• 제목/요약/키워드: IT Security

검색결과 11,488건 처리시간 0.057초

전력 IT Cyber Security 연구 동향 (Study Tendency of Cyber Security in Power IT Area)

  • 김학만;박재세;김상남
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 제39회 하계학술대회
    • /
    • pp.205-206
    • /
    • 2008
  • Electrical Power System is very important infrastructure in the country. The functions of control, monitoring and so on in the electrical power system are implemented by information technologies(IT) through cyber space. Recently, many activities for enhancing cyber security in the world. In this paper, we introduce the study tendency of cyber security in power IT areas.

  • PDF

지식 네트워크에 근거한 정보보호 점검기준 관계분석 (Correlation Analysis in Information Security Checklist Based on Knowledge Network)

  • 진창영;김애찬;임종인
    • 한국전자거래학회지
    • /
    • 제19권2호
    • /
    • pp.109-124
    • /
    • 2014
  • 정보보안 인식과 중요성이 시대적으로 고조됨에 따라 각 산업부문별로 조직의 정보자산을 보호하기 위해 정보보호 점검기준을 기반으로 한 정보보호 평가 인증 등의 제도가 마련되어 시행되고 있다. 본 논문은 정보보호 점검기준 간의 문맥적인 유사성과 차이점에 대해 규명하기 위하여 지식네트워크를 이용하여 분석한 결과로 ISMS와 PIMS, 금융 IT부문 경영실태평가, 금융 IT부문 보호업무 모범규준, 정보보안 관리실태 평가 상에 나타난 점검기준간의 관계는 다음과 같이 설명할 수 있다. 첫째, 본 논문에서 연구된 정보보호 점검기준은 공통적으로 정보시스템 및 정보통신망에서의 정보자산의 보호와 침해대응, 운영통제에 관한 부분을 다루고 있다. 둘째, 금융권에서는 앞선 공통부분 외에도 IT 경영 및 감사활동에 관한 적정성을 상대적으로 중요하게 다루고 있다. 셋째, ISMS의 점검기준은 PIMS, 금융 IT부문 경영실태평가, 금융 IT부문 보호업무 모범규준, 정보보안 관리실태 평가의 대부분의 내용을 포함하고 있는 것으로 확인된다.

국방조직의 정보보호 평가 방법론 개발 (Development of the Information Security Methodology for Defense Organization)

  • 조성림;최인수;박지훈;신우창
    • 한국IT서비스학회지
    • /
    • 제12권4호
    • /
    • pp.77-90
    • /
    • 2013
  • As Cyber threats are rising, the scope of information Security (IS) is extending from technical protection of a single information system to organizational comprehensive IS capability. The ministry of National Defense (MND) has established the IS evaluation for defense organization in 'the Directive for Defense Informatization Affairs.' However, no information about an evaluation method, process and organization is provided. We surveyed information security management system (ISMS) and related best practices in public sector and other countries, and analysed the military information security affairs. Thus, this paper recommends the IS evaluation method and process. The trial IS evaluation is in progress this year and the MND will expand this IS evaluation to the entire organization.

Strengthening Authentication Through Content Centric Networking

  • Kim, Sung-Jin;Park, Jae-Kyung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권4호
    • /
    • pp.75-82
    • /
    • 2017
  • While the internet has evolved in terms of information sharing and efficiency, it is still prone to security attacks and remains vulnerable even when equipped with a security mechanism. Repeated patching against hacks involves excessive wear of system equipment and high costs. Methods of improving network security include the introduction of security equipment and network partitions, but they have not been fully effective. A fundamental solution is the Operation Content Network (OCN), which enables the strengthening of authentication. In this paper, Instead of following the existing TCP/IP system, OCN establishes an immunity-based security system through content-centric communications. Data transmission occurs over a Content Centric Network (CCN), which is provided with a protocol verified by the CCNx group. Areas protected by OCN rely only on CCN for communication without using any IP. As such, it defends the system against unknown attacks, including zero-day attacks.

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권8호
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Combining Encryption and Preservation in Information Security to Secure Sending a Message

  • Nooh, Sameer
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.285-291
    • /
    • 2022
  • With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.

CMTO: 디지털 자산 시대의 부동산 토큰 증권 활성화 방안 연구 (CMTO: An Inquiry into the Activation for Real Estate Security Token of the Digital Asset Hour)

  • 이정민;이민혁
    • 한국IT서비스학회지
    • /
    • 제22권4호
    • /
    • pp.81-95
    • /
    • 2023
  • The emergence of Security Token has revolutionized the way assets are traded, bringing efficiency, transparency, and accessibility to the market. However, the Real Estate Security Token market faces challenges, particularly in terms of liquidity. The CMTO(Collateralized Mortgage Token Obligation) model addresses this issue by introducing a novel approach that combines the benefits of NFT(Non-Fungible Token), STO(Security Token Offering), and CMO(Collateralized Mortgage Obligation) techniques to enhance liquidity and promote investment in Real Estate Security Token. The CMTO framework functions by allowing DABS token investors to leverage their tokens as collateral for loans. These token-collateralized loans are pooled together and form the basis for issuing Sequential CMO named CMTO. The CMTO represent a diversified portfolio of token-collateralized loans, providing investors with options based on their financial goals and risk preferences. By implementing CMTO, the Real Estate Security Token market can overcome liquidity challenges, attract a broader range of investors, and unlock the full potential of digital assets in the real estate industry.

