• Title/Summary/Keyword: 융합 보안

Search Result 2,624, Processing Time 0.031 seconds

융합보안의 개념 정립과 접근방법

  • Kim, Jung-Duk;Kim, Kun-Woo;Lee, Yong-Duk
    • Review of KIISC
    • /
    • v.19 no.6
    • /
    • pp.68-74
    • /
    • 2009
  • 현재 융합보안에 대한 개념은 물리적, 기술적, 관리적 보안을 상호 연계하여 보안의 효과성을 높이고자 하는 통합적 보안을 관리하는 개념과, 보안이 조선, 자동차 등 기타 산업과 융합되어 새로운 서비스나 제품의 안전성과 부가가치 창출을 위한 복합적 의미의 개념으로 사용되고 있다. 이러한 융합보안에 대한 상이한 개념은 향후 융합보안의 연구 및 적용에 있어 혼란을 초래할 가능성이 있다. 본 논문의 목적은 혼용되고 있는 융합보안의 개념을 재정립하고, 두 가지 차원의 융합보안 적용 시 고려해야 할 접근방법을 제시하는 것이다.

A need assessment on the key tasks of convergence security specialists (융합보안전문가의 핵심과업 요구분석 - 방위산업체 보안전문가를 중심으로 -)

  • Woo, Kwang Jea;Song, Hae-Deok
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.87-98
    • /
    • 2016
  • As the informative society becomes intensified, the rise of the convergence security offers an alternative strategic correspondence to the technology leaks that are becoming more advanced, complex, and intelligent. In order to the convergence security to provide its efficacy, training convergence security specialists is essential. However, research on the subject has yet to be considered sufficient. Thus this research focuses on defense industry security specialists to define the duty and analze critical task as well as drawn and therefore the required academic level of the critical task was examined. These research work contributes to the competence development of convergence security specialists and further enhancement on convergence security training process of academic institutions and job training institutions.

Resaerch Trend and Cocentualization of Defense Industry Security From Convergence Security Perspective (융합보안 관점에서 방위산업보안 개념 정립과 연구동향 분석)

  • Woo, Kwang Jea
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.69-78
    • /
    • 2015
  • Methods that industrial spies use to smuggle core technology out are becoming more intelligent, technological, and complex, thus resulting in more serious damages. In particular, defense industries in which involve national core technology as well as institutions including labor force are industries that are in a greater need of the convergence security. Defense Industry develops, experiments, and produces defense security supplies for national security protection. Defense industry involves a number of security elements such as military secret, industrial secret, core technology labor force, defense industry supply, critical national facility, and information communication system. Defense industry security is a complex of military security and industrial security which is convergence security that integrates all security elements of defense industry. Therefore, defense industry security is a typical ideal model for convergence security. Research on defense industry security is relatively insufficient compared to research of security in other industrial fields. In order to prevent core technology of denfese industry from leaking and to protect technical professionals and institutions, research and action on defense industry security from convergence security perspective are therefore essential at this point of time.

융합보안 R&D 이슈 및 방향

  • Jung, Sou-Hwan
    • Review of KIISC
    • /
    • v.19 no.3
    • /
    • pp.11-13
    • /
    • 2009
  • 최근 IT기술이 각종 산업에 융합된 제품군에 다양한 보안 솔루션이 탑재되면서 융합보안 산업이 차세대 고부가가치 산업으로 부상하고 있다. 이종 산업간 융합은 사용자들에게 편리함을 제공해 주지만 이와 반대로 다양한 보안적인 이슈사항을 야기 시켰다. 따라서 본고에서는 현재 부상하고 있는 차세대 융합산업에 대한 동향을 몇 가지 사례를 중심으로 분석 하였고, 또한 해당하는 융합산업 분야에서 발생하는 보안 이슈와 요구되는 보안기술을 분석하였다.

