• 제목/요약/키워드: Infrastructure Security

검색결과 1,083건 처리시간 0.031초

주요 정보통신 기반시설 취약점 분석 및 평가절차 모델 개선 연구 (An Advanced Model for Week Point Analysis and Evaluation on Important Information Communication Infrastructures)

  • 최웅규
    • 한국방재안전학회논문집
    • /
    • 제5권2호
    • /
    • pp.43-48
    • /
    • 2012
  • 주요 정보통신 기반시설의 중요성이 대두되면서 국내에서는 2001년부터 정보통신 기반보호법을 제정하여 주요 통신장비가 집중된 시설 및 정보통신 서비스 전국감시 시설, 국가 행정 운영 및 관리 시설 등을 지정하여 관리하고 있다. 이러한 주요 정보통신 기반시설에 대하여 해당 관리기관은 주요 정보통신 기반시설에 대한 취약점 분석 평가를 실시하고 있으며, 자체 수행이 불가능한 경우 외부 전문기관에 의뢰하여 진행하고 있다. 본 연구에서는 적절한 주요 정보통신 기반시설 취약점 분석 평가가 이루어 질 수 있도록 개선된 취약점 분석 평가 모델을 제시하였고, 주요 정보통신 기반시설에 이를 적용함으로써 검증 하였다. 관계기관은 본 연구를 활용하여 기관에 적합한 취약점 분석 평가를 수행 할 수 있을 것이다.

공공기관의 특성을 고려한 PMI기반의 XML 접근제어 모델에 관한 연구 (A Study of the PMI-based XML Access Control Model in Consideration of the Features of the Public Organization)

  • 조창희;이남용
    • 한국IT서비스학회지
    • /
    • 제5권3호
    • /
    • pp.173-186
    • /
    • 2006
  • The local public organizations, to secure the Confidentiality, Integrity, Authentication and Non-Repudiation of cyber administrative environment is giving it a try to consolidate the official documents among them by standardizing all the documents into XML formats together with the establishment of the GPKI(Government Public Key Infrastructure). The Authentication System based on the PKI(Public Key Infrastructure) used by the GPKI, however, provides only the simple User Authentication and thus it results in the difficulty in managing the position, task, role information of various users required under the applied task environment of public organizations. It also has a limitation of not supporting the detailed access control with respect to the XML-based public documents.In order to solve these issues, this study has analyzed the security problems of Authentication and access control system used by the public organizations and has drawn the means of troubleshoot based on the analysis results through the scenario and most importantly it suggests the access control model applied with PMI and SAML and XACML to solve the located problem.

The Impact of Applying Technical Equipment on the Quality of e-Learning at Northern Border University

  • Alenezi, Dr. Ahmed Maajoon
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.261-271
    • /
    • 2022
  • The study aimed to identify the impact of the application of technical equipment for infrastructure to achieve the quality of e-learning for students in the faculties at Northern Border University, in Arar city. The study applied the analytical survey study method. To achieve the study purpose, the researcher prepared a study tool which is a questionnaire to measure the impact o of applying technical instrument for the infrastructure to achieve the quality of e-learning for students. The study sample size reached (218) students from both groups from the university faculties in Arar city. The results of the study revealed a tendency in the study sample's responses to the availability of the majority of the questionnaire criteria significantly. This indicates the positive impact of the application of technical equipment on the infrastructure to achieve the application quality of e-learning at Northern Border University, the study recommended the following: The need to pay attention to measuring the quality of electronic courses every two years in addition to the need to adjust the quality standards of e-content provided through e-learning platforms. Also, there is the gradual application of e-learning at the university in addition to spreading the culture of e-learning quality among all groups of the university community. Also, it is necessary to direct them towards benefiting from the advantages of e-learning that observes quality standards.

전력 IT Cyber Security 연구 동향 (Study Tendency of Cyber Security in Power IT Area)

  • 김학만;박재세;김상남
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 제39회 하계학술대회
    • /
    • pp.205-206
    • /
    • 2008
  • Electrical Power System is very important infrastructure in the country. The functions of control, monitoring and so on in the electrical power system are implemented by information technologies(IT) through cyber space. Recently, many activities for enhancing cyber security in the world. In this paper, we introduce the study tendency of cyber security in power IT areas.

  • PDF

WAP에서의 종단간 보안 시스템 설계 및 구현 (Design and Implementation of an End-To-End Security System On WAP)

  • 조영수;김명균
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2001년도 종합학술발표회논문집
    • /
    • pp.232-236
    • /
    • 2001
  • 본 논문에서는 WAP 포럼에서 제시하고 있는 무선 인터넷 솔루션인 WAP에서의 보안 메커니즘인 WTLS(Wireless Transport Layer Security), WIM (WAP Identity Module), WMLScript Crypto Library, WPKI(WAP Public Key Infrastructure)에 대해 살펴보고, WAP 게이트웨이를 사용하는 네트워크의 구조적 형태에서 발생되는 종단간 보안 서비스의 문제점에 대해 논의한 후 WAP 환경에서 종단간 보안 서비스를 제공할 수 있는 보안 시스템을 설계 및 구현하고자 한다.

