• Title/Summary/Keyword: Security Evaluation Standards

Search Result 92, Processing Time 0.03 seconds

Measurement Scale Conversion for the Certification of Quality of Package Software (패키지 소프트웨어의 품질인증을 위한 측정척도변환)

  • 유영관;이종무
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2002.05a
    • /
    • pp.193-197
    • /
    • 2002
  • The certification of software products can provide a greater level of acceptance and feeling of security to customers of these products. This paper presents a certification method for the quality of package software. First of all, the evaluation criteria are derived from IS0/1EC 9126 and 12119 standards, and then the evaluation module are designed considering the measurement scale type. The results can be applied to construct the certification scheme of software product quality for the commercial purpose.

  • PDF

A Certification Method for the Quality of Package Software (패키지 소프트웨어를 위한 품질인증 방법의 설계에 관한 연구)

  • 유영관;이종무
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.1
    • /
    • pp.93-103
    • /
    • 2002
  • The certification of software products can provide a greater level of acceptance and feeling of security to customers of these products. This paper presents a certification method for the quality of package software. First of all, the evaluation criteria are derived from ISO/IEC 9126 and 12119 standards, and then the evaluation module are designed considering the measurement scale type. The results can be applied to construct the certification scheme of software product quality for the commercial purpose.

Case Study Plan for Information Security SLA Performance System in Public Sector (공공부문 정보보안 SLA 성과체계 사례연구)

  • Jeong, Jae Ho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.763-777
    • /
    • 2021
  • Information security started as an IT operation process and is now recognized as an important issue of information technology, and each international organization is newly defining the concept. Information security itself is a new combination of IT technologies, a set of technologies and a technology area. As IT outsourcing becomes common in many public sectors, SLAs are introduced to evaluate the level of IT services. In the area of information security, many studies have been conducted on the derivation and selection of SLA performance indicators, but it is difficult to find a way to apply the performance indicators to service level evaluation and performance systems. This thesis conducted a study on the application of a service evaluation system for information security performance indicators based on the public sector and a performance system including compensation regulations. It presents standards and rewards(incentive and penalty) that define expectation and targets of performance indicators that take into account the environment and characteristics of a specific public sector, and defines appropriate SLA costs. It proposes a change plan for the organizational structure for practical SLA application and service level improvement.

Performance Analysis of Key Exchange Protocols on ETSI Standard (ETSI 표준 키 교환 프로토콜의 성능 분석)

  • Lee, Young-Seok;Choi, Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.520-527
    • /
    • 2015
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the security functions in ETSI(European Telecommunications Standards Institute), and analyze the specification of the security primitives and the key exchange protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(Network Control Centre). ETSI key exchange protocols consists of Main Key Exchange, Quick Key Exchange, and Explicit Key Exchange. We analyse the pros and cons of key exchange protocols based on performance analysis and performance evaluation.

Malicious Codes Re-grouping Methods using Fuzzy Clustering based on Native API Frequency (Native API 빈도 기반의 퍼지 군집화를 이용한 악성코드 재그룹화 기법연구)

  • Kwon, O-Chul;Bae, Seong-Jae;Cho, Jae-Ik;Moon, Jung-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.115-127
    • /
    • 2008
  • The Native API is a system call which can only be accessed with the authentication of the administrator. It can be used to detect a variety of malicious codes which can only be executed with the administrator's authority. Therefore, much research is being done on detection methods using the characteristics of the Native API. Most of these researches are being done by using supervised learning methods of machine learning. However, the classification standards of Anti-Virus companies do not reflect the characteristics of the Native API. As a result the population data used in the supervised learning methods are not accurate. Therefore, more research is needed on the topic of classification standards using the Native API for detection. This paper proposes a method for re-grouping malicious codes using fuzzy clustering methods with the Native API standard. The accuracy of the proposed re-grouping method uses machine learning to compare detection rates with previous classifying methods for evaluation.

The Evaluation Criteria of Learning Abilities for Personal Robots and It's Application to a Cleaning Robot (개인용 로봇을 위한 학습능력 평가기준 및 청소로봇에 대한 적용 사례)

  • Kim Yong Jun;Kim Jin-Oh;Yi Keon Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.5
    • /
    • pp.300-306
    • /
    • 2005
  • In this paper we present a guideline to evaluate how easy the use of personal robots is and how good their learning abilities are, based on the analysis of their built-in commands, user interfaces, and intelligences. Recently, we are living with robots that can be able to do lots of roles; cleaning, security, pets and education in real life. They can be classified as home robots, guide robots, service robots, robot pets, and so on. There we, however, no standards to evaluate their abilities, so it is not easy to select an appropriate robot when a user wants to buy it. Thus, we present, as a guideline that can be a standard for the evaluation of the personal robots, the standards by means of analyzing existing personal robots and results of the recent research works. We will, also, demonstrate how to apply the evaluation method to the cleaning robot as an example.

