• 제목/요약/키워드: System-level security

검색결과 1,161건 처리시간 0.025초

Tools for Improving the Efficiency of the Economic Security of Enterprises in Face of the Competitiveness Intensification

  • Turylo, Anatolii M.;Sharko, Vitalii;Fesun, Iryna;Stadnyk, Viktoriya;Andrusenko, Nadiia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.53-60
    • /
    • 2022
  • The article examines the problems of ensuring the effectiveness of the economic security system in the face of increasing competition. The relevance of the study is determined by the intensification of competition between enterprises and the threats arising from this phenomenon. The methodological basis is the methods used: analysis and synthesis - to identify the main trends in the development of tools for economic security of the enterprise; systematization - to highlight the main characteristics of the economic security of the enterprise in the intensification of competition; generalization - to form the general conclusions of the study. The purpose of scientific research is to substantiate the feasibility of using the tools of the economic security system to increase its efficiency in the face of intensifying competition. The main components of the economic security system of the enterprise, which have the greatest impact on the formation of an effective level of economic security. The defining characteristics of the system of economic security of the enterprise are investigated. Special characteristics of the economic security system of the enterprise are considered. The offered directions of tools of maintenance of system of economic safety of the enterprise in competitive conditions: objective, subjective external, subjective internal. For each area, specific tools for ensuring the system of economic security, which affect its efficiency, have been identified.

인터넷 패킷 보호 보증 플랫폼에서의 보안성 평가 시스템 설계 (Design of the Security Evaluation System for Internet Secure Connectivity Assurance Platform)

  • 김상춘;한근희
    • 한국정보과학회논문지:정보통신
    • /
    • 제31권2호
    • /
    • pp.207-216
    • /
    • 2004
  • IPsec은 네트워크 계층에서 정보보호 서비스를 제공하기 위한 프로토콜이다. 현재 IPsec을 기반으로 하는 인터넷 패킷 보호 보증 플랫폼들이 다양한 환경에서 구현되고 있다. 그러나 현재까지 IPsec을 기반으로 하는 시스템에 대한 보안성을 평가하는 기술이나 연구는 미약한 실정이다. 따라서 본 논문에서는 IPsec을 기반으로 하는 인터넷 패킷 보호 보증 플랫폼(ISCAP: Internet Secure Connectivity Assurance Platform)의 보안성을 평가하기 위한 보안성 평가 시스템을 설계 및 구현하였다. 본 평가 시스템은 ISCAP의 보안성을 평가하여 보안 취약점을 도출하는 것에 더하여, IPsec을 기반으로 하는 시스템 개발 시 디버깅 도구로도 활용될 수 있을 것이다.

The System for Ensuring the Financial and Economic Security of the State in an Aggressive External Environment

  • Kryshtanovych, Myroslav;Vartsaba, Vira;Kurnosenko, Larysa;Munko, Anna;Chepets, Olha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.51-56
    • /
    • 2022
  • The main purpose of the study is to analyze the features of ensuring the financial and economic security of the state in an aggressive external environment. The concept of financial and economic security should contain the priority goals and objectives of ensuring security, ways and methods to achieve them, adequately reflecting the role of finance in the socioeconomic development of the state. Its content is designed to coordinate nationwide actions in the field of security at the level of individual citizens, business entities, industries, sectors of the economy, as well as at the regional, national and international levels. The methodology includes a number of scientific and theoretical methods of analysis. Based on the results of the study, the key aspects of the system for ensuring the financial and economic security of the state in an aggressive external environment were identified.

주요 컨테이너 터미널의 정보보호 수준 평가에 관한 연구 (A Study on the Evaluation of the Information Security Level in Major Container Terminals)

  • 이홍걸
    • 한국항해항만학회지
    • /
    • 제33권10호
    • /
    • pp.735-742
    • /
    • 2009
  • 항만은 화물들의 정보를 토대로 거의 모든 계획과 운영이 이루어진다. 따라서, 항만에 있어 이러한 정보의 관리와 보호 문제는 매우 중요하고 근본적인 문제에 해당된다. 그러나, 이러한 중요성에도 불구하고 항만에 있어 정보보호와 관련한 연구는 매우 부족한 실정이다. 본 연구는 이러한 점에 주목하여 우리나라 주요 컨테이너 터미널의 정보보호 수준을 분석하는 것을 연구의 목적으로 하였다. 주요 컨테이너 터미널 4개사를 분석한 결과, 우리나라 컨테이너 터미널의 전반적인 정보보호 수준은 71.7%로 나타났으며, 대상 터미널 중, 3개사는 비슷한 수준과 양상을 보인 반면, 나머지 1개사는 수준 차를 보이고 있는 것으로 분석되었다. 한편, 정보보호에 있어 우리나라 컨테이너 터미널의 가장 취약한 부분은 관리적 보안인 것으로 분석되었다. 따라서, 관리적 보안의 수준을 높이기 위한 전략수립이 필요할 것으로 판단되며, 특히 정보보호를 지원하는 조직의 전문성 확보가 가장 중요한 관건인 것으로 사료된다.