  • PDF

Privacy Enhanced Security Mechanism for Grid Applications

  • Park, Sang-Bae
    • International Journal of Contents
    • /
    • 제6권3호
    • /
    • pp.15-18
    • /
    • 2010
  • Grid system is based on the Grid Security Infrastructure (GSI). GSI uses user's proxy to guarantee availability among multi-trust domains. Since grid system has been developed focusing on availability, GSI provides authentication and authorization performed by systems, but there are lacks of privacy consideration. For this reason, some researchers decide to use their own cluster system and do not want to use public grid systems. In this paper, we introduce a new privacy enhanced security mechanism for grid systems. With this mechanism, user can participate in resource allocation and authorization to user's contents more actively. This mechanism does not need to change previous middleware and minimize the computational overheads.

물리보안 시장경제 활성화 방안에 관한 연구 (A study on the physical security market economy revitalization plan)

  • 김민수
    • 융합보안논문지
    • /
    • 제23권2호
    • /
    • pp.115-120
    • /
    • 2023
  • 국내 물리보안(기계경비) 시장은 대기업과 중소 및 영세 기업의 인프라로 인한 경비구역의 확장에 있어 편차가 증가하고 있는 실정이다. 즉, 출동 시간에 따른 출동 범위에 대한 물리보안 서비스의 한정으로 기업 간 현장 출동과 관련한 문제가 끊임없이 제기되고 있다. 이에 본 연구에서는 현장 출동과 관련한 시뮬레이션을 통해 출동 시간에 대한 기준으로 출동 범위의 기준에 대한 결과를 바탕으로 향후 물리보안(기계경비) 시장의 활성화 방안에 대하여 제안한다.

다단계 바이러스 차단 구조 연구 (Multi-level Protection Infrastructure for Virus Protection)

  • 노시춘;김귀남
    • 한국사이버테러정보전학회:학술대회논문집
    • /
    • 한국사이버테러정보전학회 2004년도 제1회 춘계학술발표대회
    • /
    • pp.187-198
    • /
    • 2004
  • virus방역 체계 관리는 network infra구조관리, traffic소통경로관리. 방역 zone설정, gateway구간 방역관리이다. 본 논문은 일반적인 방역체계 구조의 성격과 취약점을 진단하고 이를 개선할 수 있는 대책으로서 개선된 방역체계를 설계하였다. 또한 설계된 방역체계와 configuration, mechanism하에서는 어느 정도의 개선효과 나타나고 있는지 분석하였다. 개선된 다단계 방역체계 하에서는 gateway 단계에서 불필요한 mail을 걸러주므로서 server에 주는 부하는 감소하며 virus wall상의 CPU부하의 감소와 virus 치료율의 상승으로 송신 적체 건수는 감소하고 시스템 process수는 증대하고있다.

  • PDF

Formation of a Competitive Paradigm of Ensuring Economic Security of Industrial Enterprises in the Conditions of Formation of Circular Economy

  • Pohrebniak, Anna;Tkachenko, Tetiana;Arefieva, Olena;Oksana, Karpenko;Chub, Anton
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.118-124
    • /
    • 2021
  • The article examines the formation of a competitive paradigm of economic security of industrial enterprises in the formation of a circular economy. The basic laws of industrial enterprises are formed, which determined the characteristics of competitive positions and threats. The basic competitive concepts and their application at maintenance of economic safety of the industrial enterprises in the conditions of formation of circular economy are described. Thus, the technological approach to the formation of a competitive paradigm is based on production technologies, opportunities for technological modernization and development of infrastructure and intellectual competencies. The institutional concept reveals the regulatory mechanisms for ensuring competitiveness through the protectionism of national industrial enterprises, standardization and regulation of market imbalances. The innovation-investment approach within the competitive paradigm is also manifested in the creation of competitive advantages due to the presence of active innovative developments and their commercialization, knowledge and competencies of staff, capitalization of intelligence and communications, constant updating of infrastructure and technologies. Collectively, innovation and investment effects on the level of economic security allow industrial enterprises to ensure resilience to increasing competition, the emergence of new market challenges in the formation of a circular economy. A strategic approach to the application of a competitive paradigm to ensure the economic security of industrial enterprises allows you to justify the prospects for development and design behavioral models to predict and assess potential threats. The concept of system management is based on the complexity of threat analysis, the integrity of the economic security system, system-forming functions and patterns of implementation of industrial development tasks in the formation of a circular economy. The application of the described concepts is formalized by the authors through the definition of the basic patterns, directions and characteristics of their impact on the elements of the security system of industrial enterprises in the formation of a circular economy.

초고속정보통신망을 위한 ATM 보안기술 (ATM Security for Information Infrastructure)

  • 강신각
    • 정보보호학회지
    • /
    • 제7권1호
    • /
    • pp.41-54
    • /
    • 1997
  • ATM 기술에 기반을 둔 광대역통신망의 구축과 실용화가 추진되면서 기존의 인터넷이나 패켓망에서와 마찬가지로 ATM 망을 통해 전송되는 정보에 대한 보안 요구사항이 제기되게 되었고, 이 문제를 해결하기 위해 ATM 포럼에서는 보안 작업그룹을 설립하여 ATM 보안 규격 개발작업을 수행하고 있다. 본 고에서는 현재 ATM 포럼에서 추진되고 있는 ATM 보안규격 개발작업의 현황과 지금가지 연구 개발된 ATM 보안 규격의 주요 내용을 소개한다.

  • PDF