• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.027 seconds

Comparative Analysis of Cyber Attacks of Korea Government and Policy Countermeasures (한국의 사이버공격 비교 분석과 정책적 대응방안)

  • Kwon, Hyeokchun;Lee, Youngjun;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.19-26
    • /
    • 2020
  • The purpose of this paper is to ccompare and analyze North Korean cyber attacks and our responses by government, from the Roh Moo-hyun administration to the Moon Jae-in administration. The current conflict of interests on the Korean peninsula, such as the United States, China, and Russia, is leading to a conflict for the leadership of a new world order in cyberspace. Cyber attacks are accelerating and threats are rising. Cyber threats exhibit several characteristics. Above all, it is difficult to identify or track the subject of the threat. Also, with the development of information and communication technology, attack technology has become more intelligent, and it is not easy to prepare a means to respond. Therefore, it is necessary to improve continuous and preemptive response capacity for national cybersecurity, and to establish governance among various actors, such as international cooperation between countries or private experts.

A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services (신규 IT 서비스에 대한 정보보호 등급 인증 타당성 연구)

  • Chang, Hang Bae;Joe, Tae Hee;Kim, Hyo Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.113-119
    • /
    • 2009
  • In this study we analyzed and gauged the information security needs for the new IT service which will be proceeding. Then we designed Information Security Rank Authentication System to raise the level of information security. To achieve this study, we analyzed rank authentication system of the inside and outside of the country and developed the practical propulsive system and the evaluation model which reflects IT service's own feature differing from the general evaluation of IS information security. The result of this study can be utilized to assess the level of domestic IT service information security objectively, and it can be applied as the means of rational decisionmaking for establishing a policy to raise degree of information security of corporations providing IT service.

  • PDF

PSECF (Policy Streams & Expert Group Standing Change Framework) for Wartime Operational Control Transition (전시작전통제권 전환에 관한 정책흐름 및 전문가집단 위상변동모형 사례분석)

  • Park, SangJung;Koh, Chan
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.37-47
    • /
    • 2014
  • This study applies Policy Streams and Expert Group Standing Change Framework (PSECF) proposed by SangJung Park and Chan KOH to analyze the Roh's Participatory government's decision making process on the wartime Operational Control (OPCON) transition. PSECF case study's results are as follows: Strong commitments of the former president Roh Moohyun and the progressive National Security Committee (NSC) were primary drivers in the policy developing process. But military expert groups such as the Ministry of National Defense (MND) and the Joint Chiefs of Staffs (JCS) were thoroughly excluded due to their passive role against the wartime OPCON transition. After the policy resolution, the standing of expert groups changed: the standing of advocate effects, the former progressive NSC who led the wartime OPCON transition in the Roh's Participatory government, went down but the conservatives such as ROK MND and JCS improve their standing because the conservative government kicks off 8 months later from the policy decision. In conclusion, the proposed PSECF through the Roh's Participatory government's case-study is worthy as an explanatory framework for high level national policies.

An Study on the Effects of ISMS Certification and the Performance of Small and Medium Enterprises (중소기업에 대한 ISMS 인증효과와 영향요인에 관한 연구)

  • Kim, In Kwan;Park, Jaemin;Jeon, Joong Yang
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.47-60
    • /
    • 2013
  • This paper focuses on the role of international standards related to industrial technology and to analyze determinants to affect ISMS and its performance. Particularly its financial and operational performance were measured by survey aiming at an influence of certification and its performances. The variables explaining the performance were drawn out from factor analysis and then critical variables to affect performance were discovered by ANOVA and regression analysis. As a result of the analysis considering heteroscedastic and factor analysis, type of business and firm size were not significantly related to the performance but the existence of information security unit, investment in information security and the status of security consciousness in executives and employees were positively related. As a result, this study shows that security certification should be implemented with suitable capabilities and the investments to protect from leaking industrial technology and proved the importance of the security certification as an infrastructures and system.

Kubernetes of cloud computing based on STRIDE threat modeling (STRIDE 위협 모델링에 기반한 클라우드 컴퓨팅의 쿠버네티스(Kubernetes)의 보안 요구사항에 관한 연구)

  • Lee, Seungwook;Lee, Jaewoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1047-1059
    • /
    • 2022
  • With the development of cloud computing technology, container technology that provides services based on a virtual environment is also developing. Container orchestration technology is a key element for cloud services, and it has become an important core technology for building, deploying, and testing large-scale containers with automation. Originally designed by Google and now managed by the Linux Foundation, Kubernetes is one of the container orchestrations and has become the de facto standard. However, despite the increasing use of Kubernetes in container orchestration, the number of incidents due to security vulnerabilities is also increasing. Therefore, in this paper, we study the vulnerabilities of Kubernetes and propose a security policy that can consider security from the initial development or design stage through threat analysis. In particular, we intend to present a specific security guide by classifying security threats by applying STRIDE threat modeling.

