• Title/Summary/Keyword: 전자정부 보안

Search Result 141, Processing Time 0.029 seconds

미국 전자정부 정보보안 법제 동향

  • 김대호;오일석
    • Review of KIISC
    • /
    • v.13 no.3
    • /
    • pp.15-22
    • /
    • 2003
  • 미국은 전자정부 구현을 위하여 각종 법규를 제정하였고 이를 통합하여 2002년에 전자정부법을 제정하였다. 그리고 동 법을 제정하면서 전자정부의 성공이 정보보안에 있다는 사실을 인식하고 전자정부법에 연방정보보안관리법을 삽입하여 통과시켰다. 이를 통하여 전자정부의 실현과 관련하여 연방 각 부처로 하여금 정보보안의 이행을 실질적으로 추진하고 보고하도록 하는 연방 정부의 체계적인 정보보안 정책을 확립하였다. 이러한 미국의 전자정부에 대한 정보보안 정책 확립은 우리나라 전자정부의 구현과 실행에 있어 체계적인 정보보안 정책 수립의 필요성과 중요성을 다시금 일깨우고 있다고 할 것이다.

A Study on Security of E-Government Service Based on Web Service (웹 서비스 기반의 전자정부 서비스 보안에 관한 연구)

  • Lee Eun-Seon;Yang Jin-Seok;Lim Jung-Muk;Moon Ki-Young;Lee Jae-Seung;Chung Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.347-360
    • /
    • 2005
  • E-Government service is national project that is necessary for international competitiveness, openness of government and effectiveness of governmental work process. E-Government security is very important because it treats data has relatively high sensitivity. But, until now, the development point of E-Government service has been limited to only it's contents and infrastructure based on web without consideration of E-Government security. Lately research for E-Government security has been studied by some advanced country of E-Government service, but it is insufficient. To construct E-Government security based on web Infra, first of all, analysis of web service security technology is needed to precede. And then research for appling the technology to E-Government service are required. We propose secure E-Government service scenario with web service security technology based on development stages of E-Government service. We also suggest overall view and secure scenario of E-Government service in Integrated Computing Environment.

전자정부 정보보호 대응체계 구축 방향에 관한 연구

  • 안문석;박성진;맹보학
    • Review of KIISC
    • /
    • v.13 no.3
    • /
    • pp.1-14
    • /
    • 2003
  • 본 논문에서는 성공적인 전자정부 구축에 필요한 정보보안 대응체계의 구축 방향을 제시하고자 한다. 이를 위해 현 전자정부 정보보안 대응체계의 현황과 문제점을 분석 한 후 효과적인 정보보안 대응체계 구축을 위한 정책대안을 제시하고자 한다. 즉, 전자정부 정보보안 대응체계의 기본방향을 제시하고, 이를 토대로 전자정부 정보보안 추진체계의 정비와 전자정부 정보보호 추진기반 구축이라는 두 차원에서 관리 및 제도적 정책대안을 제시하고자 한다.

Proposed that Application of the Security Algorithm for Implement Smart m-Gov (스마트 전자정부 구현을 위한 보안 알고리즘 응용 제안)

  • Rim, Kwang-Cheol;Choung, Young-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.11-17
    • /
    • 2014
  • As ICT Ecosystem does, electronic government changes in its form. Accordingly, in order to realize Smarter m-Gov, the governments need to vitalize m-Gov services and enact technology policy. Therefor, this manuscript suggests possible model of m-Gov realization and security algorithm as a technology policy which applies quantum cryptography system to server security for the construction of secured m-Gov's infrastructure. What the manuscript suggests seeks administrative ideas of Smarter m-Gov's services which contain security, stability, and economic feasibility for the benefits of nation and enterprises.

Study on Security Measures of e-Gov with Dynamic ICT Ecosystem (동적인 ICT 생태계에 따른 전자정부 보안대책 연구)

  • Choung, Young-Chul;Bae, Yong-Guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1249-1254
    • /
    • 2014
  • As ICT ecosystem changes, security-related threat on individuals and corporations has increased. With the recent sophistication of hacking strategy, hacking serves commerce and its scale becomes larger than ever. Accordingly, the analysis on cyber intrusion is required. As a number one electronic government around the world, the government's role for security solution for realization of safe electronic government. This manuscript analyzes cyber intrusion cases, speculates the government's measures and suggests political recommendation for the current phenomena.

A Study on the 4th Industrial Revolution and E-Government Security Strategy -In Terms of the Cyber Security Technology of Intelligent Government- (제4차 산업혁명과 전자정부 보안연구 -지능형 정부의 빅데이터 사이버보안기술 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.369-376
    • /
    • 2019
  • This paper studies desirable form of future e-government in terms of intelligent government research in response to new intelligent cyber security services in the fourth industrial revolution. Also, the strategic planning of the future e-government has been contemplated in terms of the centralization and intellectualization which are significant characteristics of the fourth industrial revolution. The new system construction which is applied with security analysis technology using big data through advanced relationship analysis is suggested in the paper. The establishment of the system, such as SIEM(Security Information & Event Management), which anticipatively detects security threat by using log information through big data analysis is suggested in the paper. Once the suggested system is materialized, it will be possible to expand big data object, allow centralization in terms of e-government security in the fourth industrial revolution, boost data process, speed and follow-up response, which allows the system to function anticipatively.

The Security Considerations for Implementation of Secure and Reliable e-Government (안전하고 신뢰성있는 전자정부 구축을 위한 보안요구사항)

  • 김명은;오승희;정연서;서동일
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.77-83
    • /
    • 2004
  • According as information society has been raised, many countries of the world have taken a lot of interests in e-government implementation. The several guidance countries already have offered people various administrative service and popular enmity service in the Internet conveniently People can use e-government service more conveniently by the Internet, but important personal information or state secret can be leaked in the Internet. Because of these security vulnerabilities, a lot of countries are constructing security infrastructure that can protect personal information. In this paper, we examine e-government construction trends of the several guidance countries, and propose security considerations to provide safe and reliable e-government service.

  • PDF

The Effects of Perception of user on the Intention to use to e-Government (전자정부에 대한 사용자의 지각된 연식이 사용의도에 미치는 영향)

  • Lee, Hong-Jae;Park, Sung-Jong;Han, Kyung-Il
    • Journal of Digital Convergence
    • /
    • v.8 no.3
    • /
    • pp.49-62
    • /
    • 2010
  • The purpose of this study is to confirm how perception of user to e-government have an effect on the intention to use. Field research method using questionnaires was employed to investigate the effects between the variables. Findings of the study can be summarized as follows. Perceived information security and usefulness have a positive effect on trust to e-government. And perceived risk have a negative effect on trust. And only perceived usefulness have a positive effect on the intention to use significantly.

  • PDF

mNPKI for Mobile Government in Developing Countries (개발도상국의 모바일 정부를 위한 mNPKI)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.161-171
    • /
    • 2019
  • Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.

The Security Requirement for Implementation of Secure and Reliable e-Government (안전하고 신뢰성있는 전자정부 구축을 위한 보안 요구사항)

  • 김명은;오승희;정연서;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.243-249
    • /
    • 2004
  • According as information society has been raised, many countries of the world have taken a lot of interests in e-government implementation. The several guidance countries already have offered people various administrative service and popular enmity service in the Internet conveniently, People can use e-government service more conveniently by the Internet, but important personal information or state secret can be leaked in the Internet. Because of these security vulnerabilities, a lot of countries are constructing security infrastructure that can protect personal information. In this paper, we examine e-government construction trends of the several guidance countries, and propose security considerations to provide safe and reliable e-government service.

  • PDF