• 제목/요약/키워드: Comprehensive Security

검색결과 441건 처리시간 0.027초

국가 산업기술유출 대비 방안 연구 (A Study on Preparation Plan against National Industrial Technology Outflow)

  • 하옥현
    • 융합보안논문지
    • /
    • 제9권4호
    • /
    • pp.55-62
    • /
    • 2009
  • 산업보안은 보안의 영역별 요소(물리적 보안도구, IT보안 도구, 융합보안도구)를 활용하여 기업의 산업자산을 보호하는 관리활동들로서 Hardware적 요소(보안을 위한 도구)의 운용은 물론 이를 활용하기 위한 Software적 측면(정책 및 전략수립, 유지운영, 사후 대응조치 등)을 포괄하는 개념으로 이해할 수 있다. 본 논문에서는 산업보안에 대한 정의와 관련 개념, 우리나라의 산업보안 관련 기관들의 역할과 관련 법규, 관리체계 및 실태 등을 살펴보고, 이에 따른 문제점을 파악하여 개선방안을 제시하려 한다. 아울러 우리나라 기업들이 효과적인 산업보안활동을 통하여 국가경쟁력을 제고하고 21세기 산업보안 선진국으로 진입하기 위한 향후 정책방향과 시사점을 제안하고자 한다.

  • PDF

복합전력계통 신뢰도평가의 확률론적 안전도 도입 (The Implementation of Probabilistic Security Analysis in Composite Power System Reliability)

  • 차준민;권세혁;김형철
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제55권5호
    • /
    • pp.185-190
    • /
    • 2006
  • The security analysis relates to the ability of the electric systems to survive sudden disturbances such as electric short circuits or unanticipated loss of system elements. It is composed of both steady state and dynamic security analyses, which are not two separate issues but should be considered together. In steady state security analysis including voltage security analysis, the analysis checks that the system is operated within security limits by OPF (optimal power flow) after the transition of a new operating point. On the other hand, dynamic security analysis deals that the transition will lead to an acceptable operating condition. Transient stability, which is the ability of power systems to maintain synchronism when subjected to a large disturbance, is a principal component in dynamic security analysis. Usually any loss of synchronism will cause additional outages. They make the present steady state analysis of the post-contingency condition inadequate for unstable cases. This is the reason of the need for dynamics of systems. Probabilistic criterion can be used to recognize the probabilistic nature of system components and shows the possibility of system security. A comprehensive conceptual framework for probabilistic static and dynamic assessment is presented in this paper. The simulation results of the Western System Coordinating Council (WSCC) system compare an analytical method with Monte-Carlo simulation (MCS). Also, a case study of the extended IEEE Reliability Test System (RTS) shows the efficiency of this approach.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

보안과 위험의 지각이 인터넷 뱅킹 재사용 의도에 미치는 영향 (The Influence of Security and Risk Perception on the Reuse of Internet Banking)

  • 이웅규
    • Asia pacific journal of information systems
    • /
    • 제17권1호
    • /
    • pp.77-93
    • /
    • 2007
  • Risk has been considered as one of very important topics in traditional consumer behavior theoretically and practically since its tendency of minimizing errors rather than maximizing utilization in addition to its intuitive appealing with very high explaining power. In addition to a traditional view of risk, importance of risk in online transactions such as Internet banking is due to technical instability in security of the Internet as well as temporal and spatial separation of transaction partners. Therefore, risk in online transactions should be analyzed by a very comprehensive way since it is very inherent in the Internet. The objective of this study is to suggest a research model for explaining the use of online transactions in some risk related variables including risk results, security result, perceived security, and social influence and show its validity by applying it to Internet banking users. In result, hypotheses suggested by our research model are shown to be valid ones.

Performance Analysis of Blockchain Consensus Protocols-A Review

  • Amina Yaqoob;Alma Shamas;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.181-192
    • /
    • 2023
  • Blockchain system brought innovation in the area of accounting, credit monitoring and trade secrets. Consensus algorithm that considered the central component of blockchain, significantly influences performance and security of blockchain system. In this paper we presented four consensus protocols specifically as Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS) and Practical Byzantine Fault-Tolerance (PBFT), we also reviewed different security threats that affect the performance of Consensus Protocols and precisely enlist their counter measures. Further we evaluated the performance of these Consensus Protocols in tabular form based on different parameters. At the end we discussed a comprehensive comparison of Consensus protocols in terms of Throughput, Latency and Scalability. We presume that our results can be beneficial to blockchain system and token economists, practitioners and researchers.

Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks

  • Ezaz Aldahasi;Talal Alkharobi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.1-12
    • /
    • 2023
  • Ensuring the security of Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) is paramount to safeguarding the reliability and safety of critical infrastructure. This paper addresses the significant threat posed by reconnaissance attacks on SCADA/ICS networks and presents an innovative methodology for enhancing their protection. The proposed approach strategically employs imbalance dataset handling techniques, ensemble methods, and feature engineering to enhance the resilience of SCADA/ICS systems. Experimentation and analysis demonstrate the compelling efficacy of our strategy, as evidenced by excellent model performance characterized by good precision, recall, and a commendably low false negative (FN). The practical utility of our approach is underscored through the evaluation of real-world SCADA/ICS datasets, showcasing superior performance compared to existing methods in a comparative analysis. Moreover, the integration of feature augmentation is revealed to significantly enhance detection capabilities. This research contributes to advancing the security posture of SCADA/ICS environments, addressing a critical imperative in the face of evolving cyber threats.

