• 제목/요약/키워드: Security Management Framework

검색결과 366건 처리시간 0.024초

연속성관리 구축 프레임워크 모색에 관한 연구 (A Study on Continuity Management framework to build)

  • 고재철;나성진;정종수
    • 한국방재안전학회논문집
    • /
    • 제9권1호
    • /
    • pp.1-7
    • /
    • 2016
  • 현재 연속성관리체계로 가장 널리 사용되고 있는 BCM(Business Continuity Management) 또는 BCP(Business Continuity Planning)을 기반으로 한 금융분야의 모범규준 및 구축사례는 많이 있었으나, 민간의 시설관리 분야 및 공공기관의 국가기반 체계에 실질적으로 적용 가능한 표준화된 연속성관리체계 구축 프레임워크에 대한 연구는 미미한 실정이다. 따라서 본 연구에서는 국내외 연속성관리 프레임워크의 비교와 시설관리 분야의 특성을 고려한 연속성관리 구성요소의 검토를 통해 민간 시설관리 분야 및 공공기관에 적합한 시설관리 분야의 연속성관리체계 구축 프레임워크를 모색하는 연구를 하고자 한다.

모바일 IPTV 환경에 적합한 DCAS 보안 프레임워크 연구 (A Study on DCAS Security Framework Model for Mobile IPTV)

  • 최중영;조관태;임종인
    • 정보보호학회논문지
    • /
    • 제21권1호
    • /
    • pp.105-116
    • /
    • 2011
  • 모바일 IPTV는 무선 인터넷 망을 이용하여 IPTV의 양방향 서비스에 이동성을 함께 제공함으로써 사용자의 편의를 증대시킬 수 있는 기술이다. 이러한 모바일 IPTV 서비스는 더욱 많은 수요를 불러올 것으로 예상되는데, 성공적인 사업화와 서비스 활성화를 위해서는 무선 환경과 모바일 통신단말기를 이용한 콘텐츠 보호 등 다양한 기술적 이슈를 해결해야 한다. 본 논문에서는 모바일 IPTV 특성과 모바일 IPTV 서비스를 위한 보안 요구사항을 살펴보고, 그에 따라 요구되는 콘텐츠 보안의 문제점들을 살펴보고자 한다. 또한 이를 해결하기 위한 모바일 IPTV환경에서 DCAS 보안 프레임워크 모델을 제시하고, 기존 DCAS에 비하여 개선된 사항을 평가한다.

정책기반 네트워크 관리 시스템의 정책 충돌 탐지 및 복구 (Detection and Recovery of Policy Conflicts in Policy-based Network Management Systems)

  • 이규웅
    • 한국IT서비스학회지
    • /
    • 제6권2호
    • /
    • pp.177-188
    • /
    • 2007
  • Policy-based Network Management (PBNM) has been presented as a paradigm for efficient and customizable management systems. The approach chosen is based on PBNM systems, which are a promising and novel approach to network management. These systems have the potential to improve the automation of network management processes. The Internet Engineering Task Force (IETF) has also used policy concepts and provided a framework to describe the concept as the Policy Core Information Model (PCIM) and its extensions. There are policy conflicts among the policies that are defined as the policy information model and they are not easily and effectively detected and resolved. In this paper, we present the brief description of PBNM and illustrate the concepts of policy core information model and its policy implementation for a network security. Especially we describe our framework for detecting and resolving the policy conflicts for network security.

Secure and Resilient Framework for Internet of Medical Things (IoMT) with an Effective Cybersecurity Risk Management

  • Latifah Khalid Alabdulwahhab;Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.73-78
    • /
    • 2024
  • COVID-19 pandemic outbreak increased the use of Internet of Medical Things (IoMT), but the existing IoMT solutions are not free from attacks. This paper proposes a secure and resilient framework for IoMT, it computes the risk using Risk Impact Parameters (RIP) and Risk is also calculated based upon the Threat Events in the Internet of Medical Things (IoMT). UICC (Universal Integrated Circuit Card) and TPM (Trusted Platform Module) are used to ensure security in IoMT. PILAR Risk Management Tool is used to perform qualitative and quantitative risk analysis. It is designed to support the risk management process along long periods, providing incremental analysis as the safeguards improve.

