• Title/Summary/Keyword: Information Security Strategy

Search Result 479, Processing Time 0.025 seconds

A Study on the Information Security Measures Influencing Information Security Policy Compliance Intentions of IT Personnel of Banks (은행 IT 인력의 정보보호 정책 준수에 영향을 미치는 정보보호 대책에 관한 연구)

  • Shim, Joonbo;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.2
    • /
    • pp.171-199
    • /
    • 2015
  • This study proposes the practical information security measures that help IT personnel of banks comply the information security policy. The research model of the study is composed of independent variables (clarity and comprehensiveness of policy, penalty, dedicated security organization, audit, training and education program, and top management support), a dependent variable (information security policy compliance intention), and moderating variables (age and gender). Analyses results show that the information security measures except 'clarity of policy' and 'training and education program' are proven to affect the 'information security policy compliance intention.' In case of moderating variables, age moderated the relationship between top management support and compliance intention, but gender does not show any moderating effect at all. This study analyzes information security measures based solely on the perception of the respondents. Future study may introduce more objective measurement methods such as systematically analyzing the contents of the information security measures instead of asking the respondents' perception. In addition, this study analyzes intention of employees rather than the actual behavior. Future research may analyze the relationship between intention and actual behavior and the factors affecting the relationship.

Developing Pairs Trading Rules for Arbitrage Investment Strategy based on the Price Ratios of Stock Index Futures (주가지수 선물의 가격 비율에 기반한 차익거래 투자전략을 위한 페어트레이딩 규칙 개발)

  • Kim, Young-Min;Kim, Jungsu;Lee, Suk-Jun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.37 no.4
    • /
    • pp.202-211
    • /
    • 2014
  • Pairs trading is a type of arbitrage investment strategy that buys an underpriced security and simultaneously sells an overpriced security. Since the 1980s, investors have recognized pairs trading as a promising arbitrage strategy that pursues absolute returns rather than relative profits. Thus, individual and institutional traders, as well as hedge fund traders in the financial markets, have an interest in developing a pairs trading strategy. This study proposes pairs trading rules (PTRs) created from a price ratio between securities (i.e., stock index futures) using rough set analysis. The price ratio involves calculating the closing price of one security and dividing it by the closing price of another security and generating Buy or Sell signals according to whether the ratio is increasing or decreasing. In this empirical study, we generate PTRs through rough set analysis applied to various technical indicators derived from the price ratio between KOSPI 200 and S&P 500 index futures. The proposed trading rules for pairs trading indicate high profits in the futures market.

Decision Making on Standardization Strategy for Personal Information Security Using Importance-Performance Analysis (중요도-수행도 분석을 이용한 개인정보 보호기술 표준화 추진전략)

  • Koo, Kyoung-Cheol;Woo, Hoon-Shik;Jo, In-June
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.4
    • /
    • pp.145-152
    • /
    • 2010
  • Under limited resources such as budgets and experts, it is necessary to make decisions for promotion strategy of standardization work items in Information and Communication Technologies (ICTs). This paper focuses on a method of setting standardization promotion strategies for each item of personal information security standardization. As a decision making tool, the Importance Performance Anaysis (IPA) is applied and analyzed to the decision processes. The results are showed and illustrated for useful inputs to practical policy making in the field of standardization activities.

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

The Security Policy for Big data of US Government (미정부의 빅데이터를 위한 보안정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.403-409
    • /
    • 2013
  • This paper review about big data policy and security issue of US government. It is introduced Big data R&D initiative strategy and plan, NITRD program, and big data strategy of government. It is presented operation environment of big data in US government, big data information for military operation, major research organization and topic, security guideline and so on.

Applying a Quantitative Model on Information System Security Audit Evaluation for Improving Auditing Quality (정보시스템 감리품질향상을 위한 보안감리평가에의 정량화모델 적용 연구)

  • 김동수;김현수
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.45-64
    • /
    • 2004
  • Many researchers have proved that information systems auditing is a very effective tool for improving information systems quality. However, information system auditing in Korea still includes many subjective judgements. This study deals with applying a quantitative model to improve information system auditing quality on security domain. First of all, we have looked at previous researches on information systems audit, especially on security audit. Based on this survey, we have come up with solutions to improve the evaluation efficiency on security audit. We have merged the security audit guidelines of NCA and KISA, and developed a quantified evaluation scheme. We have proved the validity of this model by interviews with experts and by case studies.

  • PDF

A Study on the Information Security Technical Architecture focusing on the Primary Defense Information Infrastructure (국방주요정보통신기반시설 중심의 정보보호기술구조 연구)

  • Choi, Ji-Na;Nam, Kil-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.1 s.24
    • /
    • pp.80-88
    • /
    • 2006
  • The purpose of this thesis is to research and propose a practical Information Security Technical Architecture on Primary Defense Information Infrastructure with regard to requirement of information security. The scope of this research is limited to national defense information master plan & security rule, and U.S. DoD's IATF is used to plan a detailed structure. The result of this research can be used as a guide book for providing security for Army IT infrastructure now and in the future as well as to devise a plan for research and development in information protection technology.

INFORMATION AND COMMUNICATION TECHNOLOGIES AS A TOOL OF STRATEGY FOR ENSURING THE HIGHER EDUCATION ADAPTABILITY TO THE DIGITAL ECONOMY CHALLENGES

  • Kholiavko, Nataliia;Popelo, Olha;Bazhenkov, Ievgen;Shaposhnykova, Iryna;Sheremet, Oleh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.187-195
    • /
    • 2021
  • The intensification of the processes of the digital economy development is leading to the transformation of the higher education system. Universities are forced to digitalize their own educational, research, international, marketing, financial and economic activities in order to maintain a competitive position in the global market of educational services. The purpose of the article is to study the role of information and communication technologies in the development of the higher education system and to ensure its adaptability to modern challenges of digital economy. To achieve this goal, methods of content analysis, logical generalization, systematization and a structural-functional method are used. In the article, the authors substantiate the urgency of forming a holistic strategy to ensure the adaptability of higher education to the challenges of digital economy. In the structure of this strategy, the information-technological block is singled out and described. The authors specified a set of positive synergetic effects from the introduction of modern information and communication technologies in the activities of universities. The main information threats to the digitalization of higher education related to the protection of personal data and university systems from cyberattacks and fraudulent schemes are identified. In conclusion, the authors detail the measures for the strategy implementation to ensure the adaptability of higher education to digital economy.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.6
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.