• Title/Summary/Keyword: ISMS

Search Result 180, Processing Time 0.026 seconds

Personal Information life Cycle Model Considering the Learning Cha racteristics of Artificial Intelligence (인공지능의 학습 특성을 고려한 개인정보 라이프 사이클 모델)

  • Jaeyoung Jang;Jong-Min Kim
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.47-53
    • /
    • 2024
  • The traditional personal information life cycle model, primarily tailored to conventional systems, is inherently unsuitable for comprehending the nuances of personal information flow within artificial intelligence frameworks and for formulating effective protective measures. Therefore, this study endeavors to introduce a personal information life cycle model specifically designed for artificial intelligence (AI). This paper presents a personal information life cycle model suitable for artificial intelligence, which includes the stages of collection, retention, learning, use, and destruction/suspension, along with the re-learning process for destruction/suspension. Subsequently, we compare the performance of these existing models (such aspersonal information impact assessment and the ISMS-P model) with the newly proposed model. This underscores the superiority of our proposed model in comprehensively understanding the personal information flow in AI and establishing robust protective measures.

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.

ISO/IEC JTC1 SC27 WG4 침해관리, 운영 및 대용 국제표준화 동향

  • Jeon, Sang-Hoon
    • Review of KIISC
    • /
    • v.20 no.6
    • /
    • pp.96-99
    • /
    • 2010
  • ISO/IEC JTC1 SC27는 IT 정보보호에 관한 국제표준 제정 활동을 하는 국제기구로서, 다섯 개의 WG(Working Group)으로 구성되어 있으며, 현재 WG4는 WG1의 정보보호관리체계(ISMS), WG5에서 다루어지고 있는 인증(Authentication), 프라이버시(Privacy) 등과 연계하여, 정보보호 관련 국제표준을 개발 및 제정하고 있다. 본 논문은 2010년 10월 4일부터 8일까지 베를린(Berlin)에서 개최한 회의에서 WG4에서 다루어지고 있는 네트워크 보안 국제표준기술 동향과 표준화에 대한 개요를 소개하고, ISO/IEC JTC1 SC27 WG4 Plenary에서 필자가 제안하여 SP(Study Period) 단계로 승인된 표준안건의 동향과 전망에 대해 소개하고자 한다.

의료부분 정보보호 관리체계 개선방안 연구

  • Lee, Jun Hwa;Jo, Hui-Jun;Park, Seong-Gap;Gang, Yun-Cheol
    • Review of KIISC
    • /
    • v.23 no.4
    • /
    • pp.34-40
    • /
    • 2013
  • 의료부분 정보보호의 중요성이 높아감에 따라 의료정보보호 관리와 관련된 체계적인 방안이 필요하게 되었다. 이러한 체계적인 방안을 일반기업의 정보보호 관리체계(ISMS)와 역량성숙도모델통합(CMMI)을 통해 의료정보보호관리 기준, 의료정보보호관리 프로세스, 의료정보보호관리 프로세스 성숙수준으로 구성된 의료정보보호 관리체계를 제시하였다.

클라우드 컴퓨팅 개인정보보호 연구동향과 과제

  • Park, Dae-Ha;Baek, Tae-Suk
    • Review of KIISC
    • /
    • v.21 no.5
    • /
    • pp.37-44
    • /
    • 2011
  • 최근 들어 클라우드 컴퓨터의 도입에 있어 보안 및 개인정보보호가 핵심적인 요구사항으로 주목받고 있으며, 국내외 여러 조직에서는 클라우드 컴퓨팅 환경에서의 개인정보보호의 중요성을 인식하여 전사적이고 체계적인 접근법에 기초한 연구가 진행되고 있다. 본 논문에서는 클라우드 컴퓨팅의 보안을 다룬 NIST SP 800-144 문서를 기반으로 정보보호관리체제 (ISMS)에 대한 국제표준인 ISO 27002의 통제내용음 분석하고 이를 KISA-PIMS의 통제내용과 연결하여 도출하였다. 더불어, IPC 및 WPF등 해외에서 연구한 클라우도 컴퓨팅 개인정보보호 위험 및 요구사항을 KISA-PIMS의 통제목적과 비교 분석하는 한편, 클라우드 컴퓨팅 개인정보보호의 향후 연구 과제를 제시하고자 한다.

