• Title/Summary/Keyword: 보호수준

Search Result 1,712, Processing Time 0.03 seconds

VoIP 보안기술, 한 단계 진일보

  • Yun, Seok-Ung
    • 정보보호뉴스
    • /
    • s.127
    • /
    • pp.24-26
    • /
    • 2008
  • 최근 인터넷전화(VoIP) 사용이 증가하고 있는 가운데, 지난 4월 7-8일 양일간 삼성동 코엑스에서 의미 있는 전시회가 개최됐다. KISA가 LG데이콤, 웨어플러스 등 3개 업체와 공동으로 지난 2006년부터 3개년 사업으로 추진하고 있는 VoIP의 정보보호 연구와 그 결과물인 정보보호 시스템 전시회가 그것이다. 특히 이번 전시회에서는 종단간(End to End) 보안통신을 지원하는 인터넷전화기기를 비롯해, 스팸 확산을 방지하는 VoIP 스팸 대응, VoIP 서비스망 보호를 위한 보안세션제어 시스템 등이 선보여, 차세대 IT 서비스로 주목받는 인터넷전화 서비스의 정보보호 수준을 한 단계 끌어올릴 것으로 평가받고 있다.

  • PDF

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

Analysis of Security System Priority for the Systematic Defense Technology Security (체계적인 방위산업기술보호를 위한 보호체계 우선순위 분석 연구)

  • Park, Heungsoon;Kim, Seyong;Kim, Yonghwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.3-12
    • /
    • 2019
  • The outflow of defense technology can cause serious damage not only in terms of business losses, but also in terms of national security and national interests. Recently, the government has enacted the Defense Technology Security Act, recognizing the importance of technology in the defense industry, and prepared guidelines for the defense technology security accordingly. According to the law, institutions and companies with defense technologies should establish a defense technology protection system, and the government should implement various technology protection policies to improve their level of technology protection. In this study, the implications were derived by comparing existing technology protection guidelines and priority analysis was performed on the protection system details through AHP for self-diagnosis items in the defense technology security guidelines. As a result, it is expected that it will enable efficient diagnosis of the level of protection and policy support for the systematic establishment of the protection system for the target institutions.

Development of a Standardized Framework for Domestic Information Security Education; Focusing on a Two-Track Curriculum Customized by Age and Job (국내 정보보호 교육 표준 프레임워크 개발; 연령 및 직무 맞춤의 이원화(Two-track) 교육과정을 중심으로)

  • Park, Minjung;Lee, GI Hyouk;Chai, Sangmi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1083-1095
    • /
    • 2021
  • With the recent increase in users' dependence on the Internet and the spread of various IT devices, the influence of information security on the users' has expanded compared to the past. Therefore, it is expected to have an increased influence on information security in personal life. In addition, as the intrusion factors that threaten security continue to become more advanced and diversified (eg., fake news, cyberbullying, identity theft), the need for nurturing information security experts is increasing. Furthermore, not only corporate information security workers, but also all individuals, cannot be free from the threat of information security. Therefore, it is necessary to prepare various information security education to improve information security awareness and induce proactive information security behaviors. In this study, characteristics of domestic and foreign information security education courses are analyzed and provide a standardized framework for information security education applicable to the domestic environment.

Analysis of Standardization Level for Information Security Technology (정보보호 기술 개발 및 표준화 현황 분석)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.53-59
    • /
    • 2013
  • As the hacking technology for cyber-terror and financial fraud evolves, the research and development for advanced and standardized information security technology is growing to be more and more important. In this paper, the domestic level of technology and standardization for information security as compared to advanced country is diagnosed, and future policy is presented by analyzing the influence effect for market and technology. The information security is classified into information security-based & user protection, network & system security, and application security & evaluation validation with details of OTP-based validation, smart-phone app security, and mobile electronic finance, etc. The analytic results indicate that domestic level is some poor for advanced country, the technological development and standardization capability for smart-phone app security and mobile electronic finance is needed, and finally the government's supporting policy for the future Internet is urgently needed.

A Study on ISMS-P Controls for Hyper Scale Cloud (하이퍼 스케일 클라우드에 적합한 정보보호 및 개인정보보호 관리체계 인증 통제항목 연구)

  • Yong-Nyuo Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.19-26
    • /
    • 2023
  • Critical information infrastructure designations for cloud service providers continue to spread around the world as energy, financial services, health, telecommunications, and transportation sectors move to the cloud. In addition, in the case of Ukraine, the removal of restrictions on the use of cloud for national critical facilities and the rapid transition of critical data to the cloud enabled the country to effectively respond to cyberattacks targeting Russian infrastructure. In Korea, the ISMS-P is operated to implement a systematic and comprehensive information protection management system and to improve the level of information protection and personal information protection management in organizations. Control items considering the cloud environment have been modified and added to the audit of companies. However, due to the different technical levels of clouds between domestic and global, it is not easy to obtain information on the findings of cloud providers such as Microsoft for the training of domestic certification auditors on hyperscale scale. Therefore, this paper analyzes findings in hyperscale clouds and suggests ways to improve cloud-specific control items by considering the compatibility of hyperscale environments with ISO/IEC 27001 and SOC(System and Organization Control) security international standards.

