• Title/Summary/Keyword: ISMS

Search Result 180, Processing Time 0.022 seconds

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

Research on Integrated Management of ISMS : Comparative Analysis of IT Disaster Recovery Framework (IT재해복구 연관 프레임워크 비교분석을 통한 ISMS의 통합관리방안)

  • Bak, Yurim;Kim, Byungki;Yoon, Ohjun;Khil, Ara;Shin, Yongtea
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.3
    • /
    • pp.177-182
    • /
    • 2017
  • To develop computer and communication in the information society, difficulties exist in managing the enormous data manually. Also, loss of data due to natural disasters or hacker attacks, generate a variety of disasters in the IT securities. Hence, there is an urgent need for an information protection management system in order to mitigate these incidents. Information Security Management System has various existing frameworks for IT disaster management. These include Cyber Security Framework, Risk Management Framework, ISO / IEC 27001: 2013, and COBIT 5.0. Each framework analyses and compares the entry for IT disaster recovery from among the various available data. In this paper, we describe a single integrated management scheme for fast resolution of IT disasters.

A Study on PIMS Controls for PII Outsourcing Management under the Cloud Service Environment (클라우드 서비스 환경의 개인정보 위탁을 위한 개인정보보호 관리체계 통제 연구)

  • Park, Dae-Ha;Han, Keun-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1267-1276
    • /
    • 2013
  • Cloud consumers who use cloud computing services are obliged to review and monitor the legal compliance of cloud providers who are consigned the processes of the PII (personally identifiable information) from them. This paper presented possible scenarios for cloud PII outsourcing and suggested PIMS (personal information management system) controls for outsourcing management between cloud consumers and cloud providers by analyzing both international standards and domestic certification schemes related to cloud computing and/or privacy management based on the legal obligations for PII outsourcing from Korean "Personal Information Protection Act (PIPA)". The controls suggested can be applicable for developing the guidance of complying with privacy laws in organizations or the checklist of PII outsourcing management in PIMS certification.

XML Converter Design and Implementation for OCIL based Security Level Evaluation (OCIL기반 보안수준평가를 위한 XML Converter 설계 및 구현)

  • Kim, Jongmin;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.29-35
    • /
    • 2020
  • The cyber attacks targeting the systems of national and public organizations in the front line of cyber security have been advanced, and the number of cyber attacks has been on the constant rise. In this circumstance, it is necessary to develop the security evaluation technology to prevent cyber attacks to the systems of national and public organizations. Most of the studies of the vulnerability analysis on the information systems of national and public organizations almost focus on automation. In actual security inspection, it is hard to automate some parts. In terms of security policies for threats, many different plans have been designed and applied in the managerial, physical, and technical fields, giving particular answers no matter how they are subjective or situational. These tendencies can be standardized in OCIL(Open Checklist Interactive Language), and partial automation can be achieved. Therefore, this study tries to implement XML Converter in order for OCIL based security level evaluation with typical evaluation questions.

Trehalose Metabolism: Gate to Stress Signaling and Seed Development in Plant\ulcorner

  • Chung, H-J;Kim, Y-S;Lee, E-J;Kim, J-S;Shin, Y-M;Cho, I-S;Jin, H-O;Cho, J-W;Chung, C-H
    • Korean Journal of Plant Tissue Culture
    • /
    • v.27 no.5
    • /
    • pp.415-421
    • /
    • 2000
  • The disaccharide trehalose ($\alpha$-D-glucopyranosyl-$\alpha$-D-glucopyranoside) is found in variety of organ-isms that are able to withstand almost complete desiccation. In order to identify the function of trehalose in plants, we isolated Arabidopsis trehalase (AtTRE) gene that encodes the enzyme able to hydrolyze trehalose to glucose, and trehalose-6-phosphate synthase isolog, TPS3 gene by RT-PCR. The AtTRE had the substrate specificity to hydrolyze only trehalose, and a broad pH range of enzyme activity. The AtTRE promoter/GUS reporter gene was expressed in cotyledons, mature leaf tissues including guard cells, and developing siliques. The GUS expression driven by AtTPS3 promoter was significant in root tissues, and the level of GUS activity was much higher than that of the pBll 21 control seedlings. The knockout of AtTPS3 gene in Arabidopsis resulted in the retarded root development, whereas the overexpression of AtTPS3 increased the root elongation in the presence of sucrose in MS medium. Possible functions of AtTRE and AtTPS3 in plant will be discussed. In addition, ectopic expression of yeast TPS1 driven by the inducible promoters in tobacco and potato conferred the plants on the drought and freezing tolerances.

