• Title/Summary/Keyword: G-ISMS

Search Result 19, Processing Time 0.019 seconds

Analyses of Single Nucleotide Polymorphisms and Haplotype Linkage of the Human ABCB1 (MDR1) Gene in Korean

  • Ryu, Ho-Cheol;Kwon, Hyog-Young;Choi, Il-Kuen;Rhee, Dong-Kwon
    • Archives of Pharmacal Research
    • /
    • v.29 no.12
    • /
    • pp.1132-1139
    • /
    • 2006
  • Single nucleotide polymorph isms (SNPs) in the MDR1 gene that are responsible for drug efflux can cause toxicity. Therefore, this study determined the SNPs of the Korean MDR1 gene, and analyzed the haplotypes and a linkage disequilibrium (LD) of the SNPs determined. The frequency of 9 SNPs from the MDR1 gene was determined by PCR-RFLP analyses of 100 to 500 healthy individuals. The frequcies of the SNPs were C3435T (47.7%), G2677T (37.6%), G2677A (4.4%), T1236C (21.7%), T129C (8%), A2956G (2.5%), T307C (1.5%), A41aG (9.2%), C145G (0%), and G4030C (0%). Analyses of the haplotype structure and an estimation of the LD of the combined polymorph isms demonstrated that the frequency of the 1236T-2677G-3435T haplotype is much higher in Koreans (14.1%) than in Chinese and western black Africans and the C3435T SNP in Koreans appears to have LD with T129C in Koreans for the first time. These results provide insight into the genetic variation of MDR1 in Koreans, and demonstrated the possibility of a new LD in this gene.

Adaptation Policy of ISO 27001 ISMS (Information Security Management System) for e-Government (전자정부 정보보호관리체계(G-ISMS) 적용 정책)

  • Han, Keun-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.119-130
    • /
    • 2009
  • Korea ranked 2nd in the UN Global e-Participation Index and ranked number one as the leader in e-Government for the third consecutive year. However, Korea ranked 51 in the level of information security published by WEF(World Economic Forum), relatively a low level comparing with its great number of users and excellent environments for the Internet service. A series of critical hacking accidents such as the information leak at Auction and GS Caltex emerged consecutively in 2008 year, resulting in the leak of personal & critical information. This led to a strong interest in the necessity and importance of information security and personal information so that demand for IT security is growing fast. In this paper, we survey to benchmark information security in the perspective of service level, system, investment and policy about major foreign countries. Then we research on an effective way to make the most of the benchmark result to Korea e-Government. In addition, the purpose of this paper is to improve national information security index by developing a policy for ISO 27001 ISMS, an international standard for Information Security Management System, and elevate safety and security of the e-Government serviced by central administrative organizations and local authorities.

ISM Application Tool, A Contribution to Address the Barrier of Information Security Management System Implementation

  • Chandra, Nungky Awang;Sadikin, Mujiono
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.39-48
    • /
    • 2020
  • Information-security management systems (ISMSs) are becoming very important, even for micro, small, and medium enterprises (MSMEs). However, implementing an ISMS is not an easy task. Many obstacles must be overcome, e.g., complexity, document tracking, competency management, and even changing cultures. The objective of our study is to provide ISMS application tools, based on ISO 27001:2013 ISM frameworks. The application was developed on the Odoo Open Enterprise Resource Planning platform. To validate its feasibility for future improvement, the application was implemented by an MSME company. For this implementation, information-security-related users gave their feedback through a questionnaire. The distributed feedback questionnaire consists of nine assessment parameters, covering topics from the application's technical aspects to users' experiences. Based on the questionnaire feedback, all users of the application were satisfied with its performance.

Ways to establish public authorities information security governance utilizing E-government information security management system (G-ISMS) (전자정부 정보보호관리체계(G-ISMS)를 활용한 공공기관 정보보호 거버넌스 수립방안)

  • Ryu, Seung-Han;Jeong, Dae-Ryeong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.769-774
    • /
    • 2013
  • In order to strengthen the protection of information, public institutions have introduced information security governance system. Public institutions recognizes the importance of information security governance system, and have striven to establish information security governance by establishing institutions and making policies. In this paper, in order to investigate ways that will be the basis for the establishment of information security governance in public institutions, we studied the necessity and model of information security governance. Also, by studying the government policies and cases, we proposed the direction of the policy.

DGPS 정보보안에 관한 연구

  • Choe, Dae-Yeong;Kim, Hui-Tae;Gu, Ja-Heon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.10a
    • /
    • pp.353-355
    • /
    • 2013
  • 최근의 사이버공격으로 각 국가기관에서 운영하는 제어시스템의 보안위협이 증가하고 있다. DGPS의 경우도 DGPS 정보시스템을 대상으로 새로운 유형의 공격이 제시되었다. 이에 사전 방어를 위해 체계적으로 정보보호관리체계(G-IMS)를 수립을 제시하였고 이로부터 안전하고 신뢰성 있는 DGPS 서비스를 제공하고자 한다.

