• Title/Summary/Keyword: Security controls

Search Result 201, Processing Time 0.025 seconds

A study on classification of the security controls for the effective implementation to nuclear power plant

  • Han, Sang Min;Lee, Chanyoung;Chae, Young Ho;Seong, Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.54 no.4
    • /
    • pp.1245-1252
    • /
    • 2022
  • As regulatory bodies require full implementation of security controls in nuclear power plants (NPPs), security functions for critical digital assets are currently being developed. For the ultimate introduction of security controls, not alternative measures, it is important to understand the relationship between possible cyber threats to NPPs and security controls to prevent them. To address the effectiveness of the security control implementation, this study investigated the types of cyber threats that can be prevented when the security controls are implemented through the mapping of the reorganized security controls in RS-015 to cyber threats on NPPs. Through this work, the cyber threat that each security control can prevent was confirmed, and the effectiveness of several strategies for implementing the security controls were compared. This study will be a useful reference for utilities or researchers who cannot use design basis threat (DBT) directly and be helpful when introducing security controls to NPPs that do not have actual security functions.

The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness (정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로)

  • Kim Jong-Ki;Jeon Jin-Hwan;Lim Ho-Seob
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

A Study on Improving Security Controls in the Electronic Financial Transaction (전자금융거래 시 보안 통제 사항의 개선 연구)

  • Lee, Gangshin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.881-888
    • /
    • 2015
  • Financial Authorities have added security controls to the Electronic Financial Transaction Act and the Supervisory Regulation according to the recent frequent personal credit information leakages. Accordingly, the security level has been upgraded. But it is necessary to study more security controls to add. This paper deduces 19 security controls over the mean value to be added to the financial area receiving 15 security consultant's help.

A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study

  • Kim, Hwankuk;Lee, Kyungho;Lim, Jongin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4588-4608
    • /
    • 2017
  • The measurement of information security levels is a very important but difficult task. So far, various measurement methods have studied the development of new indices. Note, however, that researches have focused on the problem of attaining a certain level but largely neglecting research focused on the issue of how different types of possible flaws in security controls affect each other and which flaws are more critical because of these effects. Furthermore, applying the same weight across the board to these flaws has made it difficult to identify the relative importance. In this paper, the interrelationships among security flaws that occurred in the security controls of K-ISMS were analyzed, and the relative impact of each security control was measured. Additionally, a case-control study was applied using empirical data to eliminate subjective bias as a shortcoming of expert surveys and comparative studies. The security controls were divided into 2 groups depending on whether or not a security flaw occurs. The experimental results show the impact relationship and the severity among security flaws. We expect these results to be applied as good reference indices when making decisions on the removal of security flaws in an enterprise.

The Study on the Security Model for ActiveX Control Management through Security Authentication (보안 인증을 통한 ActiveX Control 보안 관리 모델에 관한 연구)

  • Park, Sung-Yong;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.113-119
    • /
    • 2009
  • In recent years, to provide visitors with the various and dynamic services, many ActiveX Controls are developed and distributed in most of the web sites such as e-Government Internet banking Portal in Korea. However, unsecure ActiveX Controls may be critical security threats on Internet User. Although hacking incidents increase sharply for these vulnerable ActiveX Controls, there are not enough national security actions or policies. Thus, in this paper we propose the technical method to design 'Security model for ActiveX Control Managemnet through Security Authentication' to be able safe and useful security management in three aspects of development distribution using.

A Study on Security Container to Prevent Data Leaks (정보 유출 방지를 위한 보안 컨테이너의 효과성 연구)

  • Lee, Jong-Shik;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1225-1241
    • /
    • 2014
  • Recently, Financial companies implement DLP(Data Leaks Prevention) security products and enforce internal controls to prevent customer information leaks. Accidental data leaks in financial business increase more and more because internal controls are insufficient. Security officials and IT operation staffs struggle to plan countermeasures to respond to all kinds of accidental data leaks. It is difficult to prevent data leaks and to control information flow in business without research applications that handle business and privacy information. Therefore this paper describes business and privacy information flow on applications and how to plan and deploy security container based OS-level and Hypervisor virtualization technology to enforce internal controls for applications. After building security container, it was verified to implement internal controls and to prevent customer information leaks. With security policies additional security functions was implemented in security container and With recycling security container costs and time of response to security vulnerabilities was reduced.

A Study on Computer Security and Controls (Computer Security에 관한 소고 - 사고범죄예방을 중심으로 -)

  • 이종철
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.4 no.4
    • /
    • pp.25-34
    • /
    • 1981
  • Recently there has been a marked increase in concern for security in computerized operations. The purposes of computer security controls are to protect against the unauthorized access to and modification of data processing resources, unauthorised access to and modification of data files and software, and the misuse of authorized activities. The controls relate to the physical security of the data processing department and of the areas within the data processing department : to the security of the data files, programs, and system software : and to the human interaction with the data files, programs, and system software. The controls that will be discussed in this paper include : I. Risk on the computer use. II. Methods of risk counter measure. III. Role of system auditing.

  • PDF

Comparison of Information Security Controls by Leadership of Top Management (최고경영층의 정보보호 리더십에 따른 정보보호 통제활동의 차이 분석)

  • Yoo, Jinho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.1
    • /
    • pp.63-78
    • /
    • 2014
  • This paper is to analyze how the information security leadership of top management affects controls of information security. Controls of information security include the activity related to making information security policy, the activity related to making up information security organizational structure and job responsibilities, the activity related to information security awareness and training, the activity related to technical measures installation and operation, and the activity related to emergency response, monitering and auditing. Additionally we will analyze how Internet incidents affect controls of information security and find implications.

The Study of technique to find and prove vulnerabilities in ActiveX Control (ActiveX Control 취약점 검사 및 검증 기법 연구)

  • Sohn, Ki-Wook;Kim, Su-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.3-12
    • /
    • 2005
  • To provide visitors with the various services, Many web sites distribute many ActiveX controls to them because ActiveX controls can overcome limits of HTML documents and script languages. However, PC can become dangerous if it has unsecure ActiveX controls, because they can be executed in HTML documents. Nevertheless, many web sites provide visitors with ActiveX controls whose security are not verified. Therefore, the verification is needed by third party to remove vulnerabilities in ActiveX controls. In this paper, we introduce the process and the technique to fad vulnerabilities. The existing proof codes are not valid because ActiveX controls are different from normal application and domestic environments are different from foreign environments. In this paper, we introduce the technique to prove vulnerabilities in ActiveX control.

Analysis of the Application Method of Cyber Security Control to Develop Regulatory Requirement for Digital Assets in NPP (원전디지털자산 사이버보안 규제 요건 개발을 위한 보안조치 적용 방안에 대한 분석)

  • Kim, In-kyung;Byun, Ye-eun;Kwon, Kook-heui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1077-1088
    • /
    • 2019
  • As the cyber threats of nuclear power plants become more necessary to systematically prepare against the cyber attack, the international community and the domestic government are urged to apply proper security controls for Critical Digital Assets (CDA) through cyber security regulatory guidelines. In this study, we suggests the application of security controls to develop the regulatory requirements of the graded approach through the analysis of domestic and foreign cyber security regulation guidelines and best practices for digital assets directly related to nuclear accidents. In order to apply the regulatory requirements based on the consequence(impact of infringement) of the regulated facility, which is a basic consideration of the graded approach, we will classify two methods and describe details of each method. By reanalyzing existing security controls, it is introduced that the method of demanding digital assets directly related to accident to enhance security controls required for existing CDA or develop additional security controls and requiring minimum security controls for CDA that are not directly related to accident.