• 제목/요약/키워드: Security Evaluation System

검색결과 672건 처리시간 0.028초

Developing a Framework for the Implementation of Evidence Collection System: Focusing on the Evaluation of Information Security Management in South Korea

  • Choi, Myeonggil;Kang, Sungmin;Park, Eunju
    • Journal of Information Technology Applications and Management
    • /
    • 제26권5호
    • /
    • pp.13-25
    • /
    • 2019
  • Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the '6. Information System Security' of 'information security management actual condition evaluation index'. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.

A Derivation of Evaluation Item about Enterprise Security Management

  • Kim, Sun-Joo;Jo, In-June
    • Journal of information and communication convergence engineering
    • /
    • 제8권5호
    • /
    • pp.544-548
    • /
    • 2010
  • The Enterprise Security Management system is a centralized control system based on predefined security policies by organizations. In Korea, there is a Common Criteria security certification according to the strict standards for various features. As the needs of information security product are increasing, the ESM system should be evaluated with quality characteristics. In this paper, we propose evaluation items for functionality and performance of Enterprise Security Management system, and the best practices for evaluation.

대규모 네트워크 환경에서의 보안관리를 위한 보안평가 시스템 설계 (Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management)

  • 이재승;김상춘
    • 한국정보과학회논문지:정보통신
    • /
    • 제30권6호
    • /
    • pp.776-786
    • /
    • 2003
  • 보안평가 시스템은 다양한 요소로 구성된 대규모 네트워크 도메인 전체의 보안성을 평가하고 이를 바탕으로 보안 관리자 혹은 보안관리 시스템이 네트워크 보안관리를 수행하는데 필요한 의사결정을 지원하는 시스템이다. 이 시스템은 보안상 취약점들로 인한 공격을 방지하기 위해 어떻게 네트워크의 보안 관련 설정을 해주어야 하는지에 관한 의사결정을 지원해 준다. 보안평가 시스템은 네트워크의 “현재 상태”를 분석하고 공격 가능성을 찾아내어 불법적인 침해 행위를 사전에 예방하도록 보안관리의 의사결정을 지원해 준다. 본 논문에서는 다양한 요소로 구성된 대규모 네트워크의 보안성 평가를 자동화하고 침해사고 예방을 위해 보안관리의 의사결정을 도와주는 보안평가 시스템에 대한 요구 사항을 분석하고 이를 반영한 보안평가 시스템을 설계한다.

보안 안전성을 위한 자동화 보안진단평가 시스템에 관한 연구 (A Study on Automatic Security Diagnostic Evaluation System for Security Assurance)

  • 엄정호;박선호;정태명
    • 디지털산업정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.109-116
    • /
    • 2009
  • In the paper, we designed an automatic security diagnostic evaluation System(SeDES) based on a security diagnostic evaluation model(SeDEM) for an organization's security assurance. The SeDEM evaluates a security level of an organization quantitatively by a security evaluation formula which is composed of security variables and security index as applying the statistical CAEL model for evaluate risk level of banks. The SeDES has a good expandability as changing security variables according to an organization scale, characteristics and so on. And it also has a excellent usage because it inputs only numeric data got from statistical technique to security index. We can understand more a security level correctly than the existent risk assessment system because it is possible to assess quantitatively with an security grade as well as score. analysis.

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권6호
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

국방조직의 정보보호 평가 방법론 개발 (Development of the Information Security Methodology for Defense Organization)

  • 조성림;최인수;박지훈;신우창
    • 한국IT서비스학회지
    • /
    • 제12권4호
    • /
    • pp.77-90
    • /
    • 2013
  • As Cyber threats are rising, the scope of information Security (IS) is extending from technical protection of a single information system to organizational comprehensive IS capability. The ministry of National Defense (MND) has established the IS evaluation for defense organization in 'the Directive for Defense Informatization Affairs.' However, no information about an evaluation method, process and organization is provided. We surveyed information security management system (ISMS) and related best practices in public sector and other countries, and analysed the military information security affairs. Thus, this paper recommends the IS evaluation method and process. The trial IS evaluation is in progress this year and the MND will expand this IS evaluation to the entire organization.