평화선의 안보적 성격에 관한 역사적·국제법적 고찰 (Historical and International Legal Study on Security Characteristics of the Peace Line)

  • 양재영
    • Strategy21
    • /
    • 통권44호
    • /
    • pp.291-322
    • /
    • 2018
  • This research aims to cast light upon security characteristics of the Peace Line, which have been underestimated. To understand maritime order and maritime security policy of the Republic of Korea between 1950 and 1970, it is necessary to analyze the Peace Line as line of defence and to investigate its character This research begins with analyzation of historical facts and investigation on security characteristics of the Peace Line. It goes further to examination of legal justification of the Peace Line, which was one of international legal issues of the period, principally regarding its security characteristics. As results of the study, it could be said that the security characteristics of the Peace Line was the line of defensive waters, which set its goal mainly to prevent infiltration of communist spies. The Peace Line had practical effect as it functioned as a base line of the ROK Navy to take anti-spy operation. At the early phase of the Korea-Japan Negotiation, the Korea delegation interpreted significance of the Peace Line passively. After abrogation of Clark Line, the delegation, however, became positive to maintain the Peace Line and its security characteristics. Security characteristics of the Peace Line was recognized again, as it became the base line of special maritime zone which was made in 1972. Through analysis on international law, it is concluded that the Peace Line was fair as a part of the right of self-defense against indirect aggression. North Korea attempted indirect aggression mainly from sea way, and these might undermine peace and cause urgent and unjust damage on the ROK. Thus the ROK's action of anti-spy operation through the Peace Line can be justifiable as considering the right of self-defence. Also the Peace Line accorded with principles of necessity, immediacy and proportionality. As it was argued on the above, the Peace Line as line of defence was one of the most significant factor in the ROK's maritime security history from the Hot war against communist forces to Cold war period after Korean War and must not be underestimated.

소규모 IT 서비스 기업 비즈니스 특성을 고려한 보안 관리모델 실증연구 (An Empirical Study on Security Management Model for Small IT Service Business)

  • 김양훈;나영섭;장항배
    • 경영정보학연구
    • /
    • 제14권3호
    • /
    • pp.131-141
    • /
    • 2012
  • IT 고도화에 따라 정보 유출 및 침해 사고가 날로 증가하고 있다. 이에 따라 대다수의 기업들은 보안 위한 투자를 확대하고 있지만, 여전히 정보 유출의 취약점에 노출되어 있다. 소규모 IT 서비스 기업은 대기업에 비하여 상대적으로 한정된 자원과 인력으로 기업 활동을 수행하고 있으며, 실제 가치를 창출하는 방법에 따라 SI/SM, DB, IR, IP 업종으로 분류되고 있다. 그러나 현재까지 소규모 IT 서비스 기업을 위한 보안관리에 관한 연구는 소규모라는 기업규모와 IT 서비스라는 비즈니스 특성을 고려한 핵심 정보자산식별에 머물러 있는 상황이다. 따라서 본 연구에서는 소규모 IT 서비스 기업의 보안대책 수립을 위한 보안관리 모델을 설계하였다. 그리고 설계된 보안관리 모델에 대해 비즈니스 특성을 고려한 소규모 IT 서비스 기업을 대상으로 실증분석을 수행하고 분석된 결과를 바탕으로 추진전략을 제시하였다.

  • PDF

보안사고 예보시스템 (Forecast System for Security Incidents)

  • 이동근;임종인
    • 전자공학회논문지
    • /
    • 제53권6호
    • /
    • pp.69-79
    • /
    • 2016
  • 기업은 대부분의 경우 보안사고가 발생하면 내부 대응절차에 따라 신속한 사고처리에 집중하고 사고원인, 문제점 및 조치결과를 최고 경영진에게 보고하면서 사고를 마무리한다. 또한 외부에서 발생한 보안사고는 그때마다 관심을 가지고 적극적으로 내부와 연결하여 문제점을 발굴하고 조치를 하는 경우와 외부의 문제로 치부하며 잠시 관심정도만 가지고 넘기는 경우도 있을 것이다. 기업은 보안사고 발생 시점에 관심과 역량을 집중하여 대응하는 것 뿐만 아니라 보안사고가 발생하지 않도록 지속적인 사고예방 활동을 하는 것이 중요하며 이를 위해 체계적이며 일관성 있고 시스템적인 방법이 제공되어야 한다. 이와 같은 목적에서 본 논문에서는 보안사고 예보시스템을 제안한다. 보안사고 예보시스템은 기업의 내부에서 일어난 직접 보안사고 뿐만 아니라, 외부에서 발생한 간접 보안사고로부터 향후 보안사고 예측에 도움이 되는 사고발생 유발인자들을 모아서 데이터베이스화하고 기업에서 가지고 있는 축적된 사고 경험과 대응 프로세스들을 시스템화하여 상호작용을 하도록 만드는 것이다. 보안사고 예보시스템은 잠재적으로 발생할 수 있는 사고의 예방조치활동에 효과적인 대안이 될 수 있을 것이다.