• 제목/요약/키워드: Security Framework

검색결과 1,075건 처리시간 0.029초

웹 컴포넌트 및 소프트웨어 보안 설계에 대한 분석 (Analyses of Design for Software Security and Web Component)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.591-594
    • /
    • 2008
  • This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framework provides an explicit opportunity for software composers as well as software components to test a priori security properties of software components in a system composition. The proposed framework uses logic programming as a tool to represent security properties of atomic components and reason about their compositional matching with other components.

  • PDF

네트워크 로봇 환경에서 보안 향상을 위한 인증 프레임워크 적용 방안 (The Authentication Framework Application Plan for the Security Improvement in Network Robot Environment)

  • 조한진;이준환
    • 디지털융복합연구
    • /
    • 제10권2호
    • /
    • pp.217-223
    • /
    • 2012
  • 네트워크 로봇은 기존의 독립 로봇을 네트워크를 연결함으로써 서버와의 통신을 통해 언제 어디서나 다양한 서비스를 제공할 수 있다. 이러한 네트워크 로봇은 기존의 유 무선 네트워크 기술을 그대로 사용하여 실시간 서비스를 제공할 수 있다는 장점이 있지만 네트워크 보안 취약점으로 인하여 보안 취약점 문제가 발생할 수 있다. 그러므로 네트워크 로봇 환경에서는 다양한 통신 매체나 프로토콜에 관계없이 보안 기능을 만족할 수 있는 인증 프레임워크가 정립되어야만 한다. 본 논문에서는 네트워크 로봇 환경에서 발생할 수 있는 보안 취약점을 분석하고 이에 대한 대응방안을 정립한 후, 네트워크 로봇 환경에 적용할 수 있는 인증 프레임워크를 살펴보았다.

Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid

  • Jang, Ji Woong;Kwon, Sungmoon;Kim, SungJin;Seo, Jungtaek;Oh, Junhyoung;Lee, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권5호
    • /
    • pp.2221-2235
    • /
    • 2020
  • Compared to the past infrastructure networks, the current smart grid network can improve productivity and management efficiency. However, as the Industrial Internet of Things (IIoT) and Internet-based standard communication protocol is used, external network contacts are created, which is accompanied by security vulnerabilities from various perspectives. Accordingly, it is necessary to develop an appropriate cybersecurity guideline that enables effective reactions to cybersecurity threats caused by the abuse of such defects. Unfortunately, it is not easy for each organization to develop an adequate cybersecurity guideline. Thus, the cybersecurity checklist proposed by a government organization is used. The checklist does not fully reflect the characteristics of each infrastructure network. In this study, we proposed a cybersecurity framework that reflects the characteristics of a microgrid network in the IIoT environment, and performed an analysis to validate the proposed framework.

무역의 안전과 원활화를 위한 일본기업의 AEO 제도 도입방안에 관한 연구 (Introduction Plans of Japanese AEO System for the Trade Security and Trade Facilitation)

  • 우성구;김재명
    • 무역상무연구
    • /
    • 제47권
    • /
    • pp.263-298
    • /
    • 2010
  • The global trading system is vulnerable to terrorist exploitation while the international trade is an essential element for the economic development. Customs has a unique role in the international trade to provide increased security while ensuring facilitation of the legitimate flow of goods and the role of Customs has become more and more indispensable these days. In response to this trend, the World Customs Organization(WCO), the organization of more than 170 Customs administrations all over the world, adopted an international framework("SAFE Framework") in 2005, which includes the Authorized Economic Operator(AEO) concept, whereby a party involved in the international movement of goods would be approved by Customs as complying with the supply chain security standards, and given benefits, such as simplified Customs procedure and less Customs intervention. In this stream, the Japanese government has developed and promoted AEO Program in close cooperation with the business sector, aiming at ensuring security while facilitating legitimate trade. For that purpose, Japan Customs, as a main entity in the field of international trade, has developed comprehensive AEO program with combination of programs for importers, exporters, warehouse operators, Customs brokers and logistics operators, such as forwarders and carriers, which are consistent with the "SAFE Framework" developed by the WCO. The purpose of this paper aims to analyse the introduction plans of AEO program for the trade security and trade facilitation with Japanese AEO system.

  • PDF

국내 정보보호 교육 표준 프레임워크 개발; 연령 및 직무 맞춤의 이원화(Two-track) 교육과정을 중심으로 (Development of a Standardized Framework for Domestic Information Security Education; Focusing on a Two-Track Curriculum Customized by Age and Job)

