• 제목/요약/키워드: Security Level Management

검색결과 796건 처리시간 0.022초

정보시스템 도입에 따른 보안기능 컴포넌트 대체 수준 의사결정 (Decision on Replacing Security Components for Infer]nation Systems)

  • 최명길;김현우;김은혜;김세헌
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2004년도 추계학술대회 및 정기총회
    • /
    • pp.147-157
    • /
    • 2004
  • Enterprises and governments currently utilize COTS based information systems which are a kind of component based systems. Especially, COTS are widely utilized as information security systems and information systems including information security functions. This paper suggests an appropriate adaptation level of security functional components and a cost effective priority among them. To make a cost effective decision on adapting security functional components, this paper develops a hierarchical model of information security technologies and analyzes findings through multiple decision-making criteria.

  • PDF

정보보호 거버넌스 효율성 제고를 위한 조직원의 정보보호 행위에 관한 실증 연구 (An Empirical Study of Employee's Deviant Behavior for Improving Efficiency of Information Security Governance)

  • 김혜정;안중호
    • 한국전자거래학회지
    • /
    • 제18권1호
    • /
    • pp.147-164
    • /
    • 2013
  • 지속적인 정보보호 거버넌스를 위해서는 단순히 접근통제, 문서보안 등 기술적인 측면이 아닌 개인의 보안 행위, 문화, 규범, 개인적 가치 등 비공식적인 정보보호 행위를 관리하는데 초점을 맞추어야 한다. 그러나 많은 연구들이 정보보호 규정과 같은 공식적인 수준의 거버넌스나 기술과 같은 수단에 집중하고 있는 실정이며, 개인의 정보보호 위반 행위와 개인적 신념, 규범, 문화, 개인적 가치 등 비공식적인 수준에 대한 연구는 거의 이루어지지 않고 있다. 이에 본 연구는 정보보호 문화, 규범적 신념, 행위, 가치가 정보보호 규정 위반 행위에 어떠한 영향을 미치는 지에 대해 실증하였다. 또한 본 연구에서는 사회조직적 관점의 아노미 개념을 이용하여 조직 내에서 정보보호 규정의 중요성에 대한 인식 결핍과 정보보호 규정의 가치 결여를 '정보보호 아노미 현상'으로 정의하고, 이를 바탕으로 정보보호 문화, 규범, 행위, 가치가 정보보호 규정 위반 행위에 미치는 영향에 있어 정보보호 아노미 현상이 어떠한 역할을 하는지에 대해 실증분석을 수행하였다.

운영 수준에서의 산업보안 관리대책 중요도 결정 (Decision Making for the Industrial Security Management Measures' Importance in Operation Level)

  • 채정우;정진홍
    • 한국콘텐츠학회논문지
    • /
    • 제13권4호
    • /
    • pp.389-398
    • /
    • 2013
  • 본 연구는 산업보안활동을 수행함에 있어, 운영 수준의 관리대책에 대한 전략적 우선순위 결정을 통해 합리적인 보안투자 의사결정 지원을 목적으로 하였다. 이를 위해 산업보안전문가들을 대상으로 AHP 설문조사를 시행, 분석하여 산업보안 관리대책들의 중요도와 우선순위를 결정하였다. 상위기준 비교평가에서는 'ICT서비스 사용관리'가 가장 높은 가중치(0.54)를 보였다. 하위기준은 중요도 순으로 3개 그룹으로 구분할 수 있었다. 민감도 분석결과, 'ICT시스템/통신망 접근통제'의 가중치를 2배 높이면 그 하위기준인 '운영체제 접근통제', '애플리케이션 접근통제', '유무선 네트워크 접근통제'의 전체 순위가 상위권으로 진입하였다. '물리/환경적 보안'의 가중치를 2배 높이면 그 하위기준인 '보호구역 설정 및 출입/접근통제'와 '업무설비방재/대테러 보호 배치'는 전체 순위가 상위권으로, '전원 등 유틸리티 상시 확보'는 중위권으로 상승함을 확인할 수 있었다.

