• Title/Summary/Keyword: 정보자산보호

Search Result 260, Processing Time 0.029 seconds

DIT (Digital Investment Trust) Agent Based on ECSSL (Elliptic Curve SSL) (ECSSL(Elliptic Curve SSL) 기반 DIT(Digital Investment Trust) 에이전트)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.599-608
    • /
    • 2002
  • This paper proposes DIT (Digital Investment Trust) agent based on ECSSL (Elliptic Curve SSL). This DIT agent is a banking project using IT (Investment Trust) conception based on EC (Electronic Commerce) and can manage micro payment, account opening and account transferring. In addition, ECSSL (Elliptic Curve SSL) protocol is implemented which consists of much better encryption functions than existing SSL (Secure Socket Layer) Protocol. Therefore, This DIT agent based on ECSSL protocol protects a customer's information and asset from third party.

Security threats and Review for FinTech (핀테크 보안 위협 및 고찰)

  • Joo, Jae Woong;Wu, DaMing;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.412-414
    • /
    • 2015
  • 최근 금융과 IT가 결합한 핀테크 산업이 빠르게 성장하고 있다. 전통적 금융 서비스에서 벗어나 소비자 접근성이 높은 인터넷, 모바일 기반 디바이스의 장점을 활용하여 송금, 결제, 자산관리 등 다양한 분야의 금융서비스를 제공한다. 하지만 핀테크 기술 발전으로 네트워크, 클라이언트, 시스템 등 각각의 부문에서 새로운 보안 위협 요소가 증가 할 것이다. 본 논문에서는 핀테크 보안의 고려사항과 연구동향에 대해 살펴보고 현재 핀테크 분야에서 보안이 적용된 시스템에 대해 분석하고 취급되는 정보보호의 중요성에 대해 고찰한다.

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.

Personal Information Protection Using Digital Twins in the Fourth Industrial Revolution (4차 산업혁명 시대의 디지털트윈을 활용한 개인정보보호)

  • Kim, Yong-Hun
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.279-285
    • /
    • 2020
  • In the era of the Fourth Industrial Revolution, there are many sensors around. People and things are connected to these sensors to the internet. Numerous connected sensors produce the latest data in seconds, and these data are stacked with big data of unimaginable size. Because personal information can be contained in any place of data produced, device and system protection are needed. Digital twins are virtual models that accurately reflect the status information of physical assets and systems that utilize them. The characteristic of digital twin is that digital twin itself has temporal and structural identity enough to represent the object of reality. In the virtual environment the reproduced reality, it continuously simulates and it virtuals of the point of time or the future, the replica can be created. Therefore, this study cited factors threatening personal information in the era of the Fourth Industrial Revolution. And proposed using digital twin technology that can simulate in real-time to overcome the risk of personal information hacking.

An Empirical Study on Expectation Factors and Certification Intention of ISMS (ISMS 인증 기대 요인 및 인증 의도에 관한 연구)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.375-381
    • /
    • 2015
  • In the past few years, data leakage of information assets has become prominent issue. According to the NIS in South Korea, they found 375 cases of data leakage from 2003 to 2013, especially 49 of cases have been uncovered in 2013 alone. These criminals are increasing as time passes. Thus, it constitutes a reason for establishment, operation and certification of ISMS, even for private enterprises. The purpose of this study is to examine the factors influencing the certification intention of ISMS using EFA (Exploratory Factor Analysis) and regression analysis. We identified expectation factors for certification of ISMS from 13 elements using EFA (Strengthening practical ability & economic effect factor and Improvement of security level & handling incident factor). Next, we examined that the certification intention of ISMS using regression analysis. As a result of regression analysis, Strengthening practical ability & economic effect factor is not significant for the certification intention of ISMS (p<.05). Also, Improvement of security level & handling incident factor have a significant and positive effect on the certification intention of ISMS (p<.05).

An Empirical Study on the Obstacle Factors of ISMS Certification Using Exploratory Factor Analysis (탐색적 요인 분석을 이용한 기업의 ISMS 인증 시 장애요인에 관한 연구)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.951-959
    • /
    • 2014
  • In the past few years, data leakage of information assets has become a prominent issue. According to the National Intelligence Service in South Korea, they found 375 cases of data leakage from 2003 to 2013, especially 49 of cases have been uncovered in 2013 alone. These criminals are increasing as time passes. Thus, it constitutes a reason for establishment and operation of ISMS (Information Security Management System) even for private enterprises. But to be ISMS certified, there are many exposed or unexposed barriers, moreover, sufficient amount of studies has not been conducted on the barriers of ISMS Certification. In this study, we analyse empirically through exploratory factor analysis (EFA) to find the obstacle factors of ISMS Certification. The result shows that there are six obstacle factors in ISMS Certification; Auditing difficulty and period, Consulting firm related, Certification precedence case and consulting qualification, Internal factor, CA reliability and auditing cost, Certification benefit.