  • 박민정;이기혁;채상미
    • 정보보호학회논문지
    • /
    • 제31권5호
    • /
    • pp.1083-1095
    • /
    • 2021
  • 최근 사용자의 인터넷 의존성 증가와 각종 IT 디바이스의 보급과 확산에 따라, 과거에 비하여 개인 생활 전반에 정보보호가 미치는 영향력이 확대되었다. 이와 더불어 보안을 위협하는 침해 요인들이 지속적으로 복잡, 다양해지고 가짜뉴스 확산, 온라인 신분 도용, 사이버 불링 등을 비롯한 개인의 안전한 온라인 환경을 위협하는 요소들이 사회적으로 증가함에 따라, 정보보호 전문 인력 양성의 필요성이 증가하고 있다. 나아가 기업의 정보보호 업무 종사자 이외에 사회의 모든 구성원이 정보보안의 위협에서 자유로울 수 없게 됨에 따라, 개인의 정보보호에 대한 인식 제고와 자발적인 정보보호 행동을 유도하기 위한 다양한 정보보호 교육 과정의 마련이 필요하다. 따라서, 본 연구에서는 현재 이루어지고 있는 국내·외 정보보호 교육 과정의 현황과 특징에 대하여 분석한다. 이를 통하여 정보보호 교육 필요성과 교육 체계 수립의 전략을 모색하여 본 연구에서는 국내 환경에 적용 가능한 정보보호 교육 표준 프레임워크를 제시하고자 한다. 이는 개인의 정보보호 인식과 지식 수준을 제고하여 국내 정보보호 전문 인력 양성과 더불어 개인과 조직, 사회 전반의 정보보안 수준을 향상시켜 국가 경쟁력 향상에 기여할 것으로 판단된다.

Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure

  • Ryoo, Jung-Woo;Park, Eun-A
    • Journal of Computing Science and Engineering
    • /
    • 제5권1호
    • /
    • pp.33-50
    • /
    • 2011
  • In this paper we applied our previously developed assessment framework to the data collected from an internet security readiness survey targeted at households. We used the assessment framework to compute an Internet Security Readiness index for each household, which was in turn derived from Internet Security Readiness capital, skill, and actual uptake/use of infrastructure indices. We then examined the relationships among overall Internet Security Readiness, and the capital, skill, and actual uptake/use of infrastructure related to Internet Security Readiness. In addition, we explored the influence of Internet usage level and experience on Internet Security Readiness.

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

  • Park, Jaekwan;Suh, Yongsuk
    • Nuclear Engineering and Technology
    • /
    • 제46권1호
    • /
    • pp.47-54
    • /
    • 2014
  • The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

IT재해복구 연관 프레임워크 비교분석을 통한 ISMS의 통합관리방안 (Research on Integrated Management of ISMS : Comparative Analysis of IT Disaster Recovery Framework)

  • 박유림;김병기;윤오준;길아라;신용태
    • 정보과학회 컴퓨팅의 실제 논문지
    • /
    • 제23권3호
    • /
    • pp.177-182
    • /
    • 2017
  • 정보화 사회는 컴퓨터 및 통신이 발달하여 데이터를 수동으로 관리하기 어려운 정도로 데이터양이 방대해져서 데이터 관리에 어려움을 느끼고, 자연재해 및 해커의 공격 등으로 인해 데이터 손실, 서비스 이용 불가 등 다양한 IT 관련 보안사고가 발생하여 이를 원래대로 복구하기 위한 정보보호 관리체계가 필요하다. 정보보호 관리체계는 다양한 프레임워크들이 존재하는데, IT재해에 의해서 발생한 피해를 복구하기 위한 프레임워크는 Cyber Security Framework, Risk Management Framework, ISO/IEC 27001, COBIT 5.0이 존재하며, 각각의 프레임워크들 중에서 IT재해복구에 해당하는 항목들을 비교분석하고, IT재해가 발생한 경우 신속하게 해결하기 위한 하나의 통합적인 관리 방안에 대해 설명한다.

패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구 (A Study on the Factors Affecting the Information Systems Security Effectiveness of Password)

  • 김종기;강다연
    • Asia pacific journal of information systems
    • /
    • 제18권4호
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.

ICT 융합 산업 환경에서 서비스 지향 프로토콜 보안 프레임워크 (Service-oriented protocol security framework in ICT converged industrial environment)

  • 이성우;이준경;이경학
    • 한국융합학회논문지
    • /
    • 제8권12호
    • /
    • pp.15-22
    • /
    • 2017
  • 본 논문은 ICT 융합 산업인 스마트 공장, 스마트 그리드, 스마트 홈, 스마트 교통, 스마트 헬스 케어 등의 분야에서 사용되는 서비스 기반 프로토콜들의 취약점을 분석하여 보안 위협을 도출하고 이를 탐지 및 차단할 수 있는 기술들을 제안하였다. 또한 프로토콜 공통의 보안 요소를 정의하고 해당 요소를 포함한 프로토콜 계층별 보안 모듈을 설계하여 개방형 환경에서 쉽고 빠르게 보안 기능을 개발할 수 있도록 하는 서비스 지향 프로토콜 보안 프레임워크를 설계하였다. 서비스 프로토콜 독립적인 보안 모듈과 특화된 보안 모듈을 분리한 프레임워크 구조로 개발하여 다양한 프로토콜이 사용되는 ICT 융합 산업 환경에서 유연하고 신속한 융합 보안 시스템 개발이 가능해 질것이다. 더불어 운영 중인 시스템에 필요한 보안 모듈을 탑재하여 ICT 서비스 네트워크의 전반적인 보안 수준을 향상시키고 보안 모듈별 재사용이 가능하여 산업 보안 분야에 생산성이 향상될 것이다.