  • PDF

Selection and Characterization of S-Aminoethyl-L-Cysteine Resistant Plants from Gamma-ray Irradiated Embryogenic Callus in Sweet potato

  • Lee In-Sok;Kim Dong-Sub;Hong Chang-Pyo;Kang Si-Yong;Song Hi-Sup;Lee Sang-Jae;Lim Yong-Pyo;Lee Young-Il
    • Journal of Plant Biotechnology
    • /
    • v.5 no.4
    • /
    • pp.233-238
    • /
    • 2003
  • Sweet potato cells derived from Yulmi were isolated from embryogenic callus and irradiated with 50 Gy dose. Resistant cells were selected on a MS medium containing 1.0 mM S-aminoethyl-L-cysteine (AEC). This level of AEC approximately inhibits non-selected wild type cells. The callus resistant to this analog of lysine was subcultured for 30 days in absence of AEC to proliferate. The three resistant calli (AR-1, AR-2 and AR-3) with better growth were divvied into 0.5~1mm diameter and placed on MS medium with 0, 0.4, 0.6, 0.8 and 1.0 mM AEC. There are considerable growth difference between control callus and AEC resistant callus on the AEC-medium. The selected calli were placed on the hormone-free medium for regeneration. Three plantlets, five plantlets and six plantlets were recovered from AR-1, AR-2 and AR-3 calli, respectively. Each two regenerants in AR-1, AR-2 and AR3 were randomly selected for RAPD and SDS PAGE analysis. RAPD polymorph isms between Yulmi and AEC resistant plant from irradiated calli were detected in several Wako primers. Also, it was identified that two AEC resistant plants had higher protein than the original variety Yulmi.

Association Analysis between Polymorph isms of NOTCH4 Gene and Schizophrenia in Korean Population

  • Lee, Seo-Kyong;Kang, Sung-Wook;Kim, Su-Kang;Kim, Hak-Jae;Kim, Tae;Park, Jin-Kyung;Cho, Ah-Rang;Kim, Jong-Woo;Park, Hyun-Kyung;Kim, Youn-Jung;Choe, Bong-Keun;Song, Ji-Young
    • Molecular & Cellular Toxicology
    • /
    • v.5 no.2
    • /
    • pp.160-164
    • /
    • 2009
  • Notch signaling plays a crucial role in development of the nervous system. Neurodevelopmental hypothesis on etiology of schizophrenia has been implicated. The aim of this study is to determine whether single nucleotide polymorphisms (SNPs) of Notch homolog 4 (Drosophila) (NOTCH4) gene are associated with schizophrenia. This study included 283 schizophrenia patients diagnosed according to DSM-IV and 301 normal control subjects. Control subjects without history of psychiatric disorders were recruited. Four missense SNPs [rs915894 (exon 3, Lys117Gln), rs2071282 (exon 4, Pro204Leu), rs422951 (exon 6, Thr320Ala), and rs17604492 (exon 18, Gly942Arg)] of NOTCH4 gene were genotyped by the direct sequencing method. Multiple logistic regression models (codominant, dominant, and recessive models) were employed to evaluate odds ratio, 95% confidence interval, and p value. For analysis of genetic data, SNPStats, Haploview, HapAnalyzer, SNPAnalyzer, and Helixtree programs were also used. Of 4 SNPs, rs2071282 was weekly associated with schizophrenia in two alternative models (codominant model, P=0.049; dominant, P=0.041). However, these associations were not significant after Bonferroni correction. At 4 SNPs, one linkage disequilibrium (LD) block was made. This block consisted of rs915894 and rs2071282. In haplotype analysis, AC haplotype was weakly associated with schizophrenia (dominant, P=0.04). This association was disappeared after Bonferroni correction. Our result shows possibility that some SNPs of NOTCH4 gene may be weekly associated with development of schizophrenia in Korean population. However, replication result by other population will be needed.

