• 제목/요약/키워드: IT security

검색결과 11,393건 처리시간 0.033초

보호동기이론에 기반한 조직구성원의 보안강화 : 보안정책에 대한 신뢰와 보안스트레스의 매개효과를 중심으로 (Security Enhancement of Public Organization Members Based on the Protection Motivation Theory)

  • 최희영;강주영
    • 한국IT서비스학회지
    • /
    • 제19권6호
    • /
    • pp.83-95
    • /
    • 2020
  • "I think security is only trying to make it uncomfortable." "10% of my work is entering IDs and passwords, such as boot passwords, mobile phone authentication numbers, etc." As reflected in the complaint above, stress caused by information security among organizations' members is increasing. In order to strengthen information security, practical solutions to reduce stress are needed because the motivation of the members is needed in order for organizations to function properly. Therefore, this study attempts to suggest key factors that can enhance security while reducing information security stress among members of organizations. To this end, based on the theory of protection motivation, trust and security stress from information security policies are set as mediating factors to explain changes in security reinforcement behavior. Furthermore, risk, efficacy, and reaction costs of cyberattacks are considered as prerequisites. Our study suggests a solution to the security reinforcement problem by analyzing the factors that influence the behavior of members of organizations. In turn, this can raise protection motivation among members.

정보보호 거버넌스 프레임워크 개발에 관한 연구 (A Research on the Development of Information Security Governance Framework)

  • 이성일;황경태
    • Journal of Information Technology Applications and Management
    • /
    • 제18권2호
    • /
    • pp.91-108
    • /
    • 2011
  • Enormous losses of shareholders and consumers caused by the risks threatening today's business (e.g., accounting fraud and inside trading) have ignited the necessity of international regulations on corporate ethics and internal control, such as Basel II and SOX. Responding to these regulations, companies are establishing governance system, applying it consistently to the core competency of the company, and increasing the scope of the governance system. Recently occurred security related incidents require companies to take more strict accountability over information security. One of the results includes strengthening of legislation and regulations. For these reasons, introduction of information security governance is needed. Information security governance governs the general information security activities of the company (establishment of information security management system, implementation of information security solutions) in the corporate level. Recognizing that the information security is not restricted to IT domain, but is the issue of overall business, this study develops information security governance framework based on the existing frameworks and systems of IT governance. The information security governance framework proposed in the study include concept, objective, and principle schemes which will help clearly understand the concepts of the information security governance, and execution scheme which will help implement proper organization, process and tools needed for the execution of information security governance.

국내 정보보호 교육 표준 프레임워크 개발; 연령 및 직무 맞춤의 이원화(Two-track) 교육과정을 중심으로 (Development of a Standardized Framework for Domestic Information Security Education; Focusing on a Two-Track Curriculum Customized by Age and Job)

  • 박민정;이기혁;채상미
    • 정보보호학회논문지
    • /
    • 제31권5호
    • /
    • pp.1083-1095
    • /
    • 2021
  • 최근 사용자의 인터넷 의존성 증가와 각종 IT 디바이스의 보급과 확산에 따라, 과거에 비하여 개인 생활 전반에 정보보호가 미치는 영향력이 확대되었다. 이와 더불어 보안을 위협하는 침해 요인들이 지속적으로 복잡, 다양해지고 가짜뉴스 확산, 온라인 신분 도용, 사이버 불링 등을 비롯한 개인의 안전한 온라인 환경을 위협하는 요소들이 사회적으로 증가함에 따라, 정보보호 전문 인력 양성의 필요성이 증가하고 있다. 나아가 기업의 정보보호 업무 종사자 이외에 사회의 모든 구성원이 정보보안의 위협에서 자유로울 수 없게 됨에 따라, 개인의 정보보호에 대한 인식 제고와 자발적인 정보보호 행동을 유도하기 위한 다양한 정보보호 교육 과정의 마련이 필요하다. 따라서, 본 연구에서는 현재 이루어지고 있는 국내·외 정보보호 교육 과정의 현황과 특징에 대하여 분석한다. 이를 통하여 정보보호 교육 필요성과 교육 체계 수립의 전략을 모색하여 본 연구에서는 국내 환경에 적용 가능한 정보보호 교육 표준 프레임워크를 제시하고자 한다. 이는 개인의 정보보호 인식과 지식 수준을 제고하여 국내 정보보호 전문 인력 양성과 더불어 개인과 조직, 사회 전반의 정보보안 수준을 향상시켜 국가 경쟁력 향상에 기여할 것으로 판단된다.

