로운 취약성이 보고되면 즉시 대처하는 지속적 관리활동이 필요함을 뜻한다. 한편 기업성과 개선을 위한 IT투자성과관리가 강조되는 가운데, 정보보호 솔루션 도입 시 재무적 타당성 증명이 요구되고 있다. 이를 위해 여러 형태의 ROSI(Security ROI)가 제시되었으나, 지속적 보호활동에 따른 관리비용이 중요하게 다루어져야 함에도 불구하고 비용에 대한 고려가 적고 효과산정에만 치우쳐, 경영자의 의사 결정을 지원하는 실제적인 재무 성과지표로 활용될 수 없었다. 이에 본 논문은 조직수준의 비용효과 최적화를 추구하는 정보보호 관리체계에 기반을 두어 효과를 산정하고, 비용 산정은 지속적 관리활동이라는 특징을 반영하여 TCO에 기반을 둔 개선된 ROSI를 제안한다. 또한, 제안한 ROSI를 활용한 보안솔루션 평가사례를 제시한다. 증명이 어려운 정보보호 분야 투자타당성 증명은 물론 보안솔루션 선택 시 실제적인 의사결정 판단근거로서 활용될 수 있다.

Development of Cyber Security Assessment Methodology for the Instrumentation & Control Systems in Nuclear Power Plants (원전 계측제어시스템에 대한 사이버보안성 평가 방법론 개발)

  • Kang, Young-Doo;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3451-3457
    • /
    • 2010
  • Cyber security assessment is the process of determining how effectively an entity being assessed meets specific cyber security objectives. Cyber security assessment helps to measure the degree of confidence one has and to identify that the managerial, technical and operational measures work as intended to protect the I&C systems and the information it processes. Recently, needs for cyber security on digitalized nuclear I&C systems are increased. However the overall cyber security program, including cyber security assessment, is not established on those systems. This paper presents the methodology of cyber security assessment which is appropriate for nuclear I&C systems. This methodology provides the qualitative assessments that may formulate recommendations to bridge the security risk gap through the incorporated criteria. This methodology may be useful to the nuclear organizations for assessing the weakness and strength of cyber security on nuclear I&C systems. It may be useful as an index to the developers, auditors, and regulators for reviewing the managerial, operational and technical cyber security controls, also.

Development of a Quality Evaluation Model for Web-based Software (웹기반 소프트웨어 품질평가 모델 개발)

  • O, Yeong-Bae;Jeong, Yeong-Eun;Sin, Seok-Gyu
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.475-479
    • /
    • 2006
  • 소프트웨어 어플리케이션들이 점차 다양한 응용분야에서 광범위하게 사용됨에 따라 소프트웨어 품질의 중요성이 높아지고 있다. 특히 웹기반 소프트웨어는 전통적 소프트웨어에 비해 보다 높은 품질 수준을 요구하고 보안이 중요시되며 시스템 통합과 유지보수 및 재사용에 대한 품질 요소가 중요시 된다. 웹기반 소프트웨어의 품질을 객관적이고 정량적으로 명세하고 평가하기 위하여, 객관적인 근거를 제시할 수 있는 지표로서 평가 항목들이 정의되어야 한다. 본 논문은 웹기반 소프트웨어의 품질 평가를 위한 모델을 제안하고 평가항목 및 평가방법과 절차를 제시하고자한다.

  • PDF

A Study on Establishment of Evaluation Criteria for Anti-Virus Performance Test (Anti-Virus 성능 시험을 위한 평가 기준 수립 연구)

  • Jeongho Lee;Kangsik Shin;Youngrak Ryu;Dong-Jae Jung;Ho-Mook Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.847-859
    • /
    • 2023
  • With the recent increase in damage caused by malcious codes using software vulnerabilities in Korea, it is essential to install anti-virus to prevent malicious codes, However, it is not easy for general users to know which anti-virus product has good performance or whether it is suitable for their environment. There are many institutions that provide information on anti-virus performance outside of korea, and these institutions have established their own test environments and test evaluation items, but they do not disclose detailed test environment information, detailed test evaluation items, and results. In addition, existing quality evaluation studies are not suitable for the evaluating the latest anti-virus products because there are many evaluation criteria that do not meet anti-virus product evaluation. Therefore, this paper establishes detailed anti-virus evaluation metrics suitable for the latest anti-virus evaluation and applies them to 9 domestic and foreign anti-virus products to verify the functions and performance of anti-viruses.

Developing key Performance Indicators for Financial IT Security (금융IT 보안조직 역량강화를 위한 핵심성과지표(KPI) 도출에 관한 연구)

  • Jang, Sung Ok;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.125-142
    • /
    • 2013
  • As a reinforcing strategic-alignment of IT business, Financial Service becomes more rely on IT systems. It needs to continuous information security activities to provide a secure and reliable finance service. Performance measurement of information security activities can be useful for decision and management support. The purpose of this study is to derive CSF(Critical Success Factor) and KPI(Key Performance Indicator) based on K-ISMS, Financial IT Information Security Standards. Providing a rationale can be used to determine key performance indicators, which are utilized as basic data for establishing security policies for financial IT security competency.

