• Title/Summary/Keyword: Protection requirements

Search Result 562, Processing Time 0.028 seconds

A Study on the Development Method of Security Functional Requirements of Common Criteria-based Protection Profiles: Focused on development process of Intrusion Detection System Protection Profile (공통평가기준 기반 보호프로파일의 보안기능요구사항 개발 방법 연구: 침입탐지시스템 보호프로파일 개발 과정 중심)

  • 이태승;김태훈;조규민;김상호;노병규
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.51-57
    • /
    • 2003
  • By analysing the development process of Intrusion Detection System Protection Profile, we suggest the development method of Security Functional Requirements of Common Criteria- based Protection Profile and discuss how the method satisfies the requirements of If product or system Protection Profile in the development process.

  • PDF

A Method to Elicit Privacy Requirements and Build Privacy Assurance Cases for Privacy Friendly System (프라이버시 친화 시스템 개발을 위한 프라이버시 요구사항 도출 및 보증 사례 작성)

  • Cho, Ju Hye;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.918-931
    • /
    • 2017
  • Recently, the spread of smartphones and various wearable devices has led to increases in the accumulation and usage of personal information. As a result, privacy protection has become an issue. Even though there have been studies and efforts to improve legal and technological security measures for protecting privacy, personal information leakage accidents still occur. Rather than privacy requirements, analysts mostly focus on the implementation of security technology within software development. Previous studies of security requirements strongly focused on supplementing the basic principles and laws for privacy protection and securing privacy requirements without understanding the relationship between privacy and security. As a result, personal information infringement occurs continuously despite the development of security technologies and the revision of the Personal Information Protection Act. Therefore, we need a method for eliciting privacy requirements based on related privacy protection laws that are applicable to software development. We also should clearly specify the relationship between privacy and security. This study aims to elicit privacy requirements and create privacy assurances cases for Privacy Friendly System development.

A Study for the Measurement Method of Electromagnetic Field Strength of Power Line Communications Modem (전력선통신모뎀의 전자계강도 측정방법 연구)

  • Jang Dong-Won
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.162-165
    • /
    • 2006
  • This paper describes a measurement method for electromagnetic field strength of power-line communications(PLC) modem. First it outlines the technology used in PLC modems, and the technical regulation being offered to the technology, from the point of view of its effect on electromagnetic compatibility (EMC). The radio spectrum needs protection from other interferers, and there is a regime in place to provide this protection. Difficulties in achieving compatibility between the requirements for radio protection and the requirements for operation of the PLC modem mean that there is no consensus as yet as to how PLC modem components can be made compliant with EMC requirements globally. It is concluded that there is a measurement method according to CISPR standards which satisfy requirements in domestic regulation.

  • PDF

Analysis of Stability of PV System using the Eigenvalue according to the Frequency Variation and Requirements of Frequency Protection

  • Seo, Hun-Chul;Kim, Chul-Hwan
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.4
    • /
    • pp.480-485
    • /
    • 2012
  • Use of photovoltaic (PV) power generation system will become more widespread in the future due to anticipated cost reduction in PV technology. As the capacity of PV systems increases, a variation of power system frequency may prevent the stable output of PV system. However, the standard for the frequency protection of distributed generation in Korea Electric Power Corporation (KEPCO)'s rule does not include the setting of frequency protection. Therefore, this paper analyzes the correlation between the frequency protection requirements and the stability of grid-connected PV system for the adjustable operating setting of frequency protection. The distribution system interconnected with 3 MW PV system is modeled by Matlab/Simulink. The various values of frequency are simulated. For studied cases, the stability of PV system is analyzed. It is concluded that the setting of frequency protection is necessary to consider the stability of PV system.

A Study on the Security Requirements for Developing Protection Profiles (보호프로파일 개발을 위한 보안요구사항 도출 방법에 관한 연구)

  • Zheng, He;Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.133-138
    • /
    • 2007
  • As a formal document that expresses a set of security requirements for IT products that meets specific consumer needs in the ISO/IEC 15408(CC, Common Criteria) evaluation, protection profiles are developing by many national agencies and companies recently. Since a protection profile is a criteria for security evaluation when the IT systems and products are introduced, the importance of the protection profile is increasing. However, developing protection profiles are still difficult due to lack of detailed methodology and guidance to analyze security environments or to derive security requirements. In this paper, we analyze foreign instances of developing protection profiles and propose a methodology for deriving security requirements through analyzing the TOE security environment.