국내·외 정보보호 관리체계기반의 인적보안의 이론적 비교연구 (A Theoretical Comparative Study of Human Resource Security Based on Korean and Int'l Information Security Management Systems)

  • 나현대;정현수
    • 중소기업융합학회논문지
    • /
    • 제6권3호
    • /
    • pp.13-19
    • /
    • 2016
  • ICBM(IoT, Cloud, Bigdata, Mobile)의 다양한 융합적 환경에서 IT기술의 발전이 진화되어 기존에 없던 다양한 새로운 정보보안의 위협이 생기고 있다. 또한 주요 금융권과 정부 공공기관을 대상으로 대형 정보유출 사고가 급증하면서 인적 보안의 중요성을 강조하고 있다. 이에 체계적인 정보보호 관리체계 구축은 해킹 및 보안 침해사고가 발생하는 경우 신속하게 대응하여, 피해 규모를 최소화 한다. 본 논문에서는 ISO27001, NIST 800-53, K-ISMS, COBIT, Cyber Security Framework등 주요 정보보호 관리체계에 나타난 인적보안 통제항목의 이론적 비교, 분석을 수행함으로써 보안사고의 주요 원인인 인적보안 문제에 관하여 효과적인 통제 방안과 시사점을 제시하였다.

정보보호 정책의 전유과정이 정보보호 준수의도에 미치는 영향에 대한 탐색적 연구 : 콜센터와 병원 종사자들을 중심으로 (Exploring Effects of Appropriation on the Compliance Intention to Information Security Policy)

  • 오진욱;백승익
    • 한국IT서비스학회지
    • /
    • 제19권5호
    • /
    • pp.15-31
    • /
    • 2020
  • This study explores the process in which employees adopt the information security policy. The results of this study, which surveyed 234 employees in three call centers and four hospitals, show that the employees adapt the information security policy through the social structuring process suggested by the AST model. In particular, this study identifies roles of two appropriation activities (FOA : Faithfulness of Appropriation & COA : Consensus on Appropriation) observed in the social structuring process. Regarding to the interactions between the two appropriation activities, FOA, which indicates a better understanding of the information security policy, is examined as a more critical factor than COA, which indicates the degree of agreement among employees about how to use it. FOA not only has a direct effect on compliance intention toward the information security policy, but also indirectly through COA, whereas COA has only a indirect effect through FOA. This result shows that, in order for a company to successfully implement a new information security policy, it is important for employees to understand its purpose and intention. The adaption of information security policy through two appropriation activities is observed in both hospitals and call centers, but due to the different working environments, there were differences in the preceding variables affecting the appropriation activities. The results of this study are expected to provide guidelines for companies who want to successfully adopt information security policy.

한국 민간경비 시장의 과제와 활성화 도입방안 (A Research on Extension Device of Korea Private Security Market)

