• Title/Summary/Keyword: 통합보안관리

Search Result 547, Processing Time 0.043 seconds

Evaluation Items of ESM S/W by Case Analysis (사례분석을 통한 ESM S/W의 평가항목)

  • Kang, Deuk-Soo;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.84-94
    • /
    • 2010
  • ESM can do and wishes to investigate ESM software field base technology and investigate ESM software technology, market, standard and evaluation certification trend and develop evaluation model of ESM software that it becomes foundation to protect ESM software effectively that develop quality evaluation model of ESM software in this research by integration security administration system that gather fire wall, IDS, VPN etc. various kind of security solution by one. That is, because reflecting requirement of ESM software, develop evaluation module and proposed evaluation example along with method of exam.

Design and Implementation of Enterprise Information Security Portal(EISP) System for Financial Companies (금융회사를 위한 기업 정보보호 포털(EISP) 시스템의 설계 및 구현)

  • Kim, Do-Hyeong
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.101-106
    • /
    • 2021
  • To protect financial information, financial companies establish strategies and plans for information security, operate information security management systems, establish and operate information security systems, check vulnerabilities, and secure information. This paper aims to present an information security portal system for financial companies that can gain visibility into various information security activities being undertaken by financial companies and can be integrated and managed. The information security portal system systemizes the activities of the information security department, providing an integrated environment for information security activities to participate from CEOs to executives and employees, not just from the information security department. Through this, it can also be used as information security governance that can be used by top executives to reflect information security in corporate management.

Design and Implementation of Web-based Hierarchical Network Management System using SSL (SSL을 이용한 웹기반 계층적 네트워크 관리 시스템의 설계 및 구현)

  • 황일선;이명선;유기성;김종근;조강홍;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.1-15
    • /
    • 2002
  • Network management system exchanges information between management servers to manage other network as well as local network for MSP(Management Service Provider) business. Because communication line that is used here is communication line that several users use, other user can steal a important information that are passed through communication line. For these information include important information of administrator or equipments, These information should be protected. Usually it is use much SSL to security of communication and it wish to protect information using SSL in communication between management servers' or communication between server and client at network management system to use much SSL for security of communication.

  • PDF

The Design of SDN Quarantined Network (SDN을 이용한 사이버 검역 시스템 설계)

  • Kim, Nam-Uk;Jung, Jun-Kwon;Song, Youngbae;Kim, Hyoungshick;Chung, Tai-Myoiung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.559-560
    • /
    • 2014
  • 기존 보안 기술들은 기관 내부 망을 이루는 각각의 영역에 대해 이미 알려진 공격에 대한 방어에서는 강점을 가진다. 하지만 공격자가 다양한 제로데이 공격 기술과 사회공학적 기법을 적절히 활용하여 공격할 경우, 기존 기술만 이용하여 이를 방어하기는 매우 어려운 실정이다. 더 이상 개별적인 방어 방식으로는 고도화된 공격을 막을 수 없게 되었다. 이에 통합 관제에 적합한 솔루션이 등장하고 있지만, 현재는 단지 각 솔루션에 대한 통합 관리 기능에 국한되어 있을 뿐이다. 이에 본 논문에서는 체계적이고 통합적으로 기관 내부망을 청정하게 유지할 수 있는 새로운 형식의 보안 시스템을 제안하였다.

Context-Aware Single Sign-On and Access Control System in Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 상황인식 기반 통합 인증 및 접근제어 시스템)

  • Lee, HyunDong;Jung, YoungMin;Chung, MokDong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1126-1129
    • /
    • 2010
  • 클라우드 컴퓨팅 서비스 환경에서 인증 및 접근 제어와 같은 여러 보안 이슈가 발생하고 있다. 특히, 클라우드 컴퓨팅 환경에서 다양한 자원에 접속을 할 경우, 통합적으로 관리 및 제어가 가능한 인증 및 접근제어 모델이 필요하다. 이를 해결하기 위해서, 본 논문에서는 상황인식 기반의 통합 인증(SSO) 및 접근제어 모델을 제안하고, 이를 설계 및 구현함으로써, 클라우드 컴퓨팅 환경에서 유연하고, 편리한 보안 시스템을 검증하고자 한다.

A Study on the Authentication Model using Integrated Management Center (통합관리센터를 이용한 인증 모델에 관한 연구)

  • Jin, Kwang-Youn;Choi, Shin-Hyeong;Seo, Jang-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.576-583
    • /
    • 2010
  • U-City includes various information devices and network techniques, which connect among several information devices. Integrated Management Center, which is the core element of u-City, is designed to manage all services of u-City and carry out the control function for a city. Accordingly, u-City needs the methods of user authentication and security, so these methods must be implemented to integrated management center. This paper is devoted to describe some conventional authentication techniques, and authentication methods and procedures that may be available to u-City network context. Proposed u-City integrated authentication model assigns IP to only right user after authenticating information terminals and users in u-City and authorizes users according to the policy, so this model plays an important role for the security of integrated management center.

