• Title/Summary/Keyword: 시스템 수준 보안

Search Result 468, Processing Time 0.024 seconds

A Study on the Scope of Security Level Management for Information Systems (정보시스템 보안수준관리 필요성 및 범위에 관한 연구)

  • Kim, Tai-Hoon
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.05a
    • /
    • pp.167-171
    • /
    • 2007
  • 정보기술의 발달 및 정보화의 촉진으로 인해 정보시스템의 복잡도는 급격히 증가하고 있으며, 이에 따라 정보보호제품을 설치 ${\cdot}$ 운영함으로써 보안목적을 달성하는 과거의 보안정책은 한계에 도달하였다고 할 수 있다. 대부분의 정보시스템 사용자들은 해당 정보시스템의 보안대책에 대한 신뢰가 적절한 수준인지 판단할 수 있기를 원하고 있으며, 또한 이러한 수준이 지속적으로 유지되기를 바라고 있다. 보안수준을 유지하기 위해서는 지속적으로 해당 시스템의 보안수준을 확인하여야 하는데, 이러한 확인 및 판단의 근거를 제공하는 가장 기본적이고 전통적인 방법은 보안수준에 대한 평가이다. 본 논문에서는 정보시스템의 보안수준을 유지하기 위한 보안수준관리의 필요성과, 이를 위해 보안수준 확인이 필요한 평가 대상항목을 식별하였다.

  • PDF

IT 시스템 보안수준관리를 위한 보안 평가 대상 항목 식별

  • Kim, Tae-Hun;Saquralee, Koleechi;Na, Yun-Ji
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.123-127
    • /
    • 2006
  • This paper identifies some components should be evaluated and certified to assure that IT systems are secure. Security objective of IT systems will be obtained by protecting all areas of IT systems, so not only visible parts but also non-visible parts must be protected. And for verifying all the parts of IT systems are protected, we should check the scope of evaluation and certification covers all necessary parts.

  • PDF

Improvement of Physical security System Operation (물리적 보안시스템 운용수준 분석)

  • Chung, Taehwang
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.282-286
    • /
    • 2014
  • This study is to present an improvement of physical security system operation by survey on the install and operation of physical security system of 90 facilities. The level of CCTV operation is higher than Access Control system and Intrusion Detection System. But the level of maintenance and management of physical security system is low. The rate of install of X-ray Inspection device show the concern on material detection, although the rate is low. The level of install and operation for the Integration of physical security system is low, so integration of security personnel and security system is necessary for the effective operation. For reinforcement of access control management, security gate and preparing of some obstacles are required with RFID.

Development of Security Level Evaluation Tool(ISSPET) Based on Information Security System (정보보호 시스템기반의 보안 수준 평가 도구(ISSPET) 개발)

  • Soh, Woo-Young;Kim, Wan-Kyung;Kim, Seak-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1911-1919
    • /
    • 2009
  • Currently, the evaluation technology for the security systems of risk analysis level measurement is maintained by only the developed countries including U.S and U.K, and the evaluation technology and its infrastructure are insufficient for the evaluation technology of security threat analysis level measurement in Korea. Therefore this paper presents the development of the security control items and the evaluation tool(ISSPET) for the security level performance. It is expected to evaluate the security management level of the current system and its security environment through analyzing the security management level of security systems using ISSPET.

A Study on The Decision of Security Level Management Target (보안수준관리 대상항목 설정에 관한 연구)

  • Yeo, Sang-Soo;Kim, Tai-Hoon;Cho, Sung-Eon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1866-1872
    • /
    • 2007
  • Information system contains various components, md these components can be categorized into some types. When preparing security level management activity, it is most important to define the target of management activity. And after deciding these targets, security level management activity can be started. This paper defines management targets by dividing information system into some parts, and these targets can be managed variously according to operation environments and characteristics. By doing so, security level management activity can be processed easily.

Requirements Analysis in Security Model Design of Mobile Agent Systems (이동 에이전트 시스템의 보안모델 설계를 위한 요구사항 분석)

  • Jin-Ho Park;Jin-Wook Chung
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.77-88
    • /
    • 2002
  • A mobile agent system is an infrastructure that supports the mobile agent paradigm. The main challenges encountered in designing this infrastructure are discussed in this paper. After introducing a generic mobile agent system, we discuss the design issues at two levels. System level issues like the provision of agent mobility and security, are mainly encountered in developing the runtime environments for agent execution. Language level issues, such as agent programming models and primitives, arise in providing support for mobile agent programming, mainly at the library level. This paper Identifies such system and language-level issues, and illustrates the different ways developers ate addressing them. We outline the specific challenges addressed by this dissertation, primarily in the area of mobile agent security.