전자 지불 시스템의 보안 평가 기준 (Security Evaluation Criteria of Electronic Payment System)

  • 신장균;황재준
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 1999년도 학술대회지 vol.2
    • /
    • pp.491-500
    • /
    • 1999
  • Recent increase of commercial network Integration to World Wide Web(WWW) shifts an ordinary commerce to electronic environment. This draws more people to examine re-assurance of their secure transaction. This study investigates current status of security methodology for Electronic Payment System and extracts important axis of security level for electronic payment. Using these axis as security evaluation criteria, the research proposes a security matrix which consists of four different level of security granularity, hence allowing evaluation of a nation-wide credit card based payment system. Feasible usage of this matrix contributes to security analysis of the electronic system as whole, hence providing better secured electronic environment.

  • PDF

보안관리체계 분석을 통한 산업중심 보안수준평가 모형 설계 방향 연구 (A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System)

  • 배제민;김상근;장항배
    • 한국전자거래학회지
    • /
    • 제20권4호
    • /
    • pp.177-191
    • /
    • 2015
  • 최근 국내 기업에서 보안사고가 지속적으로 증가함에 따라 기업의 특성과 환경을 고려한 체계적인 보안관리체계의 필요성이 대두되고 있다. 그러나 기업별 보안수준 측정의 대상, 목적, 방법 등이 다름에도 불구하고 현재 다수의 기업이 기존의 정보보호 관리체계인 K-ISMS를 단편 일률적으로 적용하고 있는 것이 실정이며, 이에 따른 보안관리체계 도입에 대한 실효성에 대해서도 많은 문제가 제기되어지고 있다. 본 논문에서 선행연구 분석을 통해 정보보호, 산업보안, 연구보안에 대한 개념을 정립하고, 정보보호 관리체계, 산업보안관리체계, 연구보안관리 체계의 통제항목을 비교 분석하여 산업 전반의 보안을 수행할 수 있는 보안수준 평가항목 개발하였다. 또한 세부적으로 기 존재하는 보안수준평가 모형을 분석하여, 산업의 특성을 고려한 산업 중심의 보안수준평가 모형 설계 방향성을 제시하였다.

국내 PKI 시스템 평가 기준 제안 (The Proposal of Security Evaluation Criteria for PKI Systems in Korea)

  • 심주걸;박택진;이철원;원동호
    • 정보보호학회논문지
    • /
    • 제12권3호
    • /
    • pp.61-76
    • /
    • 2002
  • 정보보호 기술의 운용에 있어서 기반기술로 작용하는 PKI 시스템의 신뢰성 확보를 위해서는 PKI 시스템에 대한평가가 반드시 필요하나, 국제적으로 아직까지 체계적인 평가 및 인증체계가 갖춰지지 않은 것이 사실이다. 국내의 경우에도 침입차단시스템과 침입탐지시스템에 대한 평가 및 인증은 이루어지고 있으나, PKI 시스템 평가에 대한 연구는 미비한 실정이다. 이에 따라 본 논문에서는 국내 PKI 시스템에 적용할 수 있는 PKI 시스템 평가기준을 제안하고자 한다. 평가기준은 최근 정보보호 시스템 평가에 있어서 국제적인 조류에 맞춰 국제 공통 평가기준(CC)와 호환가능성을 고려하고, 현재 진행되고 있는 국내 평가제도를 고려하여 작성하였다.

A Relationship between Security Engineering and Security Evaluation

  • Kim, Tai-Hoon
    • 융합보안논문지
    • /
    • 제4권2호
    • /
    • pp.71-75
    • /
    • 2004
  • The Common Criteria (CC) philosophy is to provide assurance based upon an evaluation of the IT product or system that is to be trusted. Evaluation has been the traditional means of providing assurance. It is essential that not only the customer' srequirements for software functionality should be satisfied but also the security requirements imposed on the software development should be effectively analyzed and implemented in contributing to the security objectives of customer's requirements. Unless suitable requirements are established at the start of the software development process, the re suiting end product, however well engineered, may not meet the objectives of its anticipated consumers. By the security evaluation, customer can sure about the quality of the products or sys tems they will buy and operate. In this paper, we propose a selection guide for If products by show ing relationship between security engineering and security evaluation and make help user and customer select appropriate products or system.

  • PDF