• 제목/요약/키워드: Security systems

검색결과 4,965건 처리시간 0.03초

의료기관의 정보보안 수준 측정을 위한 평가모형 개발 (A Development of the Model for Evaluating the Security of Information Systems in Health Care Organizations)

  • 안선주;권순만
    • 한국병원경영학회지
    • /
    • 제10권4호
    • /
    • pp.98-112
    • /
    • 2005
  • The purpose of this study is to develop a framework for evaluating security levels in hospitals. We classify security indicators into administrative, technical and physical safeguards. The security evaluation model for hospital information systems was applied to three general hospitals. The analysis of the results showed a low security level in information systems. In particular, requirements for administrative and physical safeguards were very low. Hospitals need strict security policies more than other organizations because their information systems contain patients' highly confidential data. The evaluation model developed in this study can be used for guidelines and as a checklist for hospitals. The security evaluation in hospital informational systems needs to be an essential element of hospital evaluation.

  • PDF

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

다중등급 보안 정책을 적용한 전자결재 모듈의 개발 (Building an Electronic Approval Module Using Multi-Level Security)

  • 김진성;안병혁
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제11권1호
    • /
    • pp.175-198
    • /
    • 2002
  • This paper is to develop a security module for electronic approval systems. Electronic documents are created, transmitted and saved in the company's intranet computer network. Transmitting electronic documents, however, brings us a security problem. Communications among various computer systems are exposed to many security threats. Those threats are eavesdropping, repudiation, replay back etc. The main purpose of this paper is to develop a module which provides the security of electronic documents while they are passed from one place to another This paper applies Multi-Level security to the electronic approval system that guarantees security of electronic documents from many threats. Multi-Level security controls the access to the documents by granting security level to subject users and object electronic documents. To prevent possible replay back attacks, this paper also uses one time password to the system. The security module is composed of client program and server one. The module was developed using Microsoft Visual Basic 6.0 and Microsoft SQL Server 7.0. The code uses Richard Bondi's WCCO(Wiley CryptoAPI COM Objects) library functions which enables Visual Basic to access Microsoft CryptoAPI.

  • PDF

정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로 (The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness)

  • 김종기;전진환;임호섭
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제15권1호
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • 제27권6호
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

국내 PKI 시스템 평가 기준 제안 (The Proposal of Security Evaluation Criteria for PKI Systems in Korea)

  • 심주걸;박택진;이철원;원동호
    • 정보보호학회논문지
    • /
    • 제12권3호
    • /
    • pp.61-76
    • /
    • 2002
  • 정보보호 기술의 운용에 있어서 기반기술로 작용하는 PKI 시스템의 신뢰성 확보를 위해서는 PKI 시스템에 대한평가가 반드시 필요하나, 국제적으로 아직까지 체계적인 평가 및 인증체계가 갖춰지지 않은 것이 사실이다. 국내의 경우에도 침입차단시스템과 침입탐지시스템에 대한 평가 및 인증은 이루어지고 있으나, PKI 시스템 평가에 대한 연구는 미비한 실정이다. 이에 따라 본 논문에서는 국내 PKI 시스템에 적용할 수 있는 PKI 시스템 평가기준을 제안하고자 한다. 평가기준은 최근 정보보호 시스템 평가에 있어서 국제적인 조류에 맞춰 국제 공통 평가기준(CC)와 호환가능성을 고려하고, 현재 진행되고 있는 국내 평가제도를 고려하여 작성하였다.

제어시스템 보안성 평가 방법에 관한 연구 (A Study on Security Evaluation Methodology for Industrial Control Systems)

  • 최명길
    • 정보보호학회논문지
    • /
    • 제23권2호
    • /
    • pp.287-298
    • /
    • 2013
  • 주요 국가기반 산업분야에서 운용중인 제어시스템은 다양한 제어 기능을 수행하고 있으며, 최근 제어시스템에 가해지는 다양한 위협이 가해지고 있는 실정이다. 제어시스템의 안전한 운용을 보증하기 위하여 제어시스템의 안전성을 검증할 수 있는 보증방법의 개발이 절실히 필요하다. 본 연구는 제어시스템의 특성을 반영한 정보보안평가 절차 및 방법론을 제시하고, 체크리스트로 구현을 통해서 절차 및 방법론의 효과성을 검증한다. 동 연구가 제시하는 제어시스템의 정보보안 평가 절차 및 점검체크리스트는 제어시스템 운용자 및 보증 평가자가 제어시스템의 개발 과정 및 운용의 안전성을 담보할 수 있는 보증 활동시에 사용할 수 있다.

Modbus 기반 SCADA 제어 시스템의 보안 취약성 향상에 관한 연구 (A Study on Improving the Security Vulnerabilities of Modbus-Based SCADA Control Systems)

  • 조바니 카가라반;김석수;하경재
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2009년도 춘계학술발표논문집
    • /
    • pp.421-424
    • /
    • 2009
  • SCADA control systems and protocols are developed based on reliability, availability, and speed but with no or little attention paid to security. Specifically in Modbus protocol, there are inherent security vulnerabilities in their design. The lack of common security mechanisms in the protocol such as authentication, confidentiality and integrity must be addressed. In this paper, security vulnerabilities of Modbus-based SCADA controls systems will be studied. An in-depth analysis of the message frame formats being sent between master and slave will be discussed to expose the security vulnerabilities. This will enable SCADA users to find ways to fix the security flaws of the protocol and design mitigation strategies to reduce the impact of the possible attacks. Security mechanisms are recommended to further enhance the security of SCADA control systems.

  • PDF

SCADA 시스템의 안전성 확보방안에 관한 연구 (A Study on the Secure Plan of Security in SCADA Systems)

  • 김영진;이정현;임종인
    • 정보보호학회논문지
    • /
    • 제19권6호
    • /
    • pp.145-152
    • /
    • 2009
  • 전기, 가스, 교통 등 주요 기반시설을 감시 제어하는 SCADA 시스템은 보안관리 소홀로 제어권한이 공격자에게 절취당하거나 서비스를 하지 못할 경우 국가적으로 큰 손실과 혼란을 초래할 수 있다. 따라서 SCADA 시스템은 구축시 완벽한 보안대책을 함께 강구하고 사후 보안관리도 철저히 하여야 한다. SCADA 시스템은 일반 정보시스템과는 서비스 응답, 통신 프로토콜, 네트워크 구조 등에서 상이한 특성을 지니므로 SCADA 시스템의 특성에 맞는 보안구조 및 기술을 개발하고, 국가차원에서 보안관리를 위한 법적근거를 마련할 필요가 있다. 본 논문에서는 SCADA 시스템에 관한 보안취약요인을 분석하고 이를 토대로 사이버공격에 대한 SCADA 시스템의 안전성 확보방안을 모색해 보았다.

The Proposal of Security Management Architecture using Programmable Networks Technology

  • Kim, Myung-Eun;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.926-931
    • /
    • 2004
  • In this paper, we proposed security management architecture that combines programmable network technology and policy based network management technology to manage efficiently heterogeneous security systems. By using proposed security management architecture, a security administrator can manage heterogeneous security systems using security policy, which is automatically translated into a programmable security policy and executed on programmable middleware of security system. In addition, programmable middleware that has the features of programmable network can reduce excessive management traffic. We showed that the programmable middleware could reduce the load of management traffic by comparing processing time between the proposed architecture and PBNM architecture.

  • PDF