• 제목/요약/키워드: IS Security

검색결과 17,519건 처리시간 0.044초

국내주요그룹의 정보보안관리 체계에 관한 사례 연구 (A Case Study on the Information Security Management System for Major Korean Businessn Groups)

  • 선한길;한인구
    • Asia pacific journal of information systems
    • /
    • 제8권2호
    • /
    • pp.105-119
    • /
    • 1998
  • As the first step to information security, the security policy and organizational control need to be established. The purpose of this study is to investigate the policy and management of information security of five major Korean business groups. The results of case study on five giant groups can be summarized as follows. There exists a basic policy for information security. But it is outdated and not realistic in the present. The security audit and education need to be upgraded. It is also necessary to use security tools actively. The security level is low in companies which do not have independent information security divisions. Therefore, it is desirable to build information security teams. The number of security personnel is not enough for the task although there exist an information security team in the company. It is important to check if the team has the ability of perform information security task. The interview with security managers reveals that the total security management should be integrated with physical and computer security. It is suggested that an Information Security Center play the major role for information security. The study on the information security management for industry level is expected to be performed in the future.

  • PDF

기계경비시스템의 변화와 시장전망 (The Trends of Electronic Security System and Prospects of Security Market)

  • 정태황
    • 시큐리티연구
    • /
    • 제6호
    • /
    • pp.147-165
    • /
    • 2003
  • Since Electronic Security System is introduced in Korea in 1981 by foreign technology, Security market has been increasing considerably during short period, and It performs it's security roles well in place of security guards. As electronic and communication technology is highly developed, Electronic Security System and security market structure is changing naturally. Especially high-tech mobile communication technology will change the method of Electronic Security business. Also the pattens of residence and life style, such as the trend toward nuclear family and single life could effect security market. In recent year, new business models that apply the mobile phone and internet is appeared. Although Electronic Security System is changed by the changes of technology, It is very difficult to change the basic elements, such as sensing, alarm signal transfering, and response. The rate of increase of Electronic Security market is expected to matain it's increase pace for the time being. But the development of new system for new protectes such as childeren, old person, vehicle rather than immovable facility is necessary to prepare for the continuous competition.

  • PDF

기계경비시스템 운용현황 고찰과 운용품질개선 방안 (The Operating Status of Security Alarm Systems and the Polices for Inproving the Operational Quality)

  • 신상엽
    • 시큐리티연구
    • /
    • 제8호
    • /
    • pp.197-218
    • /
    • 2004
  • This study has been conducted to provide data that contribute to increasing efficiency of 'Private Security', which is cooperated by customer, security companies and the police which carried out 'Public Law Enforcement' and controls security companies. To reach this purpose, we investigated the status of the 'Security Alarm Systems' operated by security service companied in Korea, analyzed arising problems, considered the polices for improving the operational quality. 'Electronic Security Systems' will increase working efficiency in performing 'Private Security'. There can be no two opinions on this matter. Therefore, it can be supposed that the improvement of operational quality of 'Electronic Security System' is an important factor to accomplish security services. 'Security Alarm System' is one of the 'Electronic Security System'. The critical problems in operating 'Security Alarm system' are unnecessary response by false alarm and nuisance alarm. To reduce the problems, it is suggested that security specialist officially licensed should improve security planning, installation and maintenance, and the 'Alarm Verification System' should be introduced with appropriate facilities.

  • PDF

기밀정보 유출 경험을 가진 기업들의 정보사고 대응역량 강화에 관한 연구 (The Correspondence Competence of Information Accident by Firms Experienced in Confidential Information Leak)

  • 정병호
    • 디지털산업정보학회논문지
    • /
    • 제12권2호
    • /
    • pp.73-86
    • /
    • 2016
  • The purpose of this study is to examine a security investment for firms experienced in confidential information leak. Information security is an apparatus for protection of secret information. The competence of information security is a competitiveness to avoid information leakage in changing business environment. The type of information security is divided into administrative security, technical security and physical security. It is necessary to improve the incident correspondence competence through information security investment of the three types. Therefore, the investment of information security is to enhance information-asset protection of firms. To reinforce accident response competence, an organization discussed an establishment, security technology development, expand investment and legal system of the security system. I have studied empirically targeting the only information leak of firms. This data is a technical security competence and technology leakage situation of firms happened in 2010. During recovery of the DDos virus damage on countries, company and individual, the collected data signify a reality of information security. The data also identify a security competence of firms worrying information security management. According to the study, the continuous investment of information security has a high competence of accident correspondence. In addition, the most of security accidents showed a copy and stealing of paper and computer files. Firm on appropriate security investment is an accident correspondence competence higher than no security investment regardless of a large, small and medium-sized, and venture firm. Furthermore, the rational security investment should choose the three security type consideration for firm size.