Genetic Polymorph isms of BTN and STAT5a Genes in Korean Proven and Young Bulls

  • Lee, K.H.;Chang, K.W.;Cho, K.H.;Lee, K.J.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.15 no.7
    • /
    • pp.938-943
    • /
    • 2002
  • This study was perfonned to detect polymorphisms of the two candidate genes, bovine BTN (Butyrophilin) and ST AT5a (Signal Transducers and Activators of Transcription) gene using 98 Holstein bulls' frozen semen, and to offer the basic information for QTL (Quantitative Trait Loci) analysis. Each BTN PCR product was digested with endonuclease restriction enzyme. The digested fragments of four BTN PCR products were observed as follows: 316,280, and 162 bp in BTN1, 568, 305 and 263 bp in BTN2, 576, 332, and 244 bp in BTN3, and 573, 291, and 282 bp in BTN4, respectively. The gene frequencies of A and B allele in four BTN loci were as follows: 0.8980 and 0.1020 in BTN1, 0.5510 and 0.4490 in BTN2, 0.8163 and 0.1837 in BTN3, and 0.8875 and 0.1122 in BTN4, respectively. And three genotypes (homotypel, heterotype, and homotype2) for STAT5a were observed by SSCP (single stranded conformational polymorphism) method and the genotype frequencies are 78.57%, 19.39%, and 2.04%, respectively. The PlC (Polymorphism Information Content) value and heterozygosity of four BTN loci were as follows: 0.1695 and 0.1870 in BTN1, 0.3713 and 0.4927 in BTN2, 0.2549 and 0.2999 in BTN3, and 0.1794 and 0.1992 in BTN4, respectively. Comparing with the reported data, PlC value of BTN2 might have the possibility to be useful marker. Other BTN loci indicated skewed allele distribution.

Developing the Assessment Method for Information Security Levels (정보보호 수준평가 방법 개선에 관한 연구)

  • Oh, Nam-Seok;Han, Young-Soon;Eom, Chan-Wang;Oh, Kyeong-Seok;Lee, Bong-Gyou
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.2
    • /
    • pp.159-169
    • /
    • 2011
  • In order for agencies and companies at the IT service industry to check as well as to upgrade the current status of their information security programs, this paper suggests the assessment method for information security levels. The study developed 12 assessment fields and 54 assessment items derived from domestic and foreign cases including SP800-26, SP800-53, ISMS, and ISO27001. It categorized 54 assessment items into 5 levels for determining information security levels. Also, the study presents 7 strategies for performing their efficient evaluations. The proposed method and process in this paper can be useful guidelines for improving the national information security level.

The Policy Distribution Algorithm of Firewall in Integrated Security Management (통합보안관리시스템의 방화벽정책 분배를 위한 알고리즘 : FALCON)

  • Kim, Gwang-Hyeok;Gwon, Yun-Ju;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.467-472
    • /
    • 2002
  • Recently, Networks are required to adopt the security system and security consulting because of security threats and vulnerabilities of systems. Enterprise Security Management (ESM) is a system which establishes the security zone composed of security systems and Firewalls and applies the security policy to each security system. A relevant ESM is based on the effective policy and the proper security system. Particularly, multiple firewalls in ESM are concerned with the security policy about each traffic. In this paper, we describe the problems that can be occurred when we select the firewalls to apply security policy of access control in ESM composed of multiple firewalls and propose the FALCON algorithm, which is able to select the firewalis to apply the policy. We expect that FALCON algorithm offers stability, scalability and compactness for selecting firewall set.