• Title/Summary/Keyword: Security Management Framework

검색결과 366건 처리시간 0.023초

데이터보안인증을 위한 DSMS 프레임워크 구축 연구 (A Study on DSMS Framework for Data Security Certification)

  • 유승재
    • 융합보안논문지
    • /
    • 제19권4호
    • /
    • pp.107-113
    • /
    • 2019
  • 데이터보안(Data Security)이란 데이터 및 정보자산의 접근, 활용에 대한 적절한 인증과 권한의 감사를 위하여 보안정책 및 절차를 기획, 구축, 실행하는 것이다. 또한 내·외부 네트워크, 서버, 어플리케이션 등을 통해 서비스되는 데이터는 정보보호의 핵심 대상으로서 데이터베이스와 데이터의정보보안의 범주에서 DB와 DB내에 저장된 데이터의 보호에 특화하여 집중하는 것이라 할 수 있다. 이 연구에서는 데이터보안 인증체계와 미국의 연방보안관리법(FISMA)을 기반으로 한 적절한 데이터보안관리체계(DSMS, Data Security Management System) 모델 설계를 위한 기초연구를 진행한다. ISO27001, NIST의 Cybersecurity Framework 등 주요보안인증 제도를 살펴보고 또한 현재 개인 데이터 유출방지와 기업보안강화를 위한 보안플렛폼으로 구현된 데이터보안매니저 솔루션에 구현된 상태를 연구한다.

정보보호를 위한 인적자산 관리지표 실증 연구 (An Empirical Research on Human Factor Management Indicators for Information Security)

  • 차인환;김정덕
    • 정보보호학회논문지
    • /
    • 제19권6호
    • /
    • pp.153-160
    • /
    • 2009
  • 본 논문은 인적자산 보안관리에 관한 프레임워크를 개발하였고 이를 기반으로 관리지표와 보안수준 제고 요인을 도출하고 이를 실증적으로 분석한 연구이다. 인적자산 보안관리 프레임워크는 인원보증(Personnel Assurance), 개인역량(Personnel Competence), 보안 통제(Security Control) 분야로 구성되어 있으며, 관리지표는 9개 항목의 26개 지표로 도출되었다. 또한 보안수준 제고 요인은 보안인지, 규칙준수, 실수억제 항목으로 도출되었다. 연구결과, 보안관리 지표와 관리수준 제고 항목의 실증분석 결과는 대부분 부합성과 유의성을 가지고 있었으며 조직의 인적자산 보안관리 시 유용하게 적용될 것으로 기대된다.

Agent Based Information Security Framework for Hybrid Cloud Computing

  • Tariq, Muhammad Imran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.406-434
    • /
    • 2019
  • In general, an information security approach estimates the risk, where the risk is to occur due to an unusual event, and the associated consequences for cloud organization. Information Security and Risk Management (ISRA) practices vary among cloud organizations and disciplines. There are several approaches to compare existing risk management methods for cloud organizations but their scope is limited considering stereo type criteria, rather than developing an agent based task that considers all aspects of the associated risk. It is the lack of considering all existing renowned risk management frameworks, their proper comparison, and agent techniques that motivates this research. This paper proposes Agent Based Information Security Framework for Hybrid Cloud Computing as an all-inclusive method including cloud related methods to review and compare existing different renowned methods for cloud computing risk issues and by adding new tasks from surveyed methods. The concepts of software agent and intelligent agent have been introduced that fetch/collect accurate information used in framework and to develop a decision system that facilitates the organization to take decision against threat agent on the basis of information provided by the security agents. The scope of this research primarily considers risk assessment methods that focus on assets, potential threats, vulnerabilities and their associated measures to calculate consequences. After in-depth comparison of renowned ISRA methods with ABISF, we have found that ISO/IEC 27005:2011 is the most appropriate approach among existing ISRA methods. The proposed framework was implemented using fuzzy inference system based upon fuzzy set theory, and MATLAB(R) fuzzy logic rules were used to test the framework. The fuzzy results confirm that proposed framework could be used for information security in cloud computing environment.

보안관제 조직을 위한 사이버보안 프레임워크 개선에 관한 연구 (A Study on Improvement of Cyber Security Framework for Security Operations Center)

  • 조창섭;신용태
    • 융합보안논문지
    • /
    • 제19권1호
    • /
    • pp.111-120
    • /
    • 2019
  • 사이버공격이 지능화되고 고도화되면서 이를 체계적으로 대응하기 위한 보안관제센터(SOC : Security Operations Center)의 중요성이 높아지고 있고, SOC의 규모와 그 수도 늘어나고 있다. 각 기관 및 조직에서 다양한 사이버보안 표준을 활용하여 업무 절차를 만들어 사용하고 있으나 SOC는 자체 인력보다는 보안관제전문기업과 협업하는 경우가 많아 SOC환경에 맞게 개선이 필요하다. NIST 사이버보안 프레임워크(CSF : Cybersecurity Framework)와 정보보호관리체계 그리고 보안관제전문기업의 업무절차를 비교 분석한 결과 NIST CSF가 보안관제에 적용하기 용이한 프레임워크이나 국내 SOC에 적용하기 위해서는 SOC의 운영 및 관리 부분이 추가적으로 보완될 필요가 있다. 따라서 본 연구에서는 NIST CSF를 참조 모형으로 하여 SOC환경에 필요한 관리적 항목을 도출하였으며 각 항목에 대한 필요성, 중요성, 용이성을 델파이 조사방식으로 검증하고 개선된 사이버보안 프레임워크를 제안하였다.

