• Title/Summary/Keyword: 정보보안관리체계

Search Result 516, Processing Time 0.024 seconds

Case Study: Web Integration Strategy and System of Public Institutions (공공기관의 웹 통합 관리 전략 및 시스템 사례 분석)

  • Hwang, In-Ah
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.35-44
    • /
    • 2005
  • It is essential for any public institution to establish a systematical scheme and a management system to maintain the contents and securities of its ever-expanding web-site with efficiency. The general users want a reliable system and a simple and stress-free web environment and expect the public institutions to maintain the accuracy and conformity of information they provide to the public. In this study, I examined a web-site owned by a certain governmental research institute for the current maintenance status and problems to seek an effective and easy-to-use scheme for both users and web managers. Based on what I learned from my study, I moved on to design a web integration system and tested it on the above mentioned web-site for analysis.

  • PDF

Development of an USN Based Integrated Open Server System for Disaster Prevention Management (USN 기반 개방형 방재관리 통합시스템 개발)

  • Lee, Jeong-Kyoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.929-932
    • /
    • 2007
  • The integrated prevention of disaster management system is collected prevention of disaster data from prevention of disaster relation other systems and smart sensor in USN. This system manages fire fighting facility effectively. The relation equipment which is used in existing and network using "Open Protocols" about under using the support system which is integrated effectively as the destroyer. It connects CCTV, the sensitivity environmental sensor, automatic fire detection equipment and security equipment and air flow equipment system using Internet. The System Server was collected monitoring data at the each equipment and processing by operational scenario. It will verified the effectiveness of operational scenario and integrated prevention of disaster management system

  • PDF

SaaS-based construction process transfer and Safety Management System (SaaS기반의 건설공정전송 및 안전관리 시스템)

  • Kim, Eui-ryong;Jung, Soo-Sung;Kim, Young-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.735-737
    • /
    • 2015
  • In this paper, SaaS (Software as a Service) based transport and construction process safety management systems by utilizing the construction work process management and safety management and schedule, and results for various types of construction process, achieved through high-speed wireless Internet access by applying to ensure a systematic means for safety and can quickly and accurately manage all made within the process control system. The operator should be indicated by using a smart phone to work as a supervisor report the current status and results of the operation. Also be reported to the supervisor immediately in an emergency situation and there is no vibration occurs over a period of time the smartphone is to check the danger to the operator. If the commissioner is directed to specific business processes that establish and verify the results obtained and the result is satisfied by presenting the part down the measures insufficient command of the field workers risk situations. In the case of software (server) to store all the data relating to the operation member in charge of management and security.

  • PDF

Study on the Association between Personal Information Protection Legislation and Information Security Product (개인정보보호 관련 법령의 내용과 보안제품 분포간의 연관성 분석)

  • Kim, Min-Jeong;Lee, Jung Won;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1549-1560
    • /
    • 2015
  • For the past few years, personal information breach incidents, great and small, occurred constantly. Accordingly, the Personal Information Protection related Ordinances are enacted and amended persistently, and the information security products also keep advancing and developing in the same way. There are the certification systems such as Common Criteria Evaluation and Validation(CC) and Korea Cryptographic Module Validation Program(KCMVP) for the information security products. These are also strictly carried out. This paper analyzes and categorizes the 5 Personal Information Protection related Ordinances in the aspects of technical protection measures by using key words. Here are the 5 related ordinances; 'the Personal Information Protection Act', 'the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc', 'the Act on the Protection, Use, Etc, of Location Information', 'the Use and Protection of Credit Information Act', and 'the Electronic Financial Transactions Act.' Moreover, this study analyzes the association between the technical protection measures in the 5 relevant laws and the information security products that are obtaining the CC Evaluation & Validation(CC) and the products that are now produced at KISIA's member companies.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System (AI 사이버보안 체계를 위한 블록체인 기반의 Data-Preserving AI 학습환경 모델)

  • Kim, Inkyung;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.12
    • /
    • pp.125-134
    • /
    • 2019
  • As the limitations of the passive recognition domain, which is not guaranteed transparency of the operation process, AI technology has a vulnerability that depends on the data. Human error is inherent because raw data for artificial intelligence learning must be processed and inspected manually to secure data quality for the advancement of AI learning. In this study, we examine the necessity of learning data management before machine learning by analyzing inaccurate cases of AI learning data and cyber security attack method through the approach from cyber security perspective. In order to verify the learning data integrity, this paper presents the direction of data-preserving artificial intelligence system, a blockchain-based learning data environment model. The proposed method is expected to prevent the threats such as cyber attack and data corruption in providing and using data in the open network for data processing and raw data collection.

National Institution's Information Security Management on the Smart phone use environment (스마트폰 이용 환경에서 국가기관 정보보호 관리방안)

  • Kim, Ji-Sook;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.83-96
    • /
    • 2010
  • The rapid spread of smart phone in recent years changes not only personal life but also work environment of organizations. Moreover, smart phone provoke service combination between industries and transit the digital paradigm in our society because of the character that anyone can develop or use the application of smart phone. Under these circumstances, the government hastens the construction of mobile-government in order to improve national services and communication with people. However, since security threats on smart phone become more critical recently, we should hurry the counter measures against mobile threats or we will face obstacles to the activation of mobile-government. On this article, we suggest the methods of information security and the Mobile-government Information Security Management System(M-ISMS) on the smart phone use environment for building up the secure and convenient mobile system in the national institution.

Obesity management Protocol based physical activity promotion system(PAPS) for obese children (학생건강체력평가제(PAPS)를 기반으로 한 비만아동관리 프로토콜)

  • Kang, Sunyoung
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.47-52
    • /
    • 2015
  • The aim of this study is to suggest the effective protocol to manage the obese children using the data based on PAPS(Physical Activity Promotion System). In the school, there are a lot of efforts for the management of increasing obese children through the data obtained from PAPS which is conducted annually includes the assessment of obesity. But the follow-up of obese children was not effective due to the workload of teachers and the lack of available manpower. For more active and systematic management, the combination of a smart device transfer in the existing ways for facilitating access to the information is more effective. The information of obese children such as fitness, health, and obesity automatically will be sent in web-PAPS, And when personalized exercise prescription, proper nutrition education for obesity are shared with their parent, it will be more effective in weight management.

An implementation of stable transmission and security management system of massive acoustic data in unsecurity and low speed network area (비보호 저속망 환경에서의 고용량 음향데이터의 안정적 전송 및 관리 시스템 구현)

  • Sun, Doo-Young;Kim, Yong-Deak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.164-167
    • /
    • 2009
  • The amount of acoustic data gathered from the acoustic data gathering system is increased dramatically as the acoustic data gathering system become various and highly effective. It is needed to transmit this acoustic data to analysis environment for precise analysis. In this gathering/analysis system, it is also needed the stable transmitting as well as highly perfect security. In this paper, I would like to propose a transmitting and management system sending a massive gathering acoustic data in the unsecurity and low speed networking environment. The implemented system is to transmit the acoustic data safely in low speed networking environment and secure the acoustic data from various threats.

  • PDF

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.