Quantitative Cyber Security Scoring System Based on Risk Assessment Model (위험 평가 모델 기반의 정량적 사이버 보안 평가 체계)

  • Kim, Inkyung;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1179-1189
    • /
    • 2019
  • Cyber security evaluation is a series of processes that estimate the level of risk of assets and systems through asset analysis, threat analysis and vulnerability analysis and apply appropriate security measures. In order to prepare for increasing cyber attacks, systematic cyber security evaluation is required. Various indicators for measuring cyber security level such as CWSS and CVSS have been developed, but the quantitative method to apply appropriate security measures according to the risk priority through the standardized security evaluation result is insufficient. It is needed that an Scoring system taking into consideration the characteristics of the target assets, the applied environment, and the impact on the assets. In this paper, we propose a quantitative risk assessment model based on the analysis of existing cyber security scoring system and a method for quantification of assessment factors to apply to the established model. The level of qualitative attribute elements required for cyber security evaluation is expressed as a value through security requirement weight by AHP, threat influence, and vulnerability element applying probability. It is expected that the standardized cyber security evaluation system will be established by supplementing the limitations of the quantitative method of applying the statistical data through the proposed method.

Information Security Management in Healthcare Area (보건의료정보 보호관리 모델 개발)

  • Jeong, Hey-Jeong;Kim, Nam-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.953-956
    • /
    • 2005
  • 보건의료정보는 개인의 가장 민감한 정보로 최상의 보호가 이뤄져야하는 한편, 국민 건강과 복지 향상을 위한 공익의 성격도 강하여 관리와 책임에 대한 명확한 지침이 반드시 필요하다. 본 연구에서는 보건의료 부문의 특성과 정보화 현황을 반영하고 선행연구의 한계점을 보완하여 국내 보건의료 환경에 적합한 정보보호관리 모델을 개발하였다. BS7799, HIPAA Security Rule, HL7 EHR SIG 기능명세 등을 참고하여 필요성, 정보보호 목적/전략 수립, 위험분석/평가, 정보보호관리 정책수립, 정보보호관리 프레임워크 설계, 관리적 보안, 물리적 보안, 기술적 보안, 정보보호관리 평가,운영관리의 총 10개 세부 프로세스와 111개의 이행지표로 구성된 본 모델은 보건의료정보 취급자에게 실행 지침을 제공하여 보건의료정보시스템의 안정성 향상과 국민 보건복지 수준 향상에 이바지할 수 있을 것으로 기대된다.

  • PDF

Analysis of Key Performance Index for Advanced Logistics (물류산업의 선진화를 위한 성과지표 분석: IT서비스를 중심으로)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.25-30
    • /
    • 2013
  • In this paper, the key performance index for advanced logistics is analyzed, and the specific requirements for the material flow IT services are proposed to improve the world competitiveness of the material flow industries and to implement the advanced logistics in Korea by survey research. The key performance index is classified into three types of efficiency, sustainability and economics, and two classes of enterprise and public for IT services are proposed. In addition to, for case studies, the survey analysis for the Pyeongtaek Port is performed to diagnose the material flow enterprise and to analyze the priorities of the IT services for Port's employee, trade enterprise, public service personnel, and local resident. From the results, to improve the productivity and efficiency of the enterprise, the secure the professional man-power and standardization are needed, and the automation, u-Port, green technology and material flow security for the IT services are required.

The study on the military utilization of weather modification techniques and inducing their research priority (기상조절기술의 군사적 활용방안과 연구 우선순위 도출에 관한 연구)

  • Han, Seung Jo;Shin, Jin
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.77-88
    • /
    • 2018
  • The purposes of this paper are to research the military utilization of weather modification techniques and to induce their research priority when considering the Korean Peninsular environment and technical level. To achieve these goals, the advantages and disadvantages of weather modification technologies have been discussed, and the evaluation index evaluation was derived through the Delphi method, and the weight of the evaluation index and the final research priority were induced through analytic hierarchical process. Analysis shows that the ionospheric modulation technology has the highest priority in terms of effectiveness as a weapon system and compatibility in the Korean Peninsula environment. It is expected that Korean ionosphere modification can disturb C4ISR function of the enemy and guarantee ours reliably when operating PGM, military satellite, surveillance & reconnaissance equipments, etc. Other weather modification technologies except for ionosphere modification should be developed gradually in that potential threat can be expanded to neighboring countries after the Unification of the Korea.

  • PDF

Development of Privacy Impact Assessment Tool (개인정보 영향평가 툴 개발)

  • Heo, Jin-Man;Woo, Chang-Woo;Park, Jung-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.2
    • /
    • pp.75-81
    • /
    • 2012
  • As the number of web users is increasing, the leakage of personal information is increasing. If some personal information is leaked, the victim can suffer from material damage or mental damage at the same time. Most of the leakages are result from the people who works for the personal information by accident or design. Hence, the Ministry of Public Administration and Security proposeed the measuring index and enumerates the details. The index is used in a system to check protection of a personal information. However, because this system is used to evaluate after the leakage, it cannot be used to construct some security system or programming a security system. To solve this problem, it needs to express the diversity of items and be able to count what assessors want to count. Thus, a summary sheet which displays the result of the tool will be presented in a radial form graph. Details will be presented as a bar graph. Therefore, it will be proposed that the tool can grasp the weak point and propose the direction of security.

  • PDF