  • 박준석
    • 시큐리티연구
    • /
    • 제15호
    • /
    • pp.173-198
    • /
    • 2008
  • 한국의 민간경비산업의 영역을 확대하기 위해서는 다음과 같은 방안을 제시하고자 한다. 첫째, 민간조사업법의 영역을 민간경비와 접목하여 확대해야 할 것이다. 둘째, 요인경호법, 대테러법, 대통령 경호실법에 관련하여 민간경비의 역할을 모색할 필요가 있을 것이다. 셋째, 산업보안 관련법 중 산업기술의 유출 방지 및 보호지원에 관한 법률안이 통과됨으로써 기업보안과 민간경비산업 분야의 접목을 통한 민간경비의 다양성과 세분화, 복합화가 필요할 것이다. 넷째, 시큐리티 컨설팅 즉, 통합시스템 관리 서비스를 위해 민간경비업체의 투자와 전문분야의 양성 및 사업의 확대방안의 연구가 모색되어져야 할 것이다. 다섯째, 청원경찰법과 경비업법의 통합성에 대해서 교육과정과 목적, 의무가 큰 차이가 없으므로 정보기관의 협조를 통한 통합화를 적극적으로 추진할 필요가 있다고 사료된다. 여섯째, 민간경비 서비스에 대한 경찰 및 일반시민, 그리고 민간 경비원들 간의 의식전환이 이루어져야 한다. 일곱째, 경비협회의 역할도 중요하다고 사료된다. 마지막으로 경찰청과 경비협회의 의사소통에 관한 문제에 대해서도 정보수집, 대처능력이 권력의 힘에서만 볼 것이 아니라 이제는 경찰청뿐만 아니라 국가기관, 국정원, 검찰, 경호실, 군 등의 기관들과의 상호협력방안을 모색할 필요가 있다고 생각한다.

  • PDF

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권4호
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

네트워크 보안시스템 보안성 평가 연구 (A Study on Evaluation Technique of Network Security System)

  • 김점구
    • 융합보안논문지
    • /
    • 제9권2호
    • /
    • pp.33-39
    • /
    • 2009
  • 네트워크 보안시스템을 단일 요소로 구분하여 점검하고 있는 현실의 문제점을 개선하기 위해 본 논문은 네트워크 보안시스템 점검은 취약성을 찾는 것이 아니라, 네트워크 보안시스템을 이루는 각 보안장비가 유기적으로 잘 작동하는지 종합적으로 점검하는 것임에 착안 네트워크 보안시스템을 점검하는 자동화 방법을 제안하고 이를 구현하였다.

  • PDF

정보사회에 있어서 '안전국가' 법규의 정립방향에 관한 소고 (A Study on the Direction of the Formulation of "Safe Country" Laws and Regulations due to the Development of Information Technology)

  • 김현경
    • 한국IT서비스학회지
    • /
    • 제12권3호
    • /
    • pp.151-163
    • /
    • 2013
  • It is no doubt that information technology is the key factor of national safety. Information technology is positively useful for national security such as crime prevention and detection, criminal investigation, disaster management, and national defense. However, it might be a threat to the security as we saw in the examples such as '3.4 DDoS attacks' and 'Nong-hyup Computer Network Failure.' Although the effect that information technology makes upon the national security is immense, the current legal system does not reflect these changes well. National security should be kept during 'prevention-response-recovery' process regardless it is in the online on offline. In addition, public administration for national security should be based on laws. However, the current legal system is lack of legislative basis on cyber and physical disaster, and the laws on the response to disaster might cause confusing. Therefore, this study examines the limitation of the current legal system on national security, and suggests directions for the development of the system based on the new establishment of the legal concept for 'national security'.

공공부문 정보보호 교육과정의 평가 : 사례 연구 (Evaluation of Public Information Security Training Programs : A Case Study)

  • 이송하;전효정;김태성
    • 한국IT서비스학회지
    • /
    • 제19권1호
    • /
    • pp.173-185
    • /
    • 2020
  • It is very important to evaluate training because it can systematically grasp the current status of training. Evaluation includes getting ongoing feedback from the learner, trainer and learner's supervisor, to improve the quality of the training and identify if the learner achieved the goals of the training. It also provides a justification for the implementation of training. Nonetheless, there is a lack of studies that attempt to evaluate information security training programs. In this study, we utilize the Philips model to evaluate the public training programs for the people who are in charge of the information security duties in the public sector and propose the training improvement plans. Research result has shown that it is necessary to evaluate the level of the trainees in advance and conduct training programs according to the information security skill level. In addition, it needs to conduct training according to duties such as information security management, information security operate and maintain. The limitation of this study is that each education program was not assessed individually because this study had developed an evaluation tool that could be used comprehensively.