  • PDF

A Security Level Decision Method for Multimedia System (멀티미디어 시스템 정보보호수준 결정 기법)

  • Kim, Tai-Hoon;Lee, Deok-Gyu;Yeo, Sang-Soo;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.61-67
    • /
    • 2008
  • Each organization installing and operating multimedia system, to achieve the goal of organization, should decide security level, implement security countermeasure, and manage these countermeasures to keep the effects. To decide and manage security level of multimedia system, the first, organizations must be able to decide security level, and then, organizations must establish procedures for building security countermeasures according to security level. For the next step, organizations must be able to select areas where security countermeasures should be applied, and the last, organizations must be able to evaluate and improve the effect of security countermeasures. In this paper, based on the analysis of threat to multimedia system and the consideration for multimedia assets, we propose a method for deciding security level of multimedia system.

  • PDF

ICT 아웃소싱 환경에서 보안관리 방안 연구

  • Kim, Yanghoon;Mun, Je-Uk;Hwang, Seon-Ho;Chang, Hangbae
    • Review of KIISC
    • /
    • v.24 no.1
    • /
    • pp.23-31
    • /
    • 2014
  • 대기업과 중소기업을 막론하고, 기업의 정보화는 기업의 지속가능한 발전을 위하여 필수불가결한 요소가 되어가고 있다. 또한, 기업들의 업무 프로세스는 기존의 정보화 시스템 및 신규 정보화 시스템 개발 및 보완을 통하여 전사적 단계로 진화되고 있으며, 자체적인 정보화 시스템 개발 및 운영인력을 보유하지 못하는 대다수의 기업들은 이러한 정보화 시스템 개발과 운영의 많은 부분을 기업 외부의 자원을 활용하는 아웃소싱에 위탁하여 수행하고 있다. 근래에 들어, 아웃소싱 인력을 포함한 내부자에 의한 정보유출 및 보안 사고의 규모는 매해 증가하고 있으나, 기업의 보안시스템은 해킹, 크래킹 등의 외부자 공격에 대한 방어위주로 구축되어 있다. 또한, 아웃소싱에 참여하고 있는 인력에 대한 적절한 기술적 관리적 보안체계의 수립이 미흡함으로써 발생하는 보안사고로 인하여 기업이 막대한 피해를 입는 사례가 나타나고 있다. 따라서, 아웃소싱 인력에 대한 보안수준을 향상하고 체계적인 아웃소싱 보안관리를 위한 가이드라인 수립이 필요한 시점이다. 본 연구에서는 기존의 선행연구를 조사하여 아웃소싱에 대한 보안 통제항목을 도출하고 도출된 보안 통제항목을 바탕으로 아웃소싱 보안수준을 높이기 위한 보안관리 추진방향을 제언하였다.

Impacts of Success Factors of Information System on Trust of Security of Casino Information System and Job Satisfaction (정보시스템 성공요인이 카지노정보시스템의 보안신뢰와 직무만족에 미치는 영향)

  • Lee, Dae-Kun;Kim, Yong-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.81-98
    • /
    • 2015
  • This study explores performance factors of a casino information system for foreigners, empirically examines the causal relation between these factors and business performances through organizational trust and job satisfaction and suggests a plan to develop such a information system. We found that information quality positively impacted on perception of information security, but negatively on job satisfaction; system quality positively did on security reliability, but negatively on job satisfaction; service quality positively did on trust in information security and job satisfaction; lastly security reliability positively did on job satisfaction. We found that information quality, system quality and service quality would affect perceived information security and job satisfaction.

Impacts of Success Factors of Information System on Business Performance through Security Reliability of Casino Information System and Job Satisfaction (정보시스템 성공요인이 카지노정보시스템의 보안신뢰와 직무만족을 통해 경영성과에 미치는 영향)

  • LEE, Dae Kun;HWANG, Chan Gyu
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.181-198
    • /
    • 2016
  • This study explored the performance factors of casino information systems for foreigners, empirically examined the causal relation between these factors and the business performances through organizational trust and job satisfaction and suggested a direction to enhance the casino information systems. The result of this study showed that, firstly, information quality impacted positively on security reliability and job satisfaction. Secondly, system quality impacted positively on security reliability and job satisfaction. Thirdly, service quality impacted positively on security reliability and job satisfaction. Fourthly, security reliability impacted positively on job satisfaction through security reliability. Lastly, security reliability and job satisfaction impacted positively on business performance. This research must be continued by expanding upon the variables of this research study, and there is a need for follow up research on methods that can analyze the management performance of casino information systems from a diverse set of approaches and also research that conducts an analysis on systems that are implemented to prevent tax evasion.