A Study of Security QoS(Quality of Service) Measurement Methodology for Network Security Efficiency (MOS(Mean Opinion Score)를 이용한 네트워크 보안 QoS(Quality of Service) 평가체계)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.11-17
    • /
    • 2012
  • Network security performance evaluation is a complex and diverse system environments, a single, specific performance measurements alone performance evaluation measure itself and the meaning of the reliability of the evaluation results do not limit the number of days only. In this paper, we propose a method to measure the security features of security, QoS measurement techniques using MOS satisfaction. MOS(Mean Opinion Score) Rating specifications for network security, QoS satisfaction and how to operate the development and operational model for future customer's satisfaction for information systems that can be used to evaluate the QoS measurement/analysis be utilized in the field. Objectified in the form of standards and performance measurement system provider (supplier development) and consumers(users) all the results available so that how to develop a system. Development is the development of information security features, the performance of these two features networking capabilities and a comprehensive evaluation of a three-gaeyoungyeok Correlating performance measurement methodology. Systematic measurement environment designed using the proposed methodology of this study, when the operating system is on the satisfaction of the security, QoS can be calculated. Forward In addition, a variety of performance metrics and performance measurement methods by extending the network security system satisfaction rating upgrade by the way will be.

A Study on the Design Characteristics Evaluation of Ubiquitous Element in the Library (도서관에서의 유비쿼터스 요소의 디자인 특성 평가 연구)

  • Hwang, Ji-Eun;Nam, Kyung-Sook
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.3
    • /
    • pp.137-145
    • /
    • 2015
  • Ubiquitous technology is currently being introduced to libraries at the fastest speed as compared to other spaces. However, the introduction of ubiquitous technology to the existing analog space is causing problems despite such intelligence of libraries as the design standards for ubiquitous spaces have not been arranged yet. This researcher analyzed and evaluated the characteristics of design from the ubiquitous aspect of the ubiquitous environment-oriented libraries that are still at their initial stage. The subjects for this study were the National Library of Korea, Myongji University Bangmok Library, and Yonsei University Library. The definition and characteristics of the ubiquitous environment libraries were examined through literature review and the standards for design analysis were derived by analyzing previous studies. Case analyses were conducted to evaluate the design elements in the ubiquitous environment libraries based on the field observation, photographing, and interviews with managers. As a result, functionality, safety, cognition and convenience were derived based on the investigation and analysis of previous studies; informativeness, playfulness, security, and simplicity which are the design characteristics were found. As a result of the case studies, while functionality and safety are met in most of the standards for design analysis, universality was very low. Care for minorities is need in a library as it is a space used by many unspecified individuals.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

Re-evaluation of Korean Effluent Concentration Limits and Comparative Analysis

  • Hwang, Won Tae;Lee, Joeun;Kwon, Dahye;Kim, Eun Han;Han, Moon Hee
    • Journal of Radiation Protection and Research
    • /
    • v.43 no.3
    • /
    • pp.124-129
    • /
    • 2018
  • Background: Effluent Concentration Limits (ECLs) were re-evaluated via direct calculation using dose coefficients based on radiation protection quantity introduced in Korea and the intrinsic breathing rates of Korean residents. Materials and Methods: The re-evaluated ECLs were compared with the domestic standards given in the Notice of the Nuclear Safety and Security Commission (NSSC), as well as with ECLs specified in the Code of Federal Regulations (CFR). Results and Discussion: The relative ratios of the re-evaluated ECLs to the currently applied domestic standards differed depending on the radionuclide type, but it was clearly shown that, for tritium ($^3H$) and radiocarbon ($^{14}C$), which significantly affect radiological dose to the public during the normal operation of nuclear power plants, the re-evaluated ECLs were higher than the domestic standards. This implies that Korean standards are relatively conservative. Conclusion: The re-evaluated results for each age group showed that $^{131}I$ (radioiodine), one of the significant radionuclides, had the lowest values, but nonetheless, the domestic standards for radioiodine were lower than the ECLs given in the CFR and the re-evaluated ECLs via a method given in the CFR.