• Title/Summary/Keyword: Information security system evaluation

Search Result 435, Processing Time 0.026 seconds

A Design of Evaluation Tool for Information Security System (정보보호 시스템 평가 도구 설계)

  • 정연서;김환국;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.669-672
    • /
    • 2003
  • Computing and Networking technologies are rapidly developed. A lot of hacking events are occurring. As a result, people have a interesting for security in these days. Network security systems have come to be widely used in our networks. But, objective testing method to evaluate network sorority system is not established. Therefore we have difficulties that select a system. In this paper, we investigate evaluation methods for network sorority systems(Firewall, IDS, IPS etc.) and, design a evaluation tool for network security systems.

  • PDF

A Study on Certification System for Assurance of Secure Information Security Product Development (안전한 정보보호제품 개발 보증을 위한 인증 제도에 관한 연구)

  • Kang, Soo-Young;Park, Jong-Hyuk
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.247-252
    • /
    • 2010
  • According to IT technology has evolved, a lot of information are moving through network. The correct internet users can obtain useful information. But incorrect users expose information and cause various damage for malicious purpose. To solve this problem, various information security products are being developed. For development of secure information security product, the development process should be secure. Also evaluation system is being used about product evaluation and security module for the assurance of secure product. In this paper, we proposed assurance system for secure development of information security product. Therefore this paper proposed more secure product development and assurance scheme.

A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine (IP Security 엔진을 위한 규칙기반 보안평가 시스템의 설계 및 구현)

  • Gwon, Hyeok-Chan;Hyeon, Jeong-Sik;Kim, Sang-Chun;Na, Jae-Hun;Son, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.367-374
    • /
    • 2002
  • IPsec offers not odd Internet security service such as Internet secure communication and authentication but also the safe key exchange and anti-replay attack mechanism. Recently IPsec is implemented on the various operating systems. But there is no existing tool that checks the servers, which provide IPsec services, work properly and provide their network security services well. In this paper, we design and implement the rule based security evaluation system for IPsec engine. This system operated on Windows and UNX platform. We developed the system using Java and C language.

Construction of Security Evaluation Criteria for Web Application Firewall (웹방화벽의 보안성 평가 기준의 구축)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.197-205
    • /
    • 2017
  • To achieve web application security goals effectively by providing web security features such as information leakage prevention, web application firewall system must be able to achieve the goal of enhancing web site security and providing secure services. Therefore, it is necessary to study the security evaluation of web application firewall system based on related standards. In this paper, we analyze the requirements of the base technology and security quality of web application firewall, and established the security evaluation criteria based on the international standards for software product evaluation. Through this study, it can be expected that the security quality level of the web application firewall system can be confirmed and the standard for enhancing the quality improvement can be secured. As a future research project, it is necessary to continuously upgrade evaluation standards according to international standards that are continuously changing.

Development of Security Level Evaluation Tool(ISSPET) Based on Information Security System (정보보호 시스템기반의 보안 수준 평가 도구(ISSPET) 개발)

  • Soh, Woo-Young;Kim, Wan-Kyung;Kim, Seak-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1911-1919
    • /
    • 2009
  • Currently, the evaluation technology for the security systems of risk analysis level measurement is maintained by only the developed countries including U.S and U.K, and the evaluation technology and its infrastructure are insufficient for the evaluation technology of security threat analysis level measurement in Korea. Therefore this paper presents the development of the security control items and the evaluation tool(ISSPET) for the security level performance. It is expected to evaluate the security management level of the current system and its security environment through analyzing the security management level of security systems using ISSPET.

Document Schema for the CC-based evaluation of information technology security system (정보보호시스템의 CC기반 평가를 위한 문서 스키마)

  • Lee, Tae-Seung;Park, Jin-Wan;Kim, Min-Chul;Lee, Gang-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2121-2124
    • /
    • 2003
  • 정보보호시스템의 국제공통평가기준인 CC(또는 ISO/IEC 1540B)에서는 평가용 문서(즉, 제출물)에 대한 세부지침을 포함하지 않고 있으므로, CC기반 평가체계를 구축하기 위해서는 문서 스키마(즉, 목차와 내용요구사항)를 개발해야 한다. 본 논문에서는 CC기반 평가체계에서 활용할 수 있는 문서 스키마를 개발하였다. CC내의 보증클래스로부터 Weakest precondition함수, 문서량 축소규칙, 문서 종속성 분석방법을 적용하여 문서스키마와 DTD를 개발하였다. 본 연구의 접근방법은 소프트웨어 품질의 평가체계에서 사용할 문서스키마 또는 DTD를 개발하는데 응용될 수 있다.

  • PDF

Document Schema for the CC-based evaluation of information technology security system (정보보호 시스템의 CC기반 평가를 위한 문서 스키마)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.45-52
    • /
    • 2012
  • CC does not Contain detailed instructions about evaluation document. So, we must develop document schema to make CC-based evaluation system. In this report, we developed document schema that can be used in CC-based evaluation system. We devloped document schema and DTD that applying Weakest precondition function, reduction rules about amount of document and dependancy analysis document from assurance class within CC. Approach of this study can be applied to develop document and DTD that can be used in evaluation system of software quality.

A Shortened Common Criteria Evaluation Schedule using Project Management Techniques (프로젝트 관리 기법을 이용한 CC 평가 기간 단축)

  • Park, Soon-Tai;Lee, Hyung-Hyo;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.131-144
    • /
    • 2010
  • IT developed countries since the late 1980s are used to develop IT security evaluation criteria to ensure safety and reliability of information protection products. Currently a variety of products used for the evaluation based on CC and it takes a long period of product evaluation is required to reduce the developers and users. In this paper refer to the published standard evaluation schedule for the EAL4 calculation model offers a trial period. In addition, based on this commitment by adjusting the number of evaluaters to evaluate the applicant in the evaluation period to minimize the position offers.

Advanced approach to information security management system utilizing maturity models in critical infrastructure

  • You, Youngin;Oh, Junhyoung;Kim, Sooheon;Lee, Kyungho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4995-5014
    • /
    • 2018
  • As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities. Currently, these methods of measuring information security are a concrete method of recommendation in related standards. However, the security controls used in these methods are lacking in connectivity, causing silo effect. In order to solve this problem, there has been an attempt to study the information security management system in terms of maturity. However, to the best of our knowledge, no research has considered the specific definitions of each level that measures organizational security maturity or specific methods and criteria for constructing such levels. This study developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. The proposed model is simulated using the thermal power sector in critical infrastructure of the Republic of Korea to confirm the possibility of its application to the field and derive core security processes and goals that constitute infrastructure security maturity. The findings will be useful for future research or practical application of infrastructure ISMSs.

Comparison of The ISMS Difference for Private and Public Sector (민간기업과 공공기관의 정보보호 관리체계 차이 비교)

  • Kim, Ji-Sook;Lee, Soo-Yeun;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.117-129
    • /
    • 2010
  • To support the establishment of Information Security Management System, the private sector and the public sector have taken some measures. In the private sector, KISA(Korea Internet & Security Agency) has certified ISMS system based on "The Act on Communication Network Use Promotion and Information Security etc.". In the public sector, No authentication system has been established. Instead, NIS(National Intelligence Service) has enforced 'Information Security Management Condition Evaluation' based on "Electronic Government Act". This article compared ISMS control parts of the private sector with that of the public sector and analyzed the non-enforcement parts of ISMS implementing two sectors for years. Based on this, I would like to consider the method of establishment for efficient ISMS.