DGPS 정보보안에 관한 연구

  • Choe, Dae-Yeong;Kim, Hui-Tae;Gu, Ja-Heon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.10a
    • /
    • pp.353-355
    • /
    • 2013
  • 최근의 사이버공격으로 각 국가기관에서 운영하는 제어시스템의 보안위협이 증가하고 있다. DGPS의 경우도 DGPS 정보시스템을 대상으로 새로운 유형의 공격이 제시되었다. 이에 사전 방어를 위해 체계적으로 정보보호관리체계(G-IMS)를 수립을 제시하였고 이로부터 안전하고 신뢰성 있는 DGPS 서비스를 제공하고자 한다.

  • PDF

ISO/IEC JTC1 SC27의 정보보호관리 국제표준화 동향

  • Kim, Jung-Duk;Lee, Kyung-Seok
    • Review of KIISC
    • /
    • v.18 no.4
    • /
    • pp.1-4
    • /
    • 2008
  • 정보보호관리체계(Information Security Management System:ISMS)는 조직의 정보자산에 적합한 수준의 보호를 제공하고, 원하는 보호수준을 지속 가능하게 할 수 있을 뿐만 아니라, 인증을 통하여 정보보호에 대한 신뢰를 제공하는 등 다양한 이점을 제공한다. 현재 정보보호관리체계에 대한 국제표준은 어느 정도 안정화 단계에 접어든 상태이고, 향후에는 정보통신, 전자정부 등 기반시설을 포함하는 섹터별 정보보호관리체계 수립에 대한 표준화 작업이 본격적으로 수행될 것이다. 본 논문에서는 ISO/IEC SC27 WG1에서 수행하는 정보보호관리체계에 대한 국제표준화 동향을 살펴보고, 정보보호 거버넌스 등 새로운 국제표준화 항목에 대해서 소개한다.

Audit Method for Personal Information Protection in On-line Games (온라인게임에서 개인정보보호 감리 모형)

  • Kim, Hee-Wan;Shin, Joong-Won;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.23-37
    • /
    • 2012
  • Illegal game players' hacking and propagation of malignant code in online game exposes privacy of online game customers. So, online game companies have to support the standardized systems and operations of customers' privacies. Since online game companies implement authentication of information protection, which focuses on assets or physical, systemic security, they need a more professional system that is related to protection of individual privacy. We analyzed the individual information protection system, which includes ISO27001, ISMS of KISA, GMITS, ePrivacy, online game privacy protection guide, and BS10012. Using the suggested systems, we proposed the systemic tools that measure the level of individual information protection, which includes process and check items of each phase.

An Audit Model for Information Protection in Smartwork (스마트워크 기반의 정보보호 감리 모형)

  • Han, Ki-Joon;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.229-239
    • /
    • 2014
  • Smartwork technology, using teleworking, smartwork centers and mobile terminal, provides a flexible work environments without constraints of time and space. Smartwork system to increase the work efficiency has the information protection threats according to their convenience. Thus, in order to build smartwork, it is proper to provide information protection audit to help ensure the information protection. In this paper, we have proposed an infortaion protection audit model at the practical and technical level for building a smartwork environment. We were classified as a terminal, network and server area for information protection, and derived a professional information protection check items. Further, by establishing a smartwork information protection audit time to map ISMS control items, we have proposed an audit model so that it is possible to improve the security and efficiency. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check items correspond with the purpose of the smartwork information protection audit to auditors and IT specialists. As the result, this study was 97% satisfaction out of 13 check items.

A Study for Limitations and Improvement of Information Security Management System (정보보호 관리의 한계점과 개선방안에 관한 연구)

  • Lee, Sujin;Choi, Sang-Yong;Kim, JaeKyoung;Oh, ChungShick;Seo, Changho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.563-570
    • /
    • 2014
  • As information security is becoming more important today, efforts in managing information security more efficiently is becoming greater. Each department such as Ministry of Security and Public Administration, Ministry of Science, Ministry of Education, National Intelligence Service, etc. is established screening criteria for information security and conducted the evaluation. Various information security certification and evaluation for public institutions effectively help to improve the level of information security. However, there are limitations of efficient security management because the examination to be performed frequently by each department. In this paper, we analyze screening criteria of the information security management that is being conducted in the public institutions. We also present limitations of information security management and the direction of improving the limitations.