A Study on the Development Plan of Smart City in Korea

  • KIM, Sun-Ju
    • 융합경영연구
    • /
    • 제10권6호
    • /
    • pp.17-26
    • /
    • 2022
  • Purpose: This study analyzes advanced cases of overseas smart cities and examines policy implications related to the creation of smart cities in Korea. Research design, data, and methodology: Analysis standards were established through the analysis of best practices. Analysis criteria include Technology, Privacy, Security, and Governance. Results: In terms of technology, U-City construction experience and communication infrastructure are strengths. Korea's ICT technology is inferior to major countries. On the other hand, mobile communication, IoT, Internet, and public data are at the highest level. The privacy section created six principles: legality, purpose limitation, transparency, safety, control, and accountability. Security issues enable urban crime, disaster and catastrophe prediction and security through the establishment of an integrated platform. Governance issues are handled by the Smart Special Committee, which serves as policy advisory to the central government for legal system, standardization, and external cooperation in the district. Conclusions: Private technology improvement and participation are necessary for privacy and urban security. Citizens should participate in smart city governance.

Efficiency of Innovative Development Management: Interstate Assessment of the Economic Competitiveness in the Context of European Integration and Economic Security

  • Khodakivska, Olga;Ramos, Olena Ribeiro;Nechyporenko, Oleksandr;Tsiutsiupa, Svitlana;Krasnoshtan, Olexander;Mayovets, Yaryna
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.67-72
    • /
    • 2021
  • The article identifies areas for effective management of innovative development. The competitiveness of the economy in the context of European integration and economic security is assessed. The level of innovative economy of some countries of the world is analyzed. The issue of attracting foreign investors to stimulate innovative production in Ukraine is raised. It is identified the need for the formation of an updated state policy capable of providing innovative development and improving the competitive position of the state in international rankings. Emphasis is placed on the need to form a critical mass of managers-civil servants capable of developing, implementing and monitoring the policy of innovative development of entrepreneurship.

전시 국민생활안정 유지방안 (Policy Plans for the Maintenance of Public Security of Living During the War)

  • 길병옥
    • 안보군사학연구
    • /
    • 통권5호
    • /
    • pp.131-172
    • /
    • 2007
  • Government duties in the cases of crisis are aimed at supporting efficient military operations in the fields of non-military affairs and resource mobilization, maintenance of government functions, and search for the public security of living during the war. In crisis, the government must change its functions into the total-war system with all resources available for the efficient performance of military operations, war economy, public safety and security as well as government continuance. The main contents of "Chung-Mu Plan" include the alternative measures to control the circulation of life necessities, emergency electricity, water and gas; recover public facilities from the disaster; and accommodate the wounded and refugees. Governments have practiced Ul-chi and ChungMoo exercises to improve government's management capabilities and master standard operating procedures including systematic distribution plans in the national and local level. However, such plans have not yet sufficient enough for the maintenance of public security of living. In addition to the conceptual ambiguity, major problems are the inappropriate system of the war economy, legal institutions, and administrative SOPs for the efficient maintenance of it. Thus, for the betterment of national crisis management system, the government should have the manual stated from every step and level dealing with crisis to the legal institutions. It is important to empower the National Emergency Planning Commission for the policy consistency and efficient/effective implementation. The comprehensive plans must have an integrated cooperative system of the central/local governments, military and civil society with actual practices and exercises for the maintenance of the public security of living.