Unification of the Korean Peninsula and Military Integration Focusing on the Military Tasks (한반도 통일과 군사통합 (군사적 과제를 중심으로))

  • Han, Kwan Soo
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.125-134
    • /
    • 2015
  • This study aims to investigate what to be prepared and implemented for the military integration when South and North Korea are making progress toward unification. Although we can not exactly predict when the unification will be completed at this time, preparations for the military integration should be ready ahead of time. Since the failure of the military integration can threat the unification, elaborated and practical solutions are required. Therefore, the study tries to answer the following questions : 1) What types of the military integration are desirable and what are the prerequisites for the unification of Korean Peninsular? ; 2) What potential military tasks could be caused by military integration? ; 3) What are the core and major tasks among them and how could they be solved in practical aspects?

Minimization of Security Policies in Database Security System applying Role-Based Access Control (역할기반 접근 제어를 적용한 데이터베이스 보안 시스템에서의 보안 정책 최소화)

  • Jung Min-A;Lee Kwang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1364-1370
    • /
    • 2005
  • There are many security models for database systems using policy-based access control. RBAC (Role-based Access Control) is used for complementing MAC (Mandatory Access Control) and DAC (Discretionary Access Control) and is for performing flexibly security policies meet applied environment. We implemented the database security system that applies DAC, MAC, and RBAC to meet security requirements of users. However, security policies are constructed redundantly whenever security policies are needed to each user in this system. Even though the proposed security system can flexibly control more complicated 'read' access to various data sizes for individual users, it is obvious that there is a possibility that a new policy can be a duplication of existing policies. In this paper, we introduce the problem of policy duplication and propose the policy management module. With this proposed module, constructed policies are checked for duplication and deleted or merged with existing policies.

A Study on E-trade Securities and Strategic Solutions (전자무역보안과 전략적 대응방안에 대한 소고)

  • Jung, Jo-Nam;Lee, Chun-Su;Kang, Jang-Mook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.577-584
    • /
    • 2004
  • Recently many company has been cracked by crackers information security and everyday new computer virus come out. so e-trade partners should prevent the disasters. A few studies researched e-trade securities broadly but the new trend in information security division especially focused on electronic payment, EDI, Transportation, Contracts, Insurances and that of subjects have been researched through interdisciplinary evolution. Our research e-trade security on three part, First system attack, second is data attack and third is business attack. the attacks have theirs own solution, so e-trade company use this solution timely and powerfully. It is the most important thing to prepare the cracking with securities system. also manager should catch recent hacking technologies. The research results propose that e-trade firms should use information security policies and securities systems that including H/W and S/W. therefore manager's security mind is very important and also using electronic commerce securities device and should be considered exploiting solutions by each special usage according to e-trade company' environments.

개별인증 출입보안시스템 구현 - RFID.지문인식.무게정보 이용 -

  • Lee, Dong-Man;Kim, Sang-Sik;Lee, Jae-Hong
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2009.05a
    • /
    • pp.20-26
    • /
    • 2009
  • 본 연구는 건물 내부에서 외부로 외부에서 내부로 출입하는 출입자를 정확히 파악하기 위하여 보안이 강화된 개별인증 출입보안시스템을 구축하는데 있다. 시스템 구현을 위해서 RFID 기술, 지문인식 기술을 적용한 통합인증단말기와 무게를 측정하는 전자저울을 활용 하였다. 개별 인증이 가능한 출입 인증 보안시스템을 구현한 결과를 요약하면, 첫째, 내부에서 외부로 나오는 경우와 외부에서 내부로 들어가는 경우를 분리한 이중 출입방식으로 외부인이 내부에서 나오는 사람의 인증만으로 쉽게 건물 안으로 진입하는 보안상의 문제점을 해결 하였다. 둘째, 건물 내부 물품을 외부로 유출할 시 무게 차이 때문에 출입문이 차단되어 관리자의 허락 없이는 물품을 밖으로 유출할 수 없게 되어 도난을 방지문제를 해결 하였다. 셋째, 몸무게 정보를 이용하여 출입자들이 동시에 출입문을 통과하지 못하도록 제한하여 모든 출입자의 로그정보를 정확하게 저장할 수 있도록 하였다. 넷째, 데이터베이스에 저장된 출입로그 데이터를 출퇴근 관리프로그램에 지원하여 급여 계산 및 인사 업무에 활용할 수 있도록 하였다. 다섯째, 건물에 화재가 나거나 폭탄 테러와 같은 위험 발생 시 출입자를 정확하게 파악할 수 있게 되어 용의자 파악이 용이하도록 하였다.

  • PDF