조직의 정보보안 분위기가 조직 구성원의 정보보안 참여 행동에 미치는 영향 (The Impact of Organizational Information Security Climate on Employees' Information Security Participation Behavior)

  • 박재영;김범수
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제29권4호
    • /
    • pp.57-76
    • /
    • 2020
  • Purpose Although examining the antecedents of employees' extra-role behavior (i.e. information security participation behavior) in the information security context is significant for researchers and practitioners, most behavioral security studies have focused on employees' in-role behavior (i.e. information security policy compliance). Thus, this research addresses this gap by investigating how organizational information security climate influences information security participation behavior based on social information processing theory and Griffin and Neal's safety model. Design/methodology/approach We developed a research model by applying Griffin and Neal's safety model to the information security context and then tested our research model by conducting an online survey for employees of organizations with information security policies. Structural equation modeling (SEM) with SmartPLS 3.3.2 is used to test the corresponding hypothesis. Findings Our results show that organizational information security climate, information security knowledge, information security motivation are effective in motivating information security participation behavior. Also, we find that organizational information security climate positively influences both information security knowledge and information security motivation. Our findings emphasize the importance of organizational information security climate because it is capable of affecting employees on information security participation behavior. Our study contributes to the literature on information security by exploring the role of organizational information security climate in enhancing employees' information security participation behavior.

정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화 (Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure)

  • 이상훈;김태성
    • 지능정보연구
    • /
    • 제26권3호
    • /
    • pp.37-50
    • /
    • 2020
  • 사물 인터넷, 빅데이터, 클라우드, 인공지능 등 다양한 정보통신기술이 발전하면서, 정보보호의 대상이 증가하고있다. 정보통신기술의 발전에 비례해서 정보보호의 필요성이 확대되고 있지만, 정보보호 투자에 대한 관심은 저조한 상황이다. 일반적으로 정보보호와 관련된 투자는 효과를 측정하기 어렵기 때문에 적절한 투자가 이루어지지 않고 있으며, 대부분의 조직은 투자 규모를 줄이고 있다. 또한 정보보호 대책의 종류와 특성이 다양하기 때문에 객관적인 비교와 평가가 힘들고, 객관적인 의사결정 방법이 부족한 실정이다. 하지만 조직의 발전을 위해서는 정보보호와 관련된 정책과 의사결정이 필수적이며 적정 수준의 투자와 이에 대한 투자 효과를 측정 할 필요가 있다. 이에 본 연구에서는 게임 이론을 이용하여 정보보호 대책 투자 포트폴리오를 구성하는 방법을 제안하고 선형계획법을 이용하여 최적 방어 확률을 도출한다. 2인 게임 모형을 이용하여 정보보호 담당자와 공격자를 게임의 경기자로 구성한 뒤, 정보보호 대책을 정보보호 담당자의 전략으로, 정보보호 위협을 공격자의 전략으로 각각 설정한다. 게임 모형은 경기자의 보수의 합이 0인 제로섬 게임을 가정하고, 여러개의 전략 사이에서 일정한 확률 분포에 따라 전략을 선택하는 혼합 전략 게임의 해를 도출한다. 여러 종류의 위협이 존재하는 현실에서는 한 개의 정보보호 대책만으로 일정 수준 이상의 방어가 힘들기 때문에, 다수의 정보보호 대책을 고려해야한다. 따라서 다수의 정보보호 위협에 따른 정보보호 대책이 배치된 환경에서 정보보호 대책의 방어 비율을 이용하여 정보보호 대책 투자 포트폴리오를 산출한다. 또한 최적화된 포트폴리오를 이용하여 방어 확률을 최대화하는 게임 값을 도출한다. 마지막으로 정보보호 대책의 실제 성능 데이터를 이용하여 수치 예제를 구성하고, 제안한 게임 모델을 적용하고 평가한다. 본 연구에서 제시한 최적화 모델을 이용하면 조직의 정보보호 담당자는 정보보호 대책의 방어 비율을 고려하여 정보보호 대책의 투자 가중치를 구할 수 있고, 효과적인 투자 포트폴리오를 구성하여 최적의 방어 확률을 도출 할 수 있을 것이다.

