• 제목/요약/키워드: Information Security Management System

검색결과 1,887건 처리시간 0.026초

중소기업의 특성을 고려한 정보보호 관리체계 평가 모델 개선 (Improvement of Information Security Management System Evaluation Model Considering the Characteristics of Small and Medium-Sized Enterprises)

  • 김이헌;김태성
    • 한국IT서비스학회지
    • /
    • 제21권1호
    • /
    • pp.81-102
    • /
    • 2022
  • Although more than 99% of all Korean companies are small and medium-sized enterprises (SMEs), which accounts for a large part of the national economy, they are having difficulties in securing information protection capabilities due to problems such as budget and manpower. On the other hand, as 97% of cyber incidents are concentrated in SMEs, it is urgent to strengthen the information protection management and response capabilities of SMEs. Although the government is promoting company-wide information security consulting for SMEs, the need for supplementing it's procedures and consulting items is being raised. Based on the results of information security consulting supported by the government in 2020, this study attempted to derive improvement plans by interviewing SME workers, information security consultants, and system operators. Through the research results, it is expected to create a basis for SMEs to autonomously check the information security management system and contribute to the reference of related policies.

금융회사를 위한 기업 정보보호 포털(EISP) 시스템의 설계 및 구현 (Design and Implementation of Enterprise Information Security Portal(EISP) System for Financial Companies)

  • 김도형
    • 융합보안논문지
    • /
    • 제21권1호
    • /
    • pp.101-106
    • /
    • 2021
  • 금융회사는 금융정보를 보호하기 위해 정보보호 전략 및 계획을 수립하고 정보보호 관리체계 운영, 정보보호 시스템 구축 및 운영, 취약점 점검, 보안관제 등 다양한 정보보호 활동을 하고 있다. 본 논문에서는 금융회사에서 수행 중인 각종 정보보호 활동에 대한 가시성을 확보하고 통합 관리할 수 있는 금융회사를 위한 기업 정보보호 포털 시스템을 제시하고자 한다. 기업 정보보호 포털 시스템은 정보보호 부서의 활동을 시스템화하여 정보보호 활동이 정보보호 부서만의 활동이 아닌 최고경영자부터 임직원까지 참여할 수 있도록 통합된 환경을 제공한다. 이를 통해 최고경영진이 기업경영에 정보보호를 반영할 수 있는 정보보호 거버넌스로도 활용할 수 있다.

개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구 (Personal Information Management System (PIMS) improvement research using cloud computing security)

  • 정혜인;김성준
    • 디지털산업정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권6호
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

정보보호관리체계를 통한 기업 및 정부 정보보안 강화 방안에 관한 연구 (A Study on Enterprise and Government Information Security Enhancement with Information Security Management System)

  • 박청수;이동범;곽진
    • 한국항행학회논문지
    • /
    • 제15권6호
    • /
    • pp.1220-1227
    • /
    • 2011
  • IT 기술이 발전함에 따라 생활 자체가 지식 혹은 정보 기반 체제로 변화되어 가고 있다. 하지만 IT 기술의 발전 이면에는 사이버 공격 기술을 향상시키고 있으며, 이에 따라 DDoS 대란 등의 사이버 테러가 빈번히 발생하여 주요 자료가 유출되고 있다. 또한 다양한 공격 경로를 통해 정보시스템으로 유입된 악성코드로 인해 기업의 업무 손실 및 정보 자산에 대한 피해가 증가하고 있다. 이러한 환경에서 조직 및 사용자가 보존해야 할 정보 자산을 관리적, 기술적, 물리적 체계를 수립하는 정보보호관리체계를 기반으로 지속적인 점검을 수행하여 조직 내의 위기관리 프로세스가 구축되어야 한다. 또한 제도 및 프로세스의 수립 외에도 악의적인 악성코드가 내부로 유입되는 위협으로부터 내부 자산을 보호하기 위해 정보보호제품을 도입하여야 한다. 따라서 본 논문에서는 정보보호관리체계 및 정보보호제품의 도입 방안을 통해 기업 및 정부 정보보안을 강화하는 방안에 대하여 제안하고자 한다.

보안환경에서 이질형 시스템의 전역 복구 관리 프로토콜 (Global Recovery Management Protocol for Heterogeneous System in Security Environments)

  • 정현철
    • 디지털산업정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.51-59
    • /
    • 2009
  • Many failures are due to incorrectly programmed transactions and data entry errors. System failure causes the loss or corruption of the contents of volatile storage. Although global processing protects data values to detect direct or indirect information effluence, security environments are very important in the recovery management of heterogeneous systems. Although transaction can't control system fault, the restart for the system can cause information effluence by low bandwith. From various faults, it is not easy to maintain the consistency and security of data. This paper proposes recovery management protocols to assure global multilevel secure one-copy quasi-serializability in security environments of heterogeneous systems with replicated data and proves its correctness. The proposed secure protocols guarantee the reliability and security of system when the system fault is happened.

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • 제16권3호
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF

A Continuous Evaluation Processes for Information Security Management

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • 제23권3호
    • /
    • pp.61-69
    • /
    • 2016
  • Growing information threats have threatened organization to lose information security controls in these days. Many organizations have accepted the various information security management systems does mention necessity of a continuous evaluation process for the executions of information security management in a theoretical aspect. This study suggests a continuous evaluation process for information security management reflecting the real execution of managers and employees in organizations.

보안 시스템의 자동 관리를 위한 보안 네트워크 관리 구조의 설계 및 성능 분석 (Design and Performance Analysis of Security Network Management Architecture for Auto-managing Security Systems)

  • 안개일
    • 한국통신학회논문지
    • /
    • 제30권8B호
    • /
    • pp.525-534
    • /
    • 2005
  • 본 논문에서는 정책 기반의 네트워크 관리 구조를 확장하여, 보안 네트워크의 구성의 자동화를 지원할 수 있는 보안 네트워크 관리 구조와 방법을 제안한다. 제안하는 구조 및 방법은 보안 관리 서버가 보안 시스템의 역할과 능력 그리고 보안 정책의 역할과 시간 정보를 기반으로 하여 보안 시스템이 필요로 하는 최적의 보안 정책을 자동 결정하고 보안 정책 룰을 가장 효과적이고 효율적으로 실행할 수 있는 보안 시스템을 자동 결정할 수 있게 한다 본 논문에서는 기존의 네트워크 시스템과 보안 시스템을 통합 제어할 수 있는 SNMP 프로토콜기반의 보안 네트워크 토폴러지 맵 자동 생성기도 제안한다. 본 논문에서 제안된 구조와 방법의 우수성을 보여주기 위하여 공격에 대한 자동 대응 기능을 시뮬레이션하고 그 성능을 평가한다.

텍스트마이닝을 이용한 정보보호 연구동향 분석 (Research Trends Analysis of Information Security using Text Mining)

  • 김태경;김창식
    • 디지털산업정보학회논문지
    • /
    • 제14권2호
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.