산업융합환경을 위한 보안 거버넌스 프레임워크 설계 (A Design on Security Governance Framework for Industry Convergence Environment)

  • 이효직;나원철;성소영;장항배
    • 한국융합학회논문지
    • /
    • 제6권4호
    • /
    • pp.33-40
    • /
    • 2015
  • 산업과 ICT 기술간의 융합으로 새로운 부가가치를 창출할 수 있는 융합환경이 도래되어짐에 따라 경제성장과 더불어 우리의 삶의 질이 향상 되고 있지만 이러한 융합환경은 다수의 이익만을 제공하는 것이 아니라 융복합적인 보안 위협이 발생됨에 따라 다양한 보안문제를 발생시켰다. 이러한 보안 문제를 해결하기 위해서는 기존의 기술적인 접근으로 단편적인 보안 문제 해결방식이 아닌 통합적인 관점에서 보안문제를 접근할 필요가 있다. 그래서 본 연구에서는 전략적 관점, 관리적/운영적관점, 기술적 관점 등 다차원적인 관점에서 신뢰성 있는 보안 거버넌스 관리를 할 수 있도록 인적측면이 고려되어진 보안 거버넌스 프레임워크를 개발하였다. 그래서 이 프레임워크를 통해 보안 관리에 대한 단일 기준을 제시함으로서 최고 경영진들의 직접적인 관여가 가능하고 조직구성원들이 스스로 보안활동을 수행하고 책임 질수 있는 신뢰성 있는 보안관리체계를 구축할 수 있을 것이다.

Exploratory Autopsy on Digital Payment Models

  • Wang, Tao;Kim, Chang-Su;Kim, Ki-Su
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2007년도 International Conference
    • /
    • pp.646-651
    • /
    • 2007
  • Secure digital payment is critical in the successful shaping of global digital business. Digital payments are increasingly being used as a substitute to traditional payments, contributing markedly to the efficiency of the economy. The focus of every digital business transaction is to minimize risks arising from transactions. It is essential to ensure the security of digital payment whether used in internal networks or over wireless Internet. This paper analyses secure digital payment methods from the viewpoint of systemic security and transaction security. According to comparative analysis of digital payment models, this paper proposes a comparative analysis framework to investigate and evaluate secure digital payment. In conclusion, the comparative analysis framework, comparison of digital payment models and mobile payment models proposes a useful academic and practical foundation to enhance the understanding of secure digital payment methods. It also provides academic background and practical guidelines for the development of secure digital payment systems.

  • PDF

Developing a Framework for the Implementation of Evidence Collection System: Focusing on the Evaluation of Information Security Management in South Korea

  • Choi, Myeonggil;Kang, Sungmin;Park, Eunju
    • Journal of Information Technology Applications and Management
    • /
    • 제26권5호
    • /
    • pp.13-25
    • /
    • 2019
  • Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the '6. Information System Security' of 'information security management actual condition evaluation index'. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • 제5권4호
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

Professional Security Management and Investigation for the New Competitive Advantage

  • Button, Mark;Lee, Ju-Lak;Kim, Hak-Kyong
    • International Journal of Contents
    • /
    • 제7권3호
    • /
    • pp.71-81
    • /
    • 2011
  • This paper is mainly associated with setting out an agenda for the transformation of security by creating a new framework for a security system, which can maximise its effectiveness. Noticeably, this research shows empirically that crimes are getting a major cost to organisations, which if reduced by security and investigations could reap substantial rewards to the finances of an organisation. However, the problem is that the delivery of security is frequently delegated to personnel (e.g. security guards) with limited training, inadequate education, and no real commitment to professionalism - 'sub-prime' security, finally causing security failures. Therefore, if security can be enhanced to reduce the crime cost, this will produce financial benefits to business, and consequently could produce a competitive advantage. For this, the paper basically draws upon Luke's theoretical framework for deconstructing 'power' into three dimensions. Using this three-dimensional approach, the paper further sets out a model of how security can be enhanced, utilising a new Security Risk Management (SRM) model, and how can this SRM model create competitive advantage in business. Finally, this paper ends with the six strategies needed to enhance the quality of security: refiguring as SRM, Professional Staff, Accurate Measurement, Prevention, Cultural Change, and Metrics.

정보보호 거버넌스 프레임워크 개발에 관한 연구 (A Research on the Development of Information Security Governance Framework)

  • 이성일;황경태
    • Journal of Information Technology Applications and Management
    • /
    • 제18권2호
    • /
    • pp.91-108
    • /
    • 2011
  • Enormous losses of shareholders and consumers caused by the risks threatening today's business (e.g., accounting fraud and inside trading) have ignited the necessity of international regulations on corporate ethics and internal control, such as Basel II and SOX. Responding to these regulations, companies are establishing governance system, applying it consistently to the core competency of the company, and increasing the scope of the governance system. Recently occurred security related incidents require companies to take more strict accountability over information security. One of the results includes strengthening of legislation and regulations. For these reasons, introduction of information security governance is needed. Information security governance governs the general information security activities of the company (establishment of information security management system, implementation of information security solutions) in the corporate level. Recognizing that the information security is not restricted to IT domain, but is the issue of overall business, this study develops information security governance framework based on the existing frameworks and systems of IT governance. The information security governance framework proposed in the study include concept, objective, and principle schemes which will help clearly understand the concepts of the information security governance, and execution scheme which will help implement proper organization, process and tools needed for the execution of information security governance.