  • PDF

A Study for Limitations and Improvement of Information Security Management System (정보보호 관리의 한계점과 개선방안에 관한 연구)

  • Lee, Sujin;Choi, Sang-Yong;Kim, JaeKyoung;Oh, ChungShick;Seo, Changho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.563-570
    • /
    • 2014
  • As information security is becoming more important today, efforts in managing information security more efficiently is becoming greater. Each department such as Ministry of Security and Public Administration, Ministry of Science, Ministry of Education, National Intelligence Service, etc. is established screening criteria for information security and conducted the evaluation. Various information security certification and evaluation for public institutions effectively help to improve the level of information security. However, there are limitations of efficient security management because the examination to be performed frequently by each department. In this paper, we analyze screening criteria of the information security management that is being conducted in the public institutions. We also present limitations of information security management and the direction of improving the limitations.

Correlation Analysis in Information Security Checklist Based on Knowledge Network (지식 네트워크에 근거한 정보보호 점검기준 관계분석)

  • Jin, Chang Young;Kim, Ae Chan;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.2
    • /
    • pp.109-124
    • /
    • 2014
  • As the emerged importance and awareness for information security, It is being implemented by each industrial sector to protect information assets. In this paper, we analyze the information security checklists or security ratings criteria to derive similarity and difference in context which used to knowledge network analysis method. The analyzed results of all checklists (ISMS, PIMS, 'FSS', 'FISS', 'G') are as follows : First, It is common factors that the protection of information systems and information assets, incident response, operations management. Second, It deals with relatively important factors that IT management, the adequacy of audit activities in the financial IT sector including common factors. Third, the criteria of ISMS contains the majority of the contents among PIMS, 'FSS', 'FISS'and 'G'.

A Study on development of evaluation indicators on the Managed Security Service(MSS) (보안관제 업무에 대한 평가지표 개발 연구)

  • Lee, Hyundo;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1133-1143
    • /
    • 2012
  • Currently, Many Cyber Security Centers(CSC) are established and being operated in our country. But, in the absence of indicators to evaluate activities of the Managed Security Service(MSS), We can't identify the CSC's level of overall job performance. Therefore, we can't derive strengths and weaknesses from the CSC. From these reasons, The purpose of this research is to develop an objective indicator to evaluate activities of the MSS. I studied both international and domestic Information Security Management System(ISMS) as related standards(ISO/IEC 27001, G-ISMS). Moreover, I analysed the NIST Computer Security Incident Handing Guide and the Incident Management Capability Metrics(IMCM) of Carnegie Mellon Software Engineering Institute(SEI). The implications for this analysis and domestic hands-on experience are reflected in the research. So I developed 10 evaluation domains and 62 detail evaluation items. This research will contribute to our understanding the level of the CSC's job performance.

Association of the Human IL-28RA Gene Polymorphisms in a Korean Population with Asthma

  • Chae Soo-Cheon;Park Young-Ran;Lee Yong-Chul;Yang Yun-Sik;Chung Hun-Taeg
    • Genomics & Informatics
    • /
    • v.4 no.3
    • /
    • pp.103-109
    • /
    • 2006
  • IL-28RA is one of the important candidate genes for complex trait of genetic diseases, but there are only a few published results for this gene. Previously, we identified eighteen SNPs and two variation sites in the entire coding regions of IL-28RA including promoter regions, and suggested that the g.32349G>A polymorphism of IL-28RA might be associated with susceptibility to allergic rhinitis. In this study, we chose seven SNPs (g.-1193A>C, g.-30C>T, g.17654C>T, g.27798A>G, g.31265C>T, g.31911C>T and g.32349G>A) of IL-28RA, and attempted to find out whether these polymorphisms were furtherassociated with genetic predisposition of asthma. We analyzed the genotype and allele frequencies of IL-28RA polymorph isms between the asthma patients and healthy controls. We also investigated the frequencies of haplotype constructed by these SNPs between asthma patients and controls. Our results suggest that the polymorphisms of IL-28RA gene were not associated with susceptibility to asthma, and not with IgE production and eosinophil recruitment. The haplotype frequencies by these SNPs also not significantly associated between the healthy controls and asthma patients. This result indicates that the IL -2BRA polymorphisms might be not associated withasthma susceptibility.

Genetic Analysis of Kallikrein-Kinin System in the Korean Hypertensives

  • Kang, ByungYong;Bae, Joon Seol;Lee, Kang Oh
    • Animal cells and systems
    • /
    • v.8 no.1
    • /
    • pp.41-47
    • /
    • 2004
  • The kallikrein-kinin system affects regulation of blood pressure, and genes encoding for the components of this system have been considered as good candidates for hypertension. To evaluate the relationship between genetic polymorphisms of candidate genes involved in this system and hypertension, we performed case-control studies using genetic markers in Korean normotensives and hypertensives, respectively. By association study, there was a marginal association with hypertension in AA genotype distribution of A1789G polymorphism in the hKLK1 gene (P=0.0754). Thus, this genetic polymorphism may weakly contribute to the susceptibility to hypertension in Koreans. We also observed that significant linkage disequilibrium exists among three polymorphic sites in the hKLK1 gene studied, suggesting that the three genetic polymorph isms can be useful as genetic markers in clinical association studies. Further studies using larger sample sizes and more genetic markers will be needed to clarify genetic influence of kallikrein-kinin system for hypertension.