• 제목/요약/키워드: Security Framework

검색결과 1,066건 처리시간 0.035초

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권2호
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

주요기반시설 서비스의 안정적 운영을 위한 보안 프레임워크 설계에 관한 연구 (A Study on the Security Framework Design for Stable Operation of Critical Infrastructure Service)

  • 이수연;유지연;임종인
    • 한국IT서비스학회지
    • /
    • 제15권4호
    • /
    • pp.63-72
    • /
    • 2016
  • Critical infrastructure has been operating in a closed environment with a completely separate information system and in the private area. However, with the current ICT environment changes due to convergence and open platforms it has increased the threats and risks to critical infrastructure. The importance of cyber security is increasing in the infrastructure control system, such as the outbreak of Ukraine blackout in 2015 by a malicious code called 'black energy'. This thesis aims to recognize the importance and necessity of protecting the critical infrastructure service, designing a security framework reflecting environmental and characteristic changes, and analyzing the management system suitable for a security framework. We also propose a theoretical basis for constructing a new security framework by comparing and analyzing seven international security management system standards, such as NIST 800-82 and IEC 62443-2-1, which are used in the control system. As a result, the environment surrounding critical infrastructure changes with the characteristics of connectivity, openness, and finality was studied, and as a response to this, many scholars and institutions present critical infrastructure security frameworks as cycle enhancement type structures, risk management structures, and management domain expansion structures. In response, the security framework encompassing these structures, CISF (Critical Infrastructure Security Framework), was designed. Additionally, through the security related international standard and criterion analysis, as a newly designed security standard suitable for CISF, IEC 62443-2-1 is reviewed and suggestions are made.

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • 제13권6호
    • /
    • pp.1613-1627
    • /
    • 2017
  • The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

SCO Framework을 적용한 조직과 조직원의 정보보안 준수 관계 연구 (Information Security of Organization and Employees in Social Exchange Perspective : Using Structure-Conduct-Outcome Framework)

  • 황인호;김상현
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제28권4호
    • /
    • pp.105-129
    • /
    • 2019
  • Purpose Issues related to information security have been a crucial topic of interest to researchers and practitioners in the IT/IS field. This study develops a research model based on a Structure-Conduct-Outcome (SCO) framework for the social exchange relationship between employees and organizations regarding information security. Design/methodology/approach In applying an SCO framework to information security, structure and conduct are activities imposed on employees within an organizational context; outcomes are activities that protect information security from an employee. Data were collected from 438 employees working in manufacturing and service firms currently implementing an information security policy in South Korea. Structural equation modeling (SEM) with AMOS 22.0 is used to test the validation of the measurement model and the proposed casual relationships in the research model. Findings The results demonstrate support for the relationships between predicting variables in organization structure (security policy and physical security system) and the outcome variables in organization conduct (top management support, security education program, and security visibility). Results confirm that the three variables in organization conduct had a positive effect on individual outcome (security knowledge and compliance intention).

보안관제 조직을 위한 사이버보안 프레임워크 개선에 관한 연구 (A Study on Improvement of Cyber Security Framework for Security Operations Center)

  • 조창섭;신용태
    • 융합보안논문지
    • /
    • 제19권1호
    • /
    • pp.111-120
    • /
    • 2019
  • 사이버공격이 지능화되고 고도화되면서 이를 체계적으로 대응하기 위한 보안관제센터(SOC : Security Operations Center)의 중요성이 높아지고 있고, SOC의 규모와 그 수도 늘어나고 있다. 각 기관 및 조직에서 다양한 사이버보안 표준을 활용하여 업무 절차를 만들어 사용하고 있으나 SOC는 자체 인력보다는 보안관제전문기업과 협업하는 경우가 많아 SOC환경에 맞게 개선이 필요하다. NIST 사이버보안 프레임워크(CSF : Cybersecurity Framework)와 정보보호관리체계 그리고 보안관제전문기업의 업무절차를 비교 분석한 결과 NIST CSF가 보안관제에 적용하기 용이한 프레임워크이나 국내 SOC에 적용하기 위해서는 SOC의 운영 및 관리 부분이 추가적으로 보완될 필요가 있다. 따라서 본 연구에서는 NIST CSF를 참조 모형으로 하여 SOC환경에 필요한 관리적 항목을 도출하였으며 각 항목에 대한 필요성, 중요성, 용이성을 델파이 조사방식으로 검증하고 개선된 사이버보안 프레임워크를 제안하였다.

정보시스템 감리에서의 정보보호 감리모형 설계 (A Design on the Information Security Auditing Framework of the Information System Audit)

  • 이지용;김동수;김희완
    • 디지털산업정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.233-245
    • /
    • 2010
  • This paper proposes security architecture, security audit framework, and audit check item. These are based on the security requirement that has been researched in the information system audit. The proposed information security architecture is built in a way that it could defend a cyber attack. According to its life cycle, it considers a security service and security control that is required by the information system. It is mapped in a way that it can control the security technology and security environment. As a result, an audit framework of the information system is presented based on the security requirement and security architecture. The standard checkpoints of security audit are of the highest level. It was applied to the system introduction for the next generation of D stock and D life insurance company. Also, it was applied to the human resources information system of K institution and was verified. Before applying to institutions, system developers and administrators were educated about their awareness about security so that they can follow guidelines of a developer security. As a result, the systemic security problems were decreased by more than eighty percent.

