• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.029 seconds

A Study on the Setting Method of the File System Audit Function of Windows for Enhancing Forensic Readiness (포렌식 준비도 제고를 위한 윈도우의 파일 시스템 감사 기능 설정 방안에 관한 연구)

  • Lee, Myeong-Su;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.79-90
    • /
    • 2017
  • If digital forensic investigators can utilize file access logs when they audit insider information leakage cases or incident cases, it would be helpful to understand user's behaviors more clearly. There are many known artifacts related to file access in MS Windows. But each of the artifacts often lacks critical information, and they are usually not preserved for enough time. So it is hard to track down what has happened in a real case. In this thesis, I suggest a method to utilize SACL(System Access Control List) which is one of the audit functions provided by MS Windows. By applying this method of strengthening the Windows's audit settings, even small organizations that cannot adopt security solutions can build better environment for conducting digital forensic when an incident occurs.

Design and Implementation of DB Protection System through Critical Query Signature (핵심 쿼리 결제를 통한 DB 보호 시스템 설계 및 구현)

  • Kim, Yang-Hoon;Kwon, Hyuk-Jun;Lee, Jae-Pil;Park, Chun-Oh;Kim, Jun-Woo;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.228-237
    • /
    • 2011
  • The risk of leakage or theft of critical data which is stored in database is increasing in accordance with evolution of information security paradigm. At the same time, needs for database security have been on the rapid increase due to endless leakage of massive personal information. The existing technology for prevention of internal information leakage possesses the technical limitation to achieve security goal completely, because the passive control method including a certain security policy, which allows the only authorized person to access to DBMS, may have a limitation. Hence in this study, we propose Query Signature System which signatures the queries accessing to the critical information by interrupting and passing them. Furthermore this system can apply a constant security policy to organization and protect database system aggressively by restricting critical query of database.

A Study on Implementation and Design of Secure VOD System (Secure-VOD 시스템의 설계 및 구현에 관한 연구)

  • 한성민;유황빈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.700-707
    • /
    • 2000
  • In this paper, we address vulnerabilities of legacy VOD system and implement secure-VOD system to protect security holes of it. Our secure-VOD system provide user authentication using one-time password, message authentication and encryption/decryption for video server information. To improve security of existing fixed password system, our secure-VOD system use one-time password. Also, our secure-VOD system provides integrity for video server information by generating and verifying message authentication code using HMAC-HAS 160 algorithm. Finally, our secure-VOD system uses RC5 encryption algorithm to guarantee confidentiality for video server information.

  • PDF

A Comparative Study on Type Approval of Maritime Cyber Security and RMF in the View of System Development Lifecycle (개발 전주기 사이버보안 관점에서의 해상 사이버보안 형식 승인과 RMF 비교 연구)

  • Lee, Suwon;Hwang, Seyoung;Hong, Jina;Kim, Byeong-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.279-287
    • /
    • 2022
  • With the advancement of cyber threats and the development of hacking technologies, cyber security is being emphasized in various fields such as automobiles and ships. According to this trend, various industrial fields are demanding cybersecurity, and related certifications. In this paper, cybersecurity type approval is compared with the RMF stage under the premise that there are common elements with RMF in that cybersecurity elements must be reflected in the entire system development cycle. For comparison, type approval of maritime cyber security of the Korean Register of Shipping was selected. In conclusion, although type approval of maritime cyber security acquisition procedure is not divided by development stage like the RMF, there are the commonalities in the procedure to apply the cybersecurity element to the System development lifecycle like the RMF. Accordingly, the possibility of determining that the cybersecurity element was applied to the entire development cycle was confirmed.

A Study on Establishment of Cyber Threat Information Sharing System Focusing on U.S. Case (사이버 위협정보 공유체계 구축방안에 관한 연구 - 미국 사례를 중심으로 -)

  • Kim, Dong Hee;Park, Sangdon;Kim, So Jeong;Yoon, Oh-Jun
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.53-68
    • /
    • 2017
  • Today, information sharing is recognized as a means to effectively prevent cyber attacks, which are becoming more intelligent and advanced, so that many countries such as U.S., EU, UK, Japan, etc. are establishing cyber threat information sharing system at national level. In particular, the United States has enacted the "Cyber Threat Information Sharing Act (CISA)" in December 2015, and has been promoting the establishment of a legal and institutional basis for sharing threat information and the implementation of the system. Korea is sharing cyber threat information in public and private sectors mainly through the National Cyber Security Center(NCSC) and the Korea Internet & Security Agency(KISA). In addition, Korean government is attempting to strengthen and make legal basis for unified cyber threat information sharing system through establishing policies. However, there are also concerns about issues such as leakage of sensitive information of companies or individuals including personal identifiable information that may produced during the cyber threat information sharing process, reliability and efficiency issues of the main agents who gather and manage information. In this paper, we try to derive improvement plans and implications by comparing and analyzing cyber threat information sharing status between U.S. and Korea.

National Information Security Agenda and Policies (국가 정보보안 이슈 및 정책방안에 관한 연구)

  • Kim, Jung-Duk
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.105-111
    • /
    • 2012
  • This study is to propose national information security policies based on the policy framework, which has four components: government, industry/company, individual, and environments. According to the framework, the four policy agenda are derived: national information security governance scheme, information security industry competitiveness and corporate security level enhancement, eco-system for security professionals, and finally related laws & regulations modification and security culture movement. Specific issues and policies in each agenda are proposed.

(Design and Implementation of a Web-Based Tool for Information Security Levelling with Multiple Weights) (다중 가중치를 적용한 웹 기반 정보보호수준 측정 도구 설계 및 구현)

  • Sung, Kyung;Choi, Sang-Yong;So, Woo-Young;Kim, Sung-Ok
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1315-1328
    • /
    • 2002
  • Recently there has been increasing demand on developing methodologies and tools for measuring the information security level of organizations for the efficient security management, as the growth of security incidents. However, most methodologies from foreign countries are not realistic in constructing the checklists, moreover their tools provide neither the ease of use nor the inexpensiveness, and most domestic works are not properly considering the characteristics of the organizations. In this study, based on the recently developed standard for information security management, an information security levelling tool is designed and implemented which can be used before building an information security management system while considering the characteristics of organizations more efficiently. The efficiency comes from applying multiple variable weights for security