정보보호 거버넌스 프레임워크 개발에 관한 연구 (A Research on the Development of Information Security Governance Framework)

  • 이성일;황경태
    • Journal of Information Technology Applications and Management
    • /
    • 제18권2호
    • /
    • pp.91-108
    • /
    • 2011
  • Enormous losses of shareholders and consumers caused by the risks threatening today's business (e.g., accounting fraud and inside trading) have ignited the necessity of international regulations on corporate ethics and internal control, such as Basel II and SOX. Responding to these regulations, companies are establishing governance system, applying it consistently to the core competency of the company, and increasing the scope of the governance system. Recently occurred security related incidents require companies to take more strict accountability over information security. One of the results includes strengthening of legislation and regulations. For these reasons, introduction of information security governance is needed. Information security governance governs the general information security activities of the company (establishment of information security management system, implementation of information security solutions) in the corporate level. Recognizing that the information security is not restricted to IT domain, but is the issue of overall business, this study develops information security governance framework based on the existing frameworks and systems of IT governance. The information security governance framework proposed in the study include concept, objective, and principle schemes which will help clearly understand the concepts of the information security governance, and execution scheme which will help implement proper organization, process and tools needed for the execution of information security governance.

Advanced approach to information security management system utilizing maturity models in critical infrastructure

  • You, Youngin;Oh, Junhyoung;Kim, Sooheon;Lee, Kyungho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권10호
    • /
    • pp.4995-5014
    • /
    • 2018
  • As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities. Currently, these methods of measuring information security are a concrete method of recommendation in related standards. However, the security controls used in these methods are lacking in connectivity, causing silo effect. In order to solve this problem, there has been an attempt to study the information security management system in terms of maturity. However, to the best of our knowledge, no research has considered the specific definitions of each level that measures organizational security maturity or specific methods and criteria for constructing such levels. This study developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. The proposed model is simulated using the thermal power sector in critical infrastructure of the Republic of Korea to confirm the possibility of its application to the field and derive core security processes and goals that constitute infrastructure security maturity. The findings will be useful for future research or practical application of infrastructure ISMSs.

A Genetic Algorithm-Based Intrusion Detection System

  • Lee, Han H.;Lee, Duk;Kim, Hee S.;Park, Jong U.
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2000년도 춘계정기학술대회 e-Business를 위한 지능형 정보기술 / 한국지능정보시스템학회
    • /
    • pp.343-346
    • /
    • 2000
  • In this paper, a novel approach to intruder detection is introduced. The approach, based on the genetic algorithms, improved detection rate of the host systems which has traditionally relied on known intruder patterns and host addresses. Rather than making judgments on whether the access is instrusion or not, the systems can continuously monitor systems with categorized security level. With the categorization, when the intruder attempts repeatedly to access the systems, the security level is incrementally escalated. In the simulation of a simple intrusion, it was shown that the current approach improves robustness of the security systems by enhancing detection and flexibility. The evolutionary approach to intruder detection enhances adaptability of the system.

  • PDF

체계적인 방위산업기술보호를 위한 보호체계 우선순위 분석 연구 (Analysis of Security System Priority for the Systematic Defense Technology Security)

  • 박흥순;김세용;김용환
    • 융합보안논문지
    • /
    • 제19권4호
    • /
    • pp.3-12
    • /
    • 2019
  • 방위산업기술의 유출은 해당 기업의 영업 손실뿐만 아니라 국가안보 및 국익 차원에서도 심각한 피해를 야기할 수 있다. 최근 정부는 방위산업기술의 중요성을 인식하여 방위산업기술보호법을 제정하였고, 그에 따른 방위산업기술 보호지침을 마련하였다. 법규에 따르면 방위산업기술을 보유한 기관 및 업체는 방위산업기술 보호체계를 구축해야 하며, 정부는 이들의 기술보호 수준 향상을 위해 다양한 기술보호 정책을 수립하고 추진해야 한다. 본 연구에서는 기존의 기술보호지침에 대한 비교를 통해 시사점을 도출하고 방위산업기술 보호지침의 자가진단 항목을 대상으로 AHP 기법을 통해 보호체계 세부항목에 대한 우선순위 분석을 하였다. 이를 통해 대상기관에 대한 보호수준의 효율적 진단과 보호체계의 체계적인 구축을 위한 정책 지원이 가능할 것으로 기대된다.

텍스트마이닝을 이용한 정보보호 연구동향 분석 (Research Trends Analysis of Information Security using Text Mining)

  • 김태경;김창식
    • 디지털산업정보학회논문지
    • /
    • 제14권2호
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

보안 지식 베이스 관리 시스템에서의 질의 처리

  • 조일래;김원중;심갑식
    • 정보보호학회지
    • /
    • 제7권2호
    • /
    • pp.85-94
    • /
    • 1997
  • This paper describes the notion of a Multilevel Secure Knowledge Base Management System(MLS/KBMS). It states a security policy and security constraints. A design for query operation introduced cover story in a MLS/KBMS is discussed. Query processing approach is to provide cover stories that lead to alternative explanations for readily available information. Therefore such cover stories prevent an unauthorized user from inferring high-level information from low-level data.

  • PDF