Cybersecurity를 위한 SOC & SIEM 기술의 동향 (Trends of SOC & SIEM Technology for Cybersecurity)

  • 차병래;최명수;강은주;박선;김종원
    • 스마트미디어저널
    • /
    • 제6권4호
    • /
    • pp.41-49
    • /
    • 2017
  • 최근 많은 보안 사고의 발생에 따라 SOC(Security Operation Center)과 SIEM(Security Information & Event Management)에 대한 관심이 집중되고 있으며, 이에 따른 다양한 연구들과 정보 보안 업계의 다양한 상업화 제품들이 출시되고 있다. 이러한 상황을 반영하듯이 미국의 NIST에서는 Cybersecurity Framework에 관한 문서의 발간 및 개정을 진행하고 있다. 본 연구에서는 NIST의 Cyberseurity Framework를 고찰하고 SOC 및 SIEM 보안 기술 및 솔루션의 동향에 대해 살펴보고자 한다. 더불어 실시간 빅데이터 보안으로 오픈소스 Apache Metron을 소개한다.

A study on security oversight framework for Korean Nuclear Facility regulations

  • So Eun Shin;Heung Gyu Park;Ha Neul Na;Young Suk Bang;Yong Suk Lee
    • Nuclear Engineering and Technology
    • /
    • 제56권2호
    • /
    • pp.426-436
    • /
    • 2024
  • Nuclear security has been emphasized to ensure the safety of the environment and humans, as well as to protect nuclear materials and facilities from malicious attacks. With increasing utilization of nuclear energy and emerging potential threats, there has been a renewed focus on nuclear security. Korea has made efforts to enhance the regulatory oversight processes, both for general and specific legislative systems. While Korea has demonstrated effective nuclear security activities, continuous efforts are necessary to maintain a high level of security and to improve regulatory efficiency in alignment with international standards. In this study, the comprehensive regulatory oversight framework for the security of Korean nuclear facilities has been investigated. For reference, the U.S. regulatory oversight frameworks for nuclear facilities, with a focus on nuclear security, and the motivations of changes in regulatory oversight framework have been identified. By comparing these regulatory programs and frameworks, insights and considerations for enhancing nuclear security regulations have been identified. A comprehensive security inspection program tailored for the Korean regulatory oversight framework has been proposed, and has been preliminarily applied to hypothetical conditions for further discussion.

프레임워크 기반 스마트시티 사이버 보안 메트릭스 (Framework Based Smart City Cyber Security Matrix)

  • 김성민;정혜선;이용우
    • 한국산업융합학회 논문집
    • /
    • 제23권2_2호
    • /
    • pp.333-341
    • /
    • 2020
  • In this paper, we introduce a smart city-cyber-security-grid-matrix methodology, as a result of research on overall cyber security of smart cities. The identified cyber security risks that threaten smart cities and smart-city-cyber-security-threat list are presented. The smart-city-cyber-security-requirements necessary to secure the smart city cyber security with the developed smart city-cyber-security-grid-matrix are given in this paper. We show how the developed smart city-cyber-security-grid-matrix methodology can be applied to real world. For it, we interlocked the developed smart city-cyber-security-grid-matrix methodology with the cyber-security-framework of the National Institute of Standards and Technology, and developed a framework-based smart city-cyber-security-grid-matrix. Using it, it is easy and comfortable to check the level of cyber security of the target smart ciy at a glace, and the construction and operation of the smart city security system is systematized.

A Combined Bulk Electric System Reliability Framework Using Adequacy and Static Security Indices

  • Billinton, Roy;Wangdee, Wijarn
    • Journal of Electrical Engineering and Technology
    • /
    • 제1권4호
    • /
    • pp.414-422
    • /
    • 2006
  • Deterministic techniques have been applied in power system planning for many years and there is a growing interest in combining these techniques with probabilistic considerations to assess the increased system stress due to the restructured electricity environment. The overall reliability framework proposed in this paper incorporates the deterministic N-1 criterion in a probabilistic framework, and results in the joint inclusion of both adequacy and security considerations in system planning. The combined framework is achieved using system well-being analysis and traditional adequacy assessment. System well-being analysis is used to quantify the degree of N-1 security and N-1 insecurity in terms of probabilities and frequencies. Traditional adequacy assessment is Incorporated to quantify the magnitude of the severity and consequences associated with system failure. The concepts are illustrated by application to two test systems. The results based on the overall reliability analysis framework indicate that adequacy indices are adversely affected by a generation deficient environment and security indices are adversely affected by a transmission deficient environment. The combined adequacy and security framework presented in this paper can assist system planners to realize the overall benefits associated with system modifications based on the degree of adequacy and security, and therefore facilitate the decision making process.