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

사이버 보안 분야 전문가 프로파일 관리 시스템 연구 (Development of a Cybersecurity Workforce Management System)

  • 안준영;이승훈;박희민;김현철
    • 반도체디스플레이기술학회지
    • /
    • 제20권3호
    • /
    • pp.65-70
    • /
    • 2021
  • According to the trend of increasingly sophisticated cyber threats, the need for technology research that can be applied to cyber security personnel management and training systems is constantly being raised not only overseas but also in Korea. Previously, the US and UK have already recognized the need and have been steadily conducting related research from the past. In the United States, by encouraging applications based on related research (NICE Cybersecurity Workforce Framework) and disclosing successful use cases to the outside, it is laying the groundwork for profiling cyber security experts. However in Korea, research on cyber security expert training and profiling is insufficient compared to other countries. Therefore, in this study, in order to create a system suitable for the domestic situation, research and analysis of cases in the United States and the United Kingdom were conducted over the past few years, and based on this, a prototype was produced for the study of profiling technology for domestic cyber security experts.

Secure Healthcare Management: Protecting Sensitive Information from Unauthorized Users

  • Ko, Hye-Kyeong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.82-89
    • /
    • 2021
  • Recently, applications are increasing the importance of security for published documents. This paper deals with data-publishing where the publishers must state sensitive information that they need to protect. If a document containing such sensitive information is accidentally posted, users can use common-sense reasoning to infer unauthorized information. In recent studied of peer-to-peer databases, studies on the security of data of various unique groups are conducted. In this paper, we propose a security framework that fundamentally blocks user inference about sensitive information that may be leaked by XML constraints and prevents sensitive information from leaking from general user. The proposed framework protects sensitive information disclosed through encryption technology. Moreover, the proposed framework is query view security without any three types of XML constraints. As a result of the experiment, the proposed framework has mathematically proved a way to prevent leakage of user information through data inference more than the existing method.

지리정보시스템 서비스 보안을 위한 프레임워크 (A Framework for a Secure Geometric Information System)

  • 주운기;임기욱
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 2002년도 춘계공동학술대회
    • /
    • pp.724-728
    • /
    • 2002
  • This paper considers a security framework for geographic information System(GIS). The GIS is an information system for supporting fast decision associated spacial problems and the system has a role of infra structure of the information system. The security is also one of the major technology for information system. However, researches on secure GIS are presented little and this paper considers the secure GIS. This paper suggest a framework for the secure GIS based on derived requirements on the secure system. Analysis on security for a serial, parallel and hierarchical secure system is also added.

  • PDF

안전한 전력 제어시스템 설계를 위한 위험관리 프레임워크 제안 (A Proposal of Risk Management Framework for Design as a Secure Power Control System)

  • 박준용;신수민;송경영
    • 정보보호학회논문지
    • /
    • 제26권2호
    • /
    • pp.425-433
    • /
    • 2016
  • 지능형 전력망에서 전력 서비스의 효율성 및 상호운용성 확보를 위한 지능형 전력망과 외부망 연계로 인해 전력 제어시스템을 대상으로 한 공격 위협이 증가하고 사이버테러의 주요 목표가 되고 있어 이에 따른 안전한 시스템 설계가 중요한 화두로 등장하고 있다. 일반적으로 SSDLC를 적용하여 설계 단계에서부터 위험에 대한 관리를 하고 있으나 전력 제어 시스템의 특성을 고려한 사항은 부족한 실정이다. 따라서, 전력 제어시스템의 진단 모형 및 평가 프로세스 설계가 가능하고 정보보안 방향성 및 관련 지표를 제공하기 위해, IEC 62351 TC 57에서 제시한 운영보안통제 사항 및 표준 아키텍처에 전사적 위험관리 프레임워크를 응용한 전력 제어시스템 위험관리 프레임워크를 제안하고자 한다.

개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구 (Personal Information Management System (PIMS) improvement research using cloud computing security)

  • 정혜인;김성준
    • 디지털산업정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.