A Study on the Job Stress and Job Satisfaction of Rehabilitation-Counselors in Sheltered Workshop (장애인보호작업장 종사자의 직무스트레스와 직무만족의 관계연구)

  • Kim, Jong-Ok;Na, Woon Hwan;Kim, Jimin
    • 재활복지
    • /
    • v.15 no.2
    • /
    • pp.249-274
    • /
    • 2011
  • The purpose of the present study was to provide fundamental information to improve job satisfaction of rehabilitation-counselors and the service in sheltered workshop. The researcher conducted the nationwide survey of rehabilitation-counselors in sheltered workshop. The results of this study were summarized as follows. First, job stress of rehabilitationcounselors in sheltered workshop was in low level, but job satisfaction was relatively in high level. The factor of conflict in their role and over-roaded role reached serious level. And the promotion and salary of a job made their job satisfaction lower. Second, there was significant correlation between job stress and their career. Third, job satisfaction according to general characteristics of rehabilitation-counselors differed from their age. Fourth, there was significant correlation between job stress and job satisfaction. It showed that the higher job stress, the lower job satisfaction. Therefore, policy improvement was needed to enhance job satisfaction. In addition, continuous research and individual efforts were needed to lower the level of job stress for rehabilitation counselors in sheltered workshop.

Evaluation of Exposure to Organophosphorus Pesticides According to Application Type and the Protective Equipment among Farmers in South Korea (일부 농업인에서의 농약살포방식 및 보호구 착용에 따른 유기인계 농약노출평가)

  • Lee, Jeeyoung;Roh, Sangchul
    • The Korean Journal of Pesticide Science
    • /
    • v.20 no.2
    • /
    • pp.172-180
    • /
    • 2016
  • This study was conducted to evaluate the relations between the exposure level of organophosphates (OPs) pesticide and application factors among rural farmers. The urinary dialkylphosphates, metabolites of organophosphorus pesticides, including DMP, DEP, DMTP and DETP were analyzed by GC/MSD and GC/MS/MS. The DMP and DMTP were detected more in the use of a speed sprayer without cap than with a capped one. Also, the less farmers wore the personal protective equipment (PPE), the more these were detected. The amount of organophosphorus exposure was the highest in the use of a power sprayer. However, it was low when a farmer applied pesticides with a speed sprayer with cap and wore more PPE. In this study, the detection rate was analyzed by chi-square test, the exposure level of OPs was analyzed by a generalized linear model.

Personal Privacy Protection Agent for RFID Users (RFID 사용자를 위한 개인 프라이버시 보호 에이전트)

  • Kim Soo-Cheol;Yeo Sang-Soo;Kim Sung Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.58-60
    • /
    • 2005
  • 본 논문에서는 RFID 프라이버시 보호를 위한 개인 모바일 장치에 대해 제안한다. 현재까지 제안되었던 보안 기법들은 태그와 리더 사이의 암호학적 기법에 중점을 두었다. 제안하는 프라이버시 보호 에이전트는 다른 논문과는 달리 특별한 모바일 기기를 사용하여 높은 수준의 보안을 제공한다. 에이전트에 등록된 태그가 자신의 정보를 보안 에이전트에 위임하여 태그의 역할을 대신하게 하는 방식을 사용한다. 에이전트는 접근하는 리더를 인증하고 자신이 관리하는 태그 정보들을 선별하여 높은 수준의 암호화 처리 후 안전하게 통신한다. 태그는 해쉬만 가능하면 위변조문제까지 막을 수 있으므로 현재 RFID 시스템의 큰 변경없이 에이전트가 도입 가능하며 RFID 프라이버시 보호 문제를 해결 할 수 있을 것이라 기대된다.

  • PDF

A Study on The Managing Practices in SLM for Multimedia System (멀티미디어 시스템 정보보호수준관리를 위한 관리형 프랙티스에 관한 연구)

  • Kim, Tai-Hoon;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.673-680
    • /
    • 2008
  • Multimedia system security can be categorized into groups such as protection of multimedia asset itself and protection of multimedia systems which can process multimedia asset. Divided consideration for these two factors will not hurt the importance of security management. In this paper, managing practices for keeping security level of multimedia systems are induced and categorized.

  • PDF