• 제목/요약/키워드: Security Evaluation Model

검색결과 389건 처리시간 0.026초

실증검증을 통한 N/A 점검항목이 보안 수준 결과에 미치는 영향에 관한 연구 (An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification)

  • 이준호;성경상;오해석
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제3권8호
    • /
    • pp.271-276
    • /
    • 2014
  • 본 연구는 취약점 분석 평가 수행 시 N/A 점검항목이 보안 수준 결과에 미치는 영향 정도를 분석하였다. 이를 위하여, 본 논문에서는 취약점 분석 평가 범위 및 점검항목과 정량적 산출 방식을 이용하였으며, 항목의 중요성에 따른 등급과 가중치를 부여하였다. 또한, 주위 환경과 IT 기술 발달로 기관은 항상 위험에 노출되어 있으므로 위험 허용 수준을 적용하여 실증적 분석을 수행하였다. 분석한 결과, N/A 점검항목이 보안 수준에 영향을 미치는 요인으로 증명되었다. 즉, 취약점 분석 평가 수행 시 기관 특성상 연계성이 없는 점검항목은 제외시켜야 하는 것을 알 수 있었다. 본 연구에서는 실증검증을 토대로 기관 특성과 연계성을 갖지 않는 항목을 제외한 후 보안 수준 평가를 수행해야 함을 시사 하였으며, 기관 특성을 고려한 취약점 분석 평가 점검항목 정립 모델 연구가 필요함을 제시하였다.

유.무선 통합환경에서의 IDC 평가방법에 관한 연구 (A Study on Evaluation Method of IDC in the Wire/Wireless Integrated Environment)

  • 이재평;박진석;이만우;김순곤
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2006년도 추계 종합학술대회 논문집
    • /
    • pp.599-603
    • /
    • 2006
  • 한국정보보호진흥원은 2002년부터 정보보호관리체계 인증제도를 시행해, IDC 업체들에 대한 기술적 물리적 보호조치를 포함한 종합적 관리체계가 해당 서비스에 적합한지를 심사하여 인증을 해주고 있다. 하지만 이 인증제도는 유선과 무선으로 각각 분리된 IDC 환경에 대한 독립된 기준으로, 유 무선 통합 환경에서의 평가기준은 아직까지 마련되어 있지 못한 상태이다. 본 논문에서는 집적정보통신시설보호지침 및 무선랜 보안 운영 권고지침, 국내 외 정보보호 관련 지침 및 권고사항, IDC 환경을 분석한 자료를 바탕으로 유선과 무선이 통합된 IDC 네트워크 모델을 제시하고, IDC 평가기준을 제안하였다.

  • PDF

Type Drive Analysis of Urban Water Security Factors

  • Gong, Li;Wang, Hong;Jin, Chunling;Lu, Lili;Ma, Menghan
    • Journal of Information Processing Systems
    • /
    • 제16권4호
    • /
    • pp.784-794
    • /
    • 2020
  • In order to effectively evaluate the urban water security, the study investigates a novel system to assess factors that impact urban water security and builds an urban water poverty evaluation index system. Based on the contribution rates of Resource, Access, Capacity, Use, and Environment, the study adopts the Water Poverty Index (WPI) model to evaluate the water poverty levels of 14 cities in Gansu during 2011-2018 and uses the least variance method to evaluate water poverty space drive types. The case study results show that the water poverty space drive types of 14 cites fall into four categories. The first category is the dual factor dominant type driven by environment and resources, which includes Lanzhou, Qingyang, Jiuquan, and Jiayuguan. The second category is the three-factor dominant type driven by Access, Use, and Capability, which includes Longnan, Linxia, and Gannan. The third category is the four-factor dominant type driven by Resource, Access, Capability, and Environment, which includes Jinchang, Pingliang, Wuwei, Baiyin, and Zhangye. The fourth category is the five-factor dominant type, which includes Tianshui and Dingxi. The driven types impacting the urban water security factors reflected by the WPI and its model are clear and accurate. The divisions of the urban water security level supply a reliable theoretical and numerical basis for an urban water security early warning mechanism.

수준관리체계를 통한 핵심 직무역량 향상 방안 - 보안검색요원 판독등급제 중심으로 - (A Plan to Improve Core Job Skills through the Level Management System : Focusing on the X-ray Screening Rating System)

  • 김동민;백정선
    • 품질경영학회지
    • /
    • 제51권4호
    • /
    • pp.677-689
    • /
    • 2023
  • Purpose: The purpose of this study is to design a x-ray screening rating system to improve X-ray screening ability, which is a core job competency of security screener at Incheon International Airport, and to verify its effectiveness through empirical analysis to suggest ways to improve the level management system. Methods: In this study, the effectiveness of the research model was analyzed using T-test tests for effect analysis based on the empirical analysis results derived through the competency evaluation model, the screening rating system. Results: The results of this study are as follows. The average score for regular education before the implementation of the x-ray screening rating system was 94.1 points, but after the implementation of the x-ray screening rating system, the average score for regular education was 95.5 points, an average of 1.4 points increased. In addition, the proportion of those with 95 or more points classified as high scorers also increased significantly from 51.1% to 69.3%. Conclusion: The X-ray screening rating system of security inspectors will systematically manage the level of screening ability, which is a key job competency, and play a strong role in improving competency, while preventing security accidents through early identification and intensive training of level-lowers.

