• Title/Summary/Keyword: 정보보호 컨설팅

Search Result 40, Processing Time 0.028 seconds

정보보호 컨설팅 방법론과 적용

  • 안혜연
    • Review of KIISC
    • /
    • v.11 no.3
    • /
    • pp.49-56
    • /
    • 2001
  • 정보보호 컨설팅 영역은 최근 정보시스템 분야에서 맡은 관심을 끌고 있는 일중에 하나로 모든 영역에서의 정보시스템에 대한 의존도가 높아질수록 더욱 중요도를 더하게 될 것이다. 이 글에서는 먼저 1장에서 이러한 정보보호 컨설팅에 대한 필요성 및 개념에 대해서 간단히 설명하고 2장에서는 정보보호 컨설팅의 수행 내용에 대한 조금 더 구체적 인 정리를 해보았다. 3장에서는 이러한 수행 내용이 효과적으로 진행되기 위해서 필요한 방법론에 대해서 설명하였다. 또한 4장에서는 정보보호 컨설팅이 실제적으로 어떤 형태로 일어나는지에 대한 서비스별 소개를 하고 있다. 이러한 서비스 모델은 단지 예제일 뿐 모든 고객의 상황과 요구가 다양하므로 훨씬 많은 다양한 서비스 모델이 있을 것으로 생각된다.

  • PDF

Comparative Analysis of Methodology for Improving Information Security Consulting for SMEs in Korea (중소기업 정보보호 컨설팅 개선을 위한 방법론 비교 분석)

  • Jang, Sang-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.1-6
    • /
    • 2020
  • The government is carrying out information security consulting support projects to solve the difficulties of SME information protection activities. Since the information security consulting methodology applied to SMEs does not apply the proven methodology such as the critical information and communication infrastructure(CIIP), ISMS, ISO27001, etc. It applies various methods for each consulting provider. It is difficult to respond appropriately depending on the organizational situation such as the type and size of SMEs. In order to improve such problems of SME information security consulting and to improve more effective, effective and standard methodology, the information security consulting methodology applied in the current system was compared and analyzed. Through the improvement plan for SME information security consulting method suggested in this study, it is possible to provide information security consulting suitable for all enterprises regardless of SME size or business type.

심층탐구 / 정보보호컨설팅 올해 시장규모 200억원 형성 가능할까?

  • Korea Database Promotion Center
    • Digital Contents
    • /
    • no.6 s.97
    • /
    • pp.56-63
    • /
    • 2001
  • 올해 정보보호컨설팅 시장이 전년 대비 100% 증가한 200억원에 이를 것으로 업계 관계자들이 전망하고 있다. 그러나 이에 못지 않게 전년 수준을 벗어나지 못할 것이라는 비관적인 견해도 적지 않다. 중요한 것은 국내 정보보호 컨설팅 업체가 자생 능력을 지고 생존할 수 있는 환경을 만들어야 한다는 것이 가장 중요할 것이다.

  • PDF

Study of Problem Based Learning for Information Security Consultant and its Analysis (정보보호 컨설턴트 양성을 위한 PBL 교육방안 적용 및 효과성 분석)

  • Oh, Changhyun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2325-2332
    • /
    • 2017
  • Consulting projects such as diagnosis of vulnerabilities of major information and telecommunication infrastructure are increasing, mandatory public information infrastructure assessment (PIA) for public institutions and ISMS (Information Security Management System) The demand for information protection consulting is continuously increasing as the field obeys the law, but the lack of information security consultant is not improving. One reason is that information security consultants are not being developed to meet the increasing demand for information protection consulting. In this paper, we present the case of information protection consulting as a scenario for studying and educating the duty of information security consultant by studying overseas case and domestic case based on standardization and standardization. We propose a problem-based learning (PBL) training method. In addition, we analyze the effectiveness of the PBL - based learning method.