패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인 (A Study on Factors Influencing User's Security Behavioral Intention for Choosing Password)

  • 김종기;강다연;전진환
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제17권1호
    • /
    • pp.23-43
    • /
    • 2008
  • Nowadays, openness and accessibility of information systems increase security threats from inside and outside of organization. Appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. This study emphasizes on choosing passwords from perspective of information security and investigated user's security awareness affecting behavioral intention. The research model proposed in this study includes user's security belief which is influenced by risk awareness factors such as information assets, threats and vulnerability elements. The risk awareness factors ale derived from risk analysis methodologies for information security. User's risk awareness is a factor influencing the security belief, attitude toward security behavior, and security behavioral intention. According to the result of this study, while vulnerability is not related to the risk awareness, information assets and threats are related to the user's risk awareness. There is a significant relationship between risk awareness and security belief. Also, user's security behavioral intention is significantly affected by security attitude.

Design of Security Management System

  • Kim Seok-Soo;Soh Woo-Young
    • International Journal of Contents
    • /
    • 제1권2호
    • /
    • pp.22-25
    • /
    • 2005
  • Enterprise security management system: Enterprise Security Management (EMS) is centralized integrated management of other kind of security solutions such as intrusion cutoff system, intrusion detection system and virtual private network. With the system, it is possible to establish security policies for entire IT system through interlocking of solutions. A security system of company network is progressing as a ESM(Enterprise Security Management) in existing security solution foundation. The establishment of the security policy is occupying very important area in ESM of the security system. We tried to analyze existing ESM system for this and designed security solution structure for enhancing the inside security. We applied implementing directly IDS system and tested. This test set the focus about inside security

  • PDF

현행 「경비업법」상 경비개념과 경비업무 해석의 한계 및 민간보안산업 관련 입법의 제·개정 방향 (Limit of interpreting 'security service' in current 「Security Services Industry Act」 and direction of legislating and revising private security industry)

  • 최은하;김나리;유영재
    • 시큐리티연구
    • /
    • 제50호
    • /
    • pp.35-57
    • /
    • 2017
  • 경비업법은 1976년 "용역경비업법"으로 제정된 이래 수많은 일부개정작업이 이루어져 왔다. 이러한 개정작업의 주된 내용은 기존의 용역경비업의 경비업무를 기초로 신변보호 업무나 특수경비와 같은 경비업무의 추가, 경비업자 또는 경비원의 책임 강화 및 경비업의 체계적 관리를 다루는 규정이 그 대부분을 이루고 있다. 그러나 이와 같은 법률개정의 흐름에는 '경비' 개념에 대한 본질적 문제가 양날의 칼처럼 직결되어 있음을 직시할 필요가 있다. 왜냐하면 일면, 현행 "경비업법"은 기존의 시설 인력경비 즉, Guard duty 중심의 경비서비스로 제2조의 경비업무를 근간으로 하여 경비업의 허가와 그 체계적 관리를 대상으로 하는 형식적 경비업을 규정하고 있음에 비해, 또 다른 관점에서 경비업은 보안(security)산업의 일종으로 현대의 위험사회에서 다원화된 보안욕구를 실현하고, 실질적 경비업의 기능을 육성과 발전의 대상으로 하는 적극적 경영 개념에 기초하고 있기 때문이다. 본 연구에서는 민간보안서비스 제공의 관점에서 "경비업법"상의 경비 및 경비업무의 해석에 대한 한계를 지적하고, "민간보안산업법"으로서 "경비업법"의 일반 법규성과 특별법으로서 민간보안서비스 관련 법률의 제 개정 작업을 재조명하였다. 또한 바람직한 입법의 제 개정방향을 제시함으로써 '국민보안'의 시대에 걸맞는 입법과 노력이 필요하다는 결론을 도출하였다.

  • PDF

경호업무의 경비영역과 기계경비의 적용 방안 (A Study on Guarding Security Portion in Protecting Operation and Application of Electronic Security)

  • 정태황
    • 시큐리티연구
    • /
    • 제4호
    • /
    • pp.319-341
    • /
    • 2001
  • Most of protecting security activity is carried out by manpower partly by security equipment. The protecting security market and the area of protecting security activity is increasing in spite of change of economic and social environment situation. For more effective protecting security activity, the coordination of electronic equipment and manpower is required. So some application method is suggested throughout the thesis, which is especially focused on new approaching method. The integration of intrusion detecting system, C.C.TV system and Access control system is introduced for general application in chapter III, and some application systems are proposed for protecting security activity in chapter IV. But the security equipment is only aid for manpower, so manpower and equipment should be coordinated well.

  • PDF