• 제목/요약/키워드: ISMS

검색결과 180건 처리시간 0.026초

Vulnerability Countermeasures for Information Security in Smart Work Services (스마트워크 서비스에서 정보보호를 위한 취약성 대응 방안)

  • Kim, Ji Seog;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • 제7권4호
    • /
    • pp.69-81
    • /
    • 2017
  • Smart work refers to enhancing the efficiency of work by utilizing smart devices. Smart work improves business productivity by improving business productivity of companies, reducing costs, but there is a threat to various information protection. To operate telecommuting, mobile office, and smart work center, hardware and software are needed to support various network resources, servers, and platforms. As a result, there are many vulnerabilities to security and information protection that protect information resources. In this paper, we analyze the smart work environment for smart work service and analyze vulnerability for smart work information protection through analysis of IOS27001 and KISA-ISMS. We have developed requirements for information protection requirements for users and service providers. We have developed a solution for information security protection for smart work environments such as common parts, mobile office, telecommuting, and smart work center for security threats and weaknesses per smart work type.

Association of the Human IL-28RA Gene Polymorphisms in a Korean Population with Asthma

  • Chae Soo-Cheon;Park Young-Ran;Lee Yong-Chul;Yang Yun-Sik;Chung Hun-Taeg
    • Genomics & Informatics
    • /
    • 제4권3호
    • /
    • pp.103-109
    • /
    • 2006
  • IL-28RA is one of the important candidate genes for complex trait of genetic diseases, but there are only a few published results for this gene. Previously, we identified eighteen SNPs and two variation sites in the entire coding regions of IL-28RA including promoter regions, and suggested that the g.32349G>A polymorphism of IL-28RA might be associated with susceptibility to allergic rhinitis. In this study, we chose seven SNPs (g.-1193A>C, g.-30C>T, g.17654C>T, g.27798A>G, g.31265C>T, g.31911C>T and g.32349G>A) of IL-28RA, and attempted to find out whether these polymorphisms were furtherassociated with genetic predisposition of asthma. We analyzed the genotype and allele frequencies of IL-28RA polymorph isms between the asthma patients and healthy controls. We also investigated the frequencies of haplotype constructed by these SNPs between asthma patients and controls. Our results suggest that the polymorphisms of IL-28RA gene were not associated with susceptibility to asthma, and not with IgE production and eosinophil recruitment. The haplotype frequencies by these SNPs also not significantly associated between the healthy controls and asthma patients. This result indicates that the IL -2BRA polymorphisms might be not associated withasthma susceptibility.

Studies on the effect of information security investment executive (정보보호의 투자 집행 효과에 관한 연구)

  • Jeong, Seong-Hoon;Yoon, Joon-Sub;Lim, Jong-In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제24권6호
    • /
    • pp.1271-1284
    • /
    • 2014
  • This paper classifies technical, administrative and physical areas of defects and advices made by an external audit (ISO27001) and internal audit (performed by a security team) in a company which has the management system of information security. With the classified data it finds the correlation between the budget and investment of information security, and analyze the correlation. As a result of the analysis, it has been found that as time goes on there is a consistent correlation between a administrative area and technical area of security. Specially, it has been confirmed that the relation between the scale of the budget which is not executed and the number of the defects and advices made by the audit is in direct proportion. Therefore, in this paper, so as to provide a model that can be used for validating the effectiveness of the protective investment information by statistically calculating the similarity based on the results of correlation analysis. This research is intended to help that a company makes a precise decision when it establishes a policy of information security and systematic methodology of the investment in information security.

Single Nucleotide Polymorph isms of a 16 kb Region on Human Chromosome 11 p15.5 that Includes the H19 Gene

  • Park, Mi-Hyun;Ku, Hyeon-Jeong;Lee, Hye-Ja;Kim, Kwang-Joong;Park, Chan;Oh, Bermseok;Kimm, Ku-Chan;Lee, Jong-Young
    • Genomics & Informatics
    • /
    • 제3권3호
    • /
    • pp.74-79
    • /
    • 2005
  • The H19 gene, located at human chromosome 11p15.5, is imprinted in most normal human tissues. However, imprinting is often lost in tumors suggesting H19 is a putative tumor suppressor. We analyzed the single nucleotide polymorphisms (SNPs) of a 16 kb region that includes the H19 gene and its imprinting control region (ICR) in the Korean population. To identify SNPs, we directly sequenced this region in 18 Korean subjects. We identified 64 SNPs, of which 7 were in the exons of H19, 2 were in the introns, 14 were in the 3' intergenic region and 41 were in the 5' intergenic region. Of the 64 SNPs, 21 had not previously been reported and thus appear to be unique to the Korean population. The identified SNPs of H19 in the Korean population may eventually be useful as genetic markers associated with various diseases. In this study, 7 of the 64 identified SNPs were at CTCF binding sites in the ICR and may affect regulation of H19 gene imprinting. Thus, several genetic variations of the H19 gene may be important markers in human diseases that involve genomic imprinting, including cancer.