A Study on the Legal Protection of Fashion Designs and its Possibility under the Korean Design Protection Act - Based on the Review of Cases Related to the Requirements for a Design Definition and Acquisition of Design Rights and the Judgment of Design Identity & Similarity - (패션디자인의 디자인보호법상 보호와 보호 가능성에 관한 고찰 - 디자인 성립 및 등록요건과 동일·유사 판단 기준 관련 판례 검토를 중심으로 -)

  • Cho, KyeongSook;Jung, Seok Won
    • Journal of the Korean Society of Costume
    • /
    • v.66 no.1
    • /
    • pp.28-41
    • /
    • 2016
  • This paper is aimed at intensively examining the scope of legal protection for fashion designs under the Design Protection Act of Korea. For this purpose, this looked into how the Act defines the concept of design, its requirements, and the prerequisites for acquiring design rights. The study also reviewed statutory interpretations over the judgment of the identity and similarity of designs. For more practical and substantial discussions, this research utilized cases and precedents, which had relevant legal principles. This study also figured out how both the requirements for a design definition - such as merchantability, configuration, visibility, and aesthetics - and the prerequisites for acquiring design rights - like industrial applicability, novelty, and creativity - are interpreted and utilized in actual circumstances. The authors expressed their opinions regarding the criteria of judging the identity and similarity of designs, based on a study of previous cases. Previous rulings show that aesthetics of the exterior design is used as the criteria for determining whether a design is same or similar. So, two designs, which have different specific details, are deemed same or similar, if both designs show similarity in the dominant elements. This is because both designs will produce similar aesthetic qualities. However, if the dominant elements of a design are part of the public domain, and the specific details characterize the design, the latter has to be evaluated in the process. This paper examined scope of legal protection for fashion designs using relevant precedents. The study may serve as academic materials that lead to the establishment of rightful ownership in creative activities.

Biometric Information Protection Measures in the Biometric Person Authentication System Using Match-on-Card (Match-on-Card를 사용한 생체 개인 인증 시스템에서의 생체정보 보호대책)

  • 이상곤;조대성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.6
    • /
    • pp.237-246
    • /
    • 2003
  • To acquire certificate of security evaluation for information protection Products, it is necessary for a designer to grasp the threats listed in a protection profile and to reflect them in the product design. BDPP is a protection profile for the biometric devices. In this paper, we applied BDPP to a Match-on-Card, and ertracted some security requirements to protect biometric data against threats. We also studied some countermeasures satisfying the security requirements.

General Requirements Pertaining to Radiation Protection in Diagnostic X-ray Equipment -KFDA DRS 1-1-3 : 2008 base on IEC 60601-1-3:2008- (진단용 엑스선 장치에 있어서 방사선 방어에 대한 일반 요구사항 -IEC 60601-1-3:2008에 근거한 KFDA DRS 1-1-3:2008-)

  • Kang, Hee-Doo;Dong, Kyung-Rae;Kweon, Dae-Cheol;Choi, Jun-Gu;Jeong, Jae-Ho;Jung, Jae-Eun;Ryu, Young-Hwan
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.11 no.2
    • /
    • pp.69-77
    • /
    • 2009
  • This study gives an account of the collateral standards in IEC 60601-1-3: 2008 specifying the general requirements for basic safety and essential performance of diagnostic X-ray equipment regarding radiation protection as it pertains to the production of X-rays. The collateral standards establish general requirements for safety regarding ionization radiation in diagnostic radiation systems and describe a verifiable evaluation method of suitable requirements regarding control over the lowest possible dose equivalent for patients, radiologic technologists, and others. The particular standards for each equipment can be determined by the general requirements in the collateral standard and the particular standard is followed in the risk management file. The guidelines for radiation safety of diagnostic radiation systems is written up in ISO 13485, ISO 14971, IEC 60601-1-3(2002)1st edition, medical electric equipment part 1-3, and the general requirements for safety-collateral standards: programmable electrical medical systems. Therefore the diagnostic radiation system protects citizens' health rights with the establishment and revisions of laws and standards for diagnostic radiation systems as a background for the general requirements of radiation safe guards applies, as an international trend, standards regarding the medical radiation safety management. The diagnostic radiation system will also assure competitive power through a conforming evaluation unifying the differing standards, technical specifications, and recognized processes.

  • PDF

Vulnerability Countermeasures for Information Security in Smart Work Services (스마트워크 서비스에서 정보보호를 위한 취약성 대응 방안)

  • Kim, Ji Seog;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.7 no.4
    • /
    • pp.69-81
    • /
    • 2017
  • Smart work refers to enhancing the efficiency of work by utilizing smart devices. Smart work improves business productivity by improving business productivity of companies, reducing costs, but there is a threat to various information protection. To operate telecommuting, mobile office, and smart work center, hardware and software are needed to support various network resources, servers, and platforms. As a result, there are many vulnerabilities to security and information protection that protect information resources. In this paper, we analyze the smart work environment for smart work service and analyze vulnerability for smart work information protection through analysis of IOS27001 and KISA-ISMS. We have developed requirements for information protection requirements for users and service providers. We have developed a solution for information security protection for smart work environments such as common parts, mobile office, telecommuting, and smart work center for security threats and weaknesses per smart work type.