공공기관 정보보호서비스 대가 모델의 개선 방안 (The Improvement of Information Protection Service Cost Model in Public Institution)

  • 오상익;박남제
    • 한국정보기술학회논문지
    • /
    • 제17권7호
    • /
    • pp.123-131
    • /
    • 2019
  • 본 논문에서는 기존의 관련 연구를 SW 중심의 대가 산정, 비용-편익분석, 보안성 지속서비스 대가 산정으로 구분하여 조사하였고, 사례 분석은 미국과 일본, 국내 A기관을 대상으로 하였다. 이를 바탕으로 현 제도와의 비교를 통해 개선모델을 마련하였다. 비용-효용분석 측면에서 효용성이 높은 서비스 수준 협약(SLA ; Service Level Agreement)과 NIST Cybersecurity Framework를 적용하여 정보보호서비스별 특성과 수행기준, 가중치를 기준으로 대가를 산정하는 방식인 SCS(Security Continuity Service) 성과평가체계 기반 정보보호서비스 대가 산정 모델을 제안한다. 이 모델은 공공기관에서 정보보호서비스 대가를 객관적으로 산정하는 도구로 활용할 수 있다. 또한, 현재 권고수준인 법률을 적용 강제성 수준으로 강화, 국가기관 및 공공기관의 평가제도 개선, 국가인증기관의 정보보호서비스 검증제도 도입, 모든 정보시스템 및 서비스로의 확대 등을 통해 본 제도의 정착될 수 있을 것으로 기대된다.

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.

The Effect of Methods of Estimating the Ability on The Accuracy and Items Parameters According to 3PL Model

  • Almaleki, Deyab A.;Alomrany, Ahoud Ghazi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.93-102
    • /
    • 2021
  • This study aimed to test method on the accuracy of estimating the items parameters and ability, using the Three Parameter Logistic. To achieve the objectives of the study, an achievement test in chemistry was constructed for third-year secondary school students in the course of "natural sciences". A descriptive approach was employed to conduct the study. The test was applied to a sample of (507) students of the third year of secondary school in the "Natural Sciences Course". The study's results revealed that the (EAP) method showed a higher degree of accuracy in the estimation of the difficulty parameter and the abilities of persons higher than the MML method. There were no statistically significant differences in the accuracy of the parameter estimation of discrimination and guessing regarding the difference of the two methods: (MML) and (EAP).

A Proposed Framework for Evaluating the Return on Investment of E-Learning Programs at Saudi Universities

  • Hanaa Yamani
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.39-46
    • /
    • 2023
  • The purpose of this study is to introduce a proposed Framework for Evaluating the Return on Investment (ROI) of E-Learning Programs at Saudi Universities. To achieve this goal, the descriptive analysis methodology is used to analyze the literature review about e-learning and its evaluation from different viewpoints, especially from the ROI-related perspective. As well as the literature reviews related to ROI and the methods of calculating it inside society institutes. This study suggests a conceptual framework for evaluating the ROI of E-Learning Programs at Saudi Universities. This framework is based on the merging process among the analyze, design, develop, implement, and evaluate (ADDIE) model for designing e-learning programs, which gives detailed procedures for executing the program, several evaluating models for e-learning, and the Kirkpatrick model for evaluating the ROI of e-learning. It consists of seven stages (analysis, calculating the costs, design, development, implementation, calculation of the benefits, and calculation of the final ROI).

스마트폰 이용자의 악성코드용 모바일 백신 이용 의도에 영향을 미치는 요인 (The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW)

  • 장재영;김지동;김범수
    • 한국IT서비스학회지
    • /
    • 제13권2호
    • /
    • pp.113-131
    • /
    • 2014
  • Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.

인터넷은행을 위한 개선된 본인확인 구조 (Advanced Mandatory Authentication Architecture Designed for Internet Bank)

  • 홍기석;이경호
    • 정보보호학회논문지
    • /
    • 제25권6호
    • /
    • pp.1503-1514
    • /
    • 2015
  • 인터넷은행 환경 조성과 관련하여 금융당국이 발표한 비대면 실명확인 정책은 대면 이상의 정확성을 기하기 위해 다중확인을 원칙으로 하고 있다. 인터넷은행은 기존 인터넷뱅킹과 법적 실체와 사업모델이 다른데, 본인확인 구조로써 인터넷뱅킹의 본인확인 구조를 유지한 채 실명확인만 대면에서 비대면으로 대체하는 것은 최초 가입자에게 불편을 줄 뿐 아니라, 엄격한 대면확인을 거치는 인터넷뱅킹보다 보안위험에 더 노출될 수 있다. 본 연구는 인터넷은행의 서비스 단계를 등급화하고, 등급에 따라 차등화된 서비스등록 및 이용이 이루어지도록 개선된 본인확인 구조를 제안한다. 또한, 인터넷은행에 대해 발생할 수 있는 보안취약점과 공격모델을 수립하고, 각 공격모델에 대한 인증매체의 보안특성과 서비스 단계별 안전성을 분석한 결과 등급에 따라 기존 인터넷뱅킹보다 비슷하거나 더 높은 안전성을 제공하고, 이용자 가입 유도 측면에서 유용함을 확인하였다.