A Study on Interface Security Enhancement (조직의 실시간 보안관리 체계 확립을 위한 '인터페이스 보안' 강화에 대한 연구)

  • Park, Joon-Jeong;Kim, Sora;Ahn, SooHyun;Lim, Chae-Ho;Kim, Kwangjo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제4권5호
    • /
    • pp.171-176
    • /
    • 2015
  • Because the specific security technology alone can not cope with sophisticated attacks, various security management models are applied. But, they do not focus on the vulnerability of the highest part because they offer so many common security management criteria. By analyzing the main information and confidential leakage cases inflicting enormous damage to our society, we found that attackers are using mainly an interface vulnerabilities - the paths that connect the internal and external of the organization, such as e-mail, web server, portable devices, and subcontractor employees. Considering the reality that time and resources to invest in security domain are limited, we point out the interface security vulnerabilities the possibility of attackers to exploit and present a convergence method of security measures. Finally, based of ROI(Return on Investment), we propose the real-time security management system through the intensive and continuous management.

Communitarian Liberalism and Controversial Issues in Moral Education (공동체적 자유주의와 도덕·윤리교육의 쟁점(I) : 교재관의 문제)

  • Moon, Sung-hak
    • Journal of Korean Philosophical Society
    • /
    • 제130권
    • /
    • pp.47-77
    • /
    • 2014
  • The purpose of this paper is to justify the following four points. 1) Both communitarianism maintaining perfectionism and liberalism maintaining state neutralism are wrong. Communitarian liberalism is right. 2) If we accept a standpoint of communitarian liberalism, every state must make its own moral textbook for the achievement of common good. Of course, it dose not mean that a government must be an author of moral textbook. 3) The subjects of unification education and democratic citizenship education must be included in moral textbook. The crucial difference between moral education and civic education lies not in the educational subject but in the educational method. In order to internalize communal values and virtue, moral education prefer reflective internalization to indoctrination. But civic education prefer indoctrination to reflective internalization. 4) An desirable Korean who shares Korean values and virtue, provisional moral truth of Korea is a citizen of two isms, namely nationalism and cosmopolitanism.

A Study on Establishment of Small and Medium Business Information Security Plan under Resource Restrictions (자원 제약하의 중소기업 정보보안계획 수립방안 연구)

  • Kwon, Jang-Kee;Kim, kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • 제7권2호
    • /
    • pp.119-124
    • /
    • 2017
  • Information is a valuable asset regardless of the size of the enterprise and information security is an essential element for the survival and prosperity of the enterprise. However, in the case of large corporations, Security is ensured through rapid introduction of information security management system. but In the case of SMEs, security systems are not built or construction is delayed due to complex factors such as budget constraints, insufficient security guidelines, lack of security awareness. In this paper, we analyze the actual situation of information security management of SMEs through questionnaires, and We would like to suggest a comprehensive security plan for SMEs in free or inexpensive ways. We believe that by applying the method presented in this paper, SMEs will be able to implement the lowest cost basic information security and will benefit SMEs who plan to establish an information security plan.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제22권1호
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Improvement Research for Information Protection Management System of Small and Medium Enterprises (중소기업의 정보보호 관리체계 개선방안 연구)

  • Hye-Joung Yun;Yong-Woo Lee;Hee-Doo Heo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제23권2호
    • /
    • pp.15-20
    • /
    • 2023
  • Recently, digitalization is accelerating in all industries, and the use of information and personal information produced and used in the process of it is very important for the success or failure of a company. However, malicious attempts to steal or leak major information and personal information of a company as an adverse effect continue to increase, and appropriate defense and response are absolutely necessary. However, in the case of small and medium-sized enterprises, the priority of information protection and the possession of professional manpower are very insufficient compared to large enterprises. This paper studies the certification and audit implemented in Korea, and suggests ways to expand the certification of the information protection system suitable for SMEs and improve the effectiveness of the support system through the expansion of the privacy law notification standard and operation of support system.

The Study of a Development Plan of the Industrial Security Expert System (산업보안관리사 자격제도 발전 방안에 대한 고찰)

  • Cho, Yong-Sun
    • Korean Security Journal
    • /
    • 제40호
    • /
    • pp.175-207
    • /
    • 2014
  • This paper focuses on the study of a development direction of the industrial security Expert system. First of all, in order to manage Industrial security system, we need to have law, criminology, business and engineering professionals as well as IT experts, which are the multi-dimensional convergence professionals. Secondly, industrial organizations need to have workforce who can perform security strategy; security plan; security training; security services; or security system management and operations. Industrial security certification system can contribute to cultivate above mentioned professional workforce. Currently Industrial Security Expert(ISE) is a private qualification. However, the author argued that it have to be changed to national qualification. In addition, it is necessary that the system should be given credibility with verifying the personnel whether they are proper or not in the their field. In terms of quality innovation, it is also necessary that distinguish the levels of utilization of rating system of the industrial security coordinator through a long-term examination. With respect to grading criteria, we could consider the requirements as following: whether they must hold the degree of the industrial security-related areas of undergraduate or postgraduate (or to be); what or how many industrial security-related courses they should complete through a credit bank system. If the plan of completing certain industrial security-related credits simply through the credit bank system, without establishing a new industrial security-related department, has established, then industrial security study would be spreaded and advanced. For private certification holders, the problem of the qualification succeeding process is important matter. Additionally, it is necessary to introduce the certifying system of ISMS(Industrial Security Management System) which is a specialized system for protecting industrial technology. To sum up, when the industrial security management system links the industrial security management certification, industrial security would realize in the companies and research institutions dealing with national key technology. Then, a group synergy effect would occurs.

  • PDF