A Study on the Enterprise security convergence strategy in the IoT(the Internet of Things) Era (IoT시대의 기업 융합보안 전략에 대한 연구)

  • Noh, Jong-ho;Lee, Jong-hyeong;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.33-39
    • /
    • 2017
  • In the age of full scale IoT, concept of "security convergence" has been popularized widely. However, it is not clear whether current "security convergence" concept reflects IoT characteristics and traits. In this thesis, a new concept, complementing "security convergence" concept researches up to date, has been suggested considering IoT characteristics. Required governance methodology and key technical factors are suggested for re-establishment of "security convergence" concept and for enterprise security strategy development.

A study on Improved Convergence Security Monitoring System model (융합보안관제시스템 개선에 관한 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.3-12
    • /
    • 2011
  • According to the NIS, damages due to leaking industrial technology are reaching tens of trillion won. The type of damages are classified according to insider leaks, joint research, and hacking, illegal technology leaks and collaborated camouflaged. But 80% of them turned out to be an insider leak about connecting with physical security. The convergence of IT and non IT is accelerating, and the boundaries between all area are crumbling. Information Security Industry has grown continuously focusing Private Information Security which is gradually expanding to Knowledge Information Security Industry, but Information Security Industry hereafter is concentrated with convergence of IT Security Technology and product, convergence of IT Security and Physical Security, and IT convergence Industry Security. In this paper, for preventing company information leaks, logical security and physical security both of them are managed at the same level. In particular, using convergence of physical security systems (access control systems, video security systems, and others) and IT integrated security control system, convergence security monitoring model is proposed that is the prevention of external attacks and insider leaks, blocked and how to maximize the synergy effect of the analysis.

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF

Service-oriented protocol security framework in ICT converged industrial environment (ICT 융합 산업 환경에서 서비스 지향 프로토콜 보안 프레임워크)

  • Lee, Seoung-Woo;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.15-22
    • /
    • 2017
  • This paper analyzes vulnerability of each service protocol used in ICT convergence industry, smart factory, smart grid, smart home, smart traffic, smart health care, and suggests technologies that can overcome security vulnerabilities. In addition, we design a service-oriented protocol security framework that allows us to quickly and easily develop security functions in an open environment by defining a security element common to protocols and designing a security module for each protocol layer including the corresponding elements. Service protocol independent security module and specialized security module, it will be possible to develop flexible and fast security system in ICT convergence industry where various protocols are used. The overall security level of the ICT service network can be improved by installing the necessary security modules in the operating system, and the productivity can be improved in the industrial security field by reusing each security module.

Development of Measures of Information Security Policy Effectiveness To Maximize the Convergence Security (융합보안 강화를 위한 정보보안 정책 효과성 측정도구 개발)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2014
  • The information security policy is one of the most important tools for organization to manage the implementation and ensure the organizational security. However, we do not have metrics for measuring its effectiveness. The ultimate purpose of this study is to develop the measures of information security policy effectiveness. To do this, this study review data quality and information quality literatures and investigate appropriate subfactors for information security policy. Rooted in these concepts, we suggest accuracy, completeness, interpretability, and relevance from content aspect and understandability, concise representation, and amount from form aspect as factors for information security policy effectiveness.

A Design on Security Governance Framework for Industry Convergence Environment (산업융합환경을 위한 보안 거버넌스 프레임워크 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.33-40
    • /
    • 2015
  • According to arriving convergence environment which can create new value-added converged between industry and ICT technology, It has made economic growth and improve the quality of life. However this convergence environment provide not only advantage but also various security problems resulting from generating converged security threats. For resolving this security problem, we need to approach to security problem in the integrated view not the fragmentary view which cover only technical approach. So This study developed security governance framework which can manage trustful security governance in multidimensional view which cover strategy, managerial/operational and technical view. Therefore this framework can construct trustful security management system which can help top management team to engage in security management directly and organizational member to perform security activities and have responsibility for themselves as suggesting single standard for security management.