보안팀 탐방-인피언컨설팅 인프라팀

  • Korea Information Security Agency
    • 정보보호뉴스
    • /
    • s.127
    • /
    • pp.17-19
    • /
    • 2008
  • 가끔 이론적으로 해박한 지식을 갖고 있는 정보보호 담당자의 입에서 어떻게 정보보호를 잘 할 수 있는지 질문이 나오는 아이러니한 상황이 발생할 때가 있다. 이론대로 했지만 그 해답을 쉽게 찾지 못하겠다는 것이다. 물론 그 해답은 어느 누구도 쉽게 찾을 수는 없다. 다만 해답으로 가는 정석은 분명히 있다. 그것은 정보보호 업무를 단순히 '이론'에 적용하는 것이 아니라, 시간을 두고 지속적으로 '보완' 해 나가야 한다는 것이다. 정보보호라는 것이 앞으로 발생할 미래의 일에 발빠르게 대응해야 하는 업무이기 때문이다. 그리고 그 정석을 오늘 소개할 인피언컨설팅 인프라팀이 제시해 줄 수도 있을 것 같다.

  • PDF

The Effectiveness of Information Protection and Improvement Plan Based on SMEs Consulting Case

  • Kim, Jae-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.201-208
    • /
    • 2019
  • In the phono-sapiens era of the intelligence information society, most business activities are increasingly dependent on networks and information systems. SMEs, which occupy the majority of Korean companies, are increasingly possessing the value and technology of their information assets, and their ability to protect core technologies that are the driving force of corporate growth will be the most important competitiveness of enterprises. Accordingly, the Ministry of Science and ICT and the Korea Internet & Security Agency(KISA) provides a foundation for minimizing the damage from cyber threats such as hacking and information leakage by evaluating the current information protection level of SMEs and enhancing information protection capability by supporting a high level of customized information protection consulting. In this study, we analyze the effectiveness of information protection based on the results of KISA SMEs consulting. In addition, by identifying problems and limitations derived from SMEs information protection consulting results, SMEs should propose measures to improve information security of SMEs that can manage information protection management system more efficiently and effectively.

A Study on Selection Factors of Consulting Company for the Certification of Information Security Management System (정보보호 관리체계(ISMS) 인증을 위한 컨설팅 업체 선정 요인에 관한 연구)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1309-1318
    • /
    • 2014
  • In the past few years, data leakage of information assets has become a prominent social issue. According to the National Industrial Security Center in South Korea, 71 percent who suffer from technology leakage are small and medium sized enterprises. Hence, establishment and operation of ISMS (Information Security Management System) for small and medium sized enterprises become an important issue. Since it is not easy to obtain ISMS certification for a small or medium sized enterprise by itself, consultation with an expert firm in information security is necessary before the security implementation. However, how to select a proper security consulting company for a small or medium sized firm has not been studied yet. In this study, we analyze empirically the selection factors of ISMS certification consulting company for a small or medium sized firm through exploratory factor analysis (EFA). Our study identified the following four important factors in selecting a security consulting company: expertise of the staffs and human resource management proficiency, market leading capability, competence to make progress during the consultation, and the performance and the size of the physical assets and human resources.

An empirical study on the performance factors of the BSC perspectives on government support regional innovation clusters in the management consulting (클러스터 혁신지역의 정부지원 경영컨설팅에 대한 BSC관점 성과요인 측면에서의 실증적 소고)

  • Park, Soon-mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1583-1593
    • /
    • 2015
  • This study applied the BSC performance consulting experience and diverse variable factors and whether there any differences in terms of satisfaction and the relationship between the support for the government consulting firm specializing in human resources by the resident of the innovation cluster area was investigated through empirical research. According to the study, a new high in recent local government support Consulting Consulting satisfaction by professionals residing in the area that applies to industrial clusters leads to practical consultancy, which was being evaluated as a significant boon to real performance of the company.

인터넷 보안과 보안 컨설팅

  • 안혜연
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.11-26
    • /
    • 2000
  • o 정보 보호란\ulcorner : 데이터 및 시스템을 고의적 혹은 실수에 의한 불법적인 공개(노출), 변조, 파괴 및 지체로부터의 보호. o 정보보호의 목표 - 비밀성 (Confidentiality)의 보장 - 무결성 (Integrity)의 보장 (중략)

  • PDF

Power of Venture-시큐어소프트

  • Korea Venture Business Association
    • Venture DIGEST
    • /
    • s.31
    • /
    • pp.4-5
    • /
    • 2003
  • 시큐어소프트는 1996년 설립된 종합정보보호 전문 업체다. 정보보호시스템의 개발과 공급, 컨설팅 분야를 아우르며 ‘수호신 앱솔루트 시리즈’등의 히트작을 연이어 내놓았다.

  • PDF