Design of Blockchain Model for Ransomware Prevention (랜섬웨어 방지를 위한 블록체인 활용 모델에 대한 설계)

  • An, Jung-hyun;Kim, Ki-chun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.314-316
    • /
    • 2017
  • Ransomware, a malicious program that requires money and then locks computers and files on network users for financial harvesting, will continue to evolve. Ransomware is a threat in mail systems that send and receive business information. By using Block Chain, Distributed Ledger technology, it is designed to be a safe mail system in which the automatically generated Ramsomware symptom data is directly linked to the security policy in the enterprise.

  • PDF

The Standardization Modeling concerning Organizational Composition and a Management System for the Protection of Personal Information (개인정보 보호를 위한 조직구성과 관리체계에 관한 표준화 모델링)

  • Seo, Woo Seok;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.33-39
    • /
    • 2012
  • Since the passing of the Personal Information Act in March 2011 and its initial introduction in September, over the one year to date diverse security devices and solutions have been flowing into the market to enable observance of the relevant laws. Beginning with security consulting, corporations and institutions have focused on technology-based business in order to enable observance of those laws competitively in accordance with 6-step key procedures including proposal, materialization, introduction, construction, implementation, and execution. However there has not been any investment in human resources in the field of education such as technology education and policy education relative to the most important human resources field nor investment in professionals in the organization for the protection of personal information or in human resources for operating and managing IT infrastructure for actual entire personal information such as special sub-organizations. In this situation, as one process of attracting change from the nature of the technology-based security market toward a professional human resource-based security infrastructure market, it is necessary to conduct research into standardization modeling concerning special organizational composition and a management system for the protection of personal information.

A Study on security policy for vitalizing financial company cloud (금융회사 클라우드 활성화를 위한 보안 정책 연구)

  • Im, Je-sang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.4
    • /
    • pp.199-205
    • /
    • 2017
  • As cloud computing can utilize the proper allocation of system resources, it can be expected to have great benefits in terms of maintaining availability and reducing costs when a cloud is applied to a financial company's computer system. Although some provisions of the Financial Supervisory Regulation were revised in October 2016, this is limited to non-critical information processing systems, limits are remain whitch the application of cloud computing to the whole computer system of financial companies including electronic financial systems. In this paper, cloud security requirements are studied for the application of financial company's computational infrastructure system.

A Study on the Promotion Method of Domestic Video Security Industry (국내 영상보안산업 활성화 방안 연구)

  • Yoo, Soonduck;Ryu, Daehyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.9-21
    • /
    • 2017
  • The purpose of this study is to identify the current situation and actual condition of the video security industry, The research method was based on interviews with twelve specialists, and examined the market trends, the problems of the video security industry, the improvement plan and the government promotion strategy. The problem with the domestic video security industry is that there are the decline in overseas exports and the slowdown in exports to China, insufficient measures to overcome certification barriers due to the strengthening of national certification system, domestic demand growth slowed, expansion of domestic market share of Chinese products, lack of high-tech development of domestic products, lack of expertise in technology development and operation and inadequate legislation for revitalizing the video security industry. The improvement plan is as follows. Need to implement export expansion support policy, need to build tailored response system for each country, need improvement of security related demand creation system, take measures such as domestic industrial protection policy, certification barriers and tariff barriers, induce future core technology to create high added value. The government also needs to actively support human resources development, and induce stabilization of relevant laws and institutions. This study will contribute to the development of related industries by suggesting the development direction of the video security industry.

The legal issues on the fintech and e-commerce payment (전자상거래 지급결제의 핀테크 활성화를 위한 보안 및 법제도적 과제)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.25-31
    • /
    • 2015
  • While information and communication develop, the Electronic commerce payment system is progressing. Recently, a government established the electronic commerce activation policy which simplified a payment Through this policy, the information which the financial company monopolizes can be fused with the other industry and create the popularization use of the electronic payment service and value added services. But on the other hand, the concern for the security is very high, Accordingly, the finnancial institute take a restriction of the requirements for the participation company according to the financial scale, this policy is led by the private institue, rather making a participation of fin tech venture difficulty. This paper tries to deal with the technical and legal problems for the activation of electronic payment system and fin tech. So I will examine the security matter that follows in grifting the innovation technology onto the existing payment service and propose a desirable way to improve the current legislation.