  • PDF

A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study

  • Kim, Hwankuk;Lee, Kyungho;Lim, Jongin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4588-4608
    • /
    • 2017
  • The measurement of information security levels is a very important but difficult task. So far, various measurement methods have studied the development of new indices. Note, however, that researches have focused on the problem of attaining a certain level but largely neglecting research focused on the issue of how different types of possible flaws in security controls affect each other and which flaws are more critical because of these effects. Furthermore, applying the same weight across the board to these flaws has made it difficult to identify the relative importance. In this paper, the interrelationships among security flaws that occurred in the security controls of K-ISMS were analyzed, and the relative impact of each security control was measured. Additionally, a case-control study was applied using empirical data to eliminate subjective bias as a shortcoming of expert surveys and comparative studies. The security controls were divided into 2 groups depending on whether or not a security flaw occurs. The experimental results show the impact relationship and the severity among security flaws. We expect these results to be applied as good reference indices when making decisions on the removal of security flaws in an enterprise.

정보시스템 감리에서의 정보보호 감리모형 설계 (A Design on the Information Security Auditing Framework of the Information System Audit)

  • 이지용;김동수;김희완
    • 디지털산업정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.233-245
    • /
    • 2010
  • This paper proposes security architecture, security audit framework, and audit check item. These are based on the security requirement that has been researched in the information system audit. The proposed information security architecture is built in a way that it could defend a cyber attack. According to its life cycle, it considers a security service and security control that is required by the information system. It is mapped in a way that it can control the security technology and security environment. As a result, an audit framework of the information system is presented based on the security requirement and security architecture. The standard checkpoints of security audit are of the highest level. It was applied to the system introduction for the next generation of D stock and D life insurance company. Also, it was applied to the human resources information system of K institution and was verified. Before applying to institutions, system developers and administrators were educated about their awareness about security so that they can follow guidelines of a developer security. As a result, the systemic security problems were decreased by more than eighty percent.

공공기관 정보보호 거버넌스 수준에 영향을 미치는 요인에 관한 연구 (A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies)

  • 송정석;전민준;최명길
    • 한국전자거래학회지
    • /
    • 제16권1호
    • /
    • pp.133-151
    • /
    • 2011
  • 공공기관은 정보보호를 강화하기 위하여 정보보호 거버넌스 체제를 도입하고 있다. 공공기관은 정보보호 거버넌스 체계의 중요성을 인식하고, 정보보호 거버넌스의 확립을 위해서 정책 수립 및 제도 확립에 노력을 기울이고 있다. 본 연구는 공공기관의 정보보호 거버넌스 수준에 영향을 미치는 요인을 탐색하기 위하여 정보보호 거버넌스 수준 측정 모형과 요인 모형을 개발한다. 본 연구는 공공기관 정보보호 거버넌스 수준은 최고경영층의 지원에 의해서 결정되며, 공공기관 정보보호 거버넌스는 정보보호 예산 및 정보화 담당 부서의 규모와 밀접한 관련이 있음을 제시한다. 본 연구의 결과는 공공기관의 정보보호 거버넌스 확립을 위한 정책 방향을 제시한다.

관개용 댐의 효율적 저수관리를 통한 밭 관개 용수 확보 (Security of Upland Irrigation Water through the Effective Storage Management of Irrigation Dams)

  • 이주용;김선주;김필식
    • 한국농공학회논문집
    • /
    • 제48권2호
    • /
    • pp.13-23
    • /
    • 2006
  • In Korea, upland irrigation generally depends on the ground water or natural rainfall since irrigation water supplied from dams is mainly used for paddy irrigation, and only limited amount of irrigation water is supplied to the upland area. For the stable security of upland irrigation water, storage level of irrigation dams was simulated by the periods. A year was divided into 4 periods considering the irrigation characteristics. Through the periodical management of storage level, water utilization efficiency in irrigation dams could be enhanced and it makes available to secure extra available water from existing dams without new development of water resources. Two study areas, Seongju and Donghwa dam, were selected for this study. Runoff from the watersheds was simulated by the modified tank model and the irrigation water to upland crops was calculated by the Penman-Monteith method. The analyzed results showed that relatively sufficient extra available water could be secured for the main upland crops in Seongju area. In case of Donghwa area, water supply to non-irrigated upland was possible in normal years but extra water was necessary in drought years such as 1998 and 2001.