Measuring method of personal information leaking risk factor to prevent leak of personal information in SNS (SNS에서 개인정보유출방지를 위한 개인정보 유출위험도 측정 방법)

  • Cheon, Myung-Ho;Choi, Jong-Seok;Shin, Yong-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1199-1206
    • /
    • 2013
  • SNS is relationship based service and its users are increasing rapidly because it can be used in variety forms as penetration rate of Smartphone increased. Accordingly personal information can be exposed easily and spread rapidly in SNS so self-control on information management, right to control open and distribution of own personal information is necessary. This research suggest way of measuring personal information leaking risk factor through personal information leaking possible territory's, based on property value and relationship of personal information in SNS, personal information exposure frequency and access rate. Suggested method expects to used in strengthening self-control on information management right by arousing attention of personal information exposure to SNS users.

Development of Workshop Sensing SMS Systems (작업장 감지 SMS 시스템의 개발)

  • Kim Taek-Soo;Yoo Young-Dae;Sim Jung-Sub;Jo Myoung-Jin;Bae Jae-Hak J.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.601-604
    • /
    • 2006
  • 본 논문에서는 기업에서 관리되고 있는 설비 및 자산을 여러 가지 요인의 재난 위험으로부터 보호하는 것을 목적으로 하여 작업장 감지 시스템 WMS(Workshop Monitoring System)를 개발하였다. 이 시스템은 세 부분으로 구성된다. (1) 작업장 환경 자료를 수집하기 위한 센서 (2) 센서 데이타를 기록하고 SMS 메시지를 발생시키는 Status Logging Server (3) SMS Gateway 등으로 구성된다. 이러한 WMS는 각종 재해 발생시에 치명적인 손실을 초래 할 수 있는 시설들에 대해 즉각적인 조치를 위한 통보 시스템으로 활용할 수 있을 것이다.

  • PDF

The need for the development of conversion program of distribution facilities on the New Distribution Information System to GRS80 Datum (NDIS 배전설비 세계측지계 전환 프로그램 개발의 필요성)

  • Park, Young-Sung;Yi, Sue-Muk;Lee, Suk-Beom
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.402-403
    • /
    • 2008
  • 한전의 신배전정보시스템(NDIS)은 지리정보시스템(GIS)을 활용하여 전국에 시설되어 있는 방대한 배전설비를 데이터베이스로 구축한 후 배전계획, 배전설계, 공사관리, 준공정산, 자산취득, 유지보수 등 배전분야 전반의 업무를 수행하고 고객정보시스템과 연계하여 영업업무를 지원하는 시스템으로 저압공급방안검토, 고압계통분석, 보호협조검토, Simulation 등 배전분야에서 필요한 다양한 기술지원 기능과 경제적인 투자계획, 효율적인 유지보수 등을 위한 배전통계 및 자원정보 등 장기적 관점의 경영정보 인프라를 구축하여 배전설계에서 준공까지 업무흐름 표준화, 업무처리 절차, 방법 등을 시스템에서 자동 지원토록하여 반복적인 배전정보 관리업무의 정확도 향상을 목적으로 만들어진 시스템이다. 신배전 정보시스템의 배전설비는 모두 위치값을 가지고 있는데 지중배전설비는 위치에 대한 측량 및 탐사를 시행하여 신배전정보시스템에 DB입력하여 사용하고 있으며 이 입력 좌표체계는 한정된 일부지역에서만 사용할 수 있는 동경측지계를 사용하고 있다. 2010년 부터는 이동 경측지계를 전 세계적으로 GPS측량값을 그대로 적용할 수 있는 세계 측지계로 사용토록 측량법에 명시되어 있어 신배전정보시스템의 배전설비를 전환 프로그램을 개발하여 전환하고자 한다.

  • PDF

A Study for Enterprise Type Realtime Information Security Management System (기업의 상시 보안관리 체계 연구)

  • Noh, Shi-Yeong;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.617-636
    • /
    • 2017
  • Many businesses have adopted the standard security management structure such as ISO27001 and K-ISMS for strengthening business's security management structure to protect their core information assets and have acquired partial output from such effort. However, many risk factors such as recent advances in Information Technology and evolution of intrusion methods have increased exponentially requiring the businesses to response even more quickly with better accuracy. For such purpose, a study of 'Real Time Security Management Structure for Business' based on security management process optimization, defining a set of security index for managing core security area and calculation of risk indices for precognition of intrusion risk area has been made. Also, a survey on opinions of an expert panel has been conducted. The effectiveness of studied structure was analyzed using AHP method as well. Using this study, security personnels of a company can improve efficiency of the preemptive responsive and quicker measure from the current security management structure.