BMO기법을 활용한 정보보안 비즈모델 평가시스템 소프트웨어 아키텍쳐 설계방법 (A Designing Method of Software Architecture for Information Security Business Model Selection using BMO Technique Base)

  • 노시춘
    • 융합보안논문지
    • /
    • 제13권3호
    • /
    • pp.71-77
    • /
    • 2013
  • 우리나라는 보안산업 현장에 적용할 적합한 비즈모델 분석 방법론을 발견하기 어렵고 단편적 이론은 존재하지만 종합적 분석 방법론은 희소한 실정이다. 정보보안 기업 비즈모델 분석은 외부요인과 내부요인에 관해 수집된 정보를 통합하고 포괄적으로 분석하는 정보시스템 개발이 요구된다. 비즈모델 분석을 위한 정보시스템의 소프트웨어 아키텍처는 시스템 설계의 초기 결정사항으로서 초기 결정은 설계, 개발, 테스트, 유지보수에 지속적인 영향을 미친다. 정보보안 비즈모델 분석시 BMO에 기반한 소프트웨어 아키텍쳐는 정보시스템의 목적이나 사명 수행을 지원 한다. 정보보안 비즈모델 분석을 위한 정보시스템은 여러 이해관계자들이 사명과 환경을 결정하며 그 결과가 아키텍처 기술서로 문서화 되어야 활용될 수 있다. 아키텍처 기술서는 소프트웨어 아키텍처를 결정한 근거를 제시하기 때문이다.

사이버거래 처리 구조 진단을 기반으로 한 뱅킹시스템 정보보호 성숙도 측정방법론 연구 (A Study of Information Security Maturity Measurement Methodology for Banking System based on Cyber -based Transaction Processing Architecture Diagnosis)

  • 방기천
    • 디지털콘텐츠학회 논문지
    • /
    • 제15권1호
    • /
    • pp.121-128
    • /
    • 2014
  • SSE-CMM은 보안엔지니어링을 공학, 보증, 위험 프로세스의 3가지 요소로 나누고 있으며 정보보호 성숙도 평가 모델과 수준을 제시하고 있다. 정보보호 성숙도 측정은 취약점 진단, 위험분석 방법론을 실무 현장에서 사용할 수 있도록 종합적으로 결론을 제시한다. 사이버거래의 일반적인 서비스는 인터넷 뱅킹, 모바일 뱅킹, 텔레뱅킹 등이다. 사이버거래 처리구조의 한 종류인 뱅킹시스템 정보보호 성숙도 측정방법론 연구 목적은 기존의 취약점 진단, 위험분석 방법론을 실무현장에서 사용할 수 있도록 종합적 결론을 제시한다. 안전성과 편리성을 확보하여 이용자들이 사이버 거래를 편리하게 이용할 수 있는 환경을 구축하는 것이 사이버 거래 활성화의 핵심이다. 특히 업무현장에서 정보보호 성숙도 측정을 통한 사이버뱅킹시스템의 안전성을 확보한다면 현장의 실무처리 결과로 많은 효과가 나타날 것으로 기대한다.

국가정보보호수준 평가지표 개선 및 지수 산출에 관한 연구 (A Development of a Framework for the Measuring National Information Security Level)

  • 임규건;배순한;이대철;지상호;백승익
    • 한국IT서비스학회지
    • /
    • 제12권4호
    • /
    • pp.187-204
    • /
    • 2013
  • In this study, we developed a comprehensive model to measure the National Information Security Level based on PRM framework. The proposed model reflected a rapidly changing technology environments such as social network service, mobile devices, and etc. This new model consists of three layers:Infrastructure Layer, the Action Layer and the Performance Layer, and there are 16 sub-indexes under the 3 layers. To develop new model and sub-indexes for measuring the National Information Security Level, much amounts of documents related to security indexes or deliberation criteria and security guidelines from international organization were reviewed and then most probable index pool were composed. The Index pool were verified by expert group consisting of professors and specialists. Through five times of screening and having an evaluation review, 16 sub-indexes were deduced and then Delphi and AHP have been conducted to obtain validity and objectiveness of the indexes. Thus the new proposed national information security index will show more exact national information security level and we expect that the indexes give much implications for establishing information protection policy.

4차 산업혁명의 보안 인프라 구축을 위한 융합보안산업 지식 맵 개발 (Development of Convergence Security Industry Knowledge Map for the 4th Industrial Revolution Security Infrastructure)

  • 이대성
    • 융합보안논문지
    • /
    • 제19권4호
    • /
    • pp.173-180
    • /
    • 2019
  • Cyber Physical System으로 상징되는 제4차 산업혁명(Industry 4.0)이 전 세계적으로 확산되어 감에 따라 향후 구현될 다양한 사이버 시스템들의 기술적 안정·신뢰성을 확보하기 위해서는 융합보안 인프라 구축이 필수적이다. 본 연구에서는 4차 산업혁명의 확산과 관련하여 생활안전의 개념을 포함하는 광의의 융합보안산업 및 기술의 현상을 파악하고, 관련된 지식간의 연계 가능성을 분석하여 보안의 융합화에 필요한 산학협력을 촉진할 수 있는 인력양성, 기술개발, 정책개선 등에 관한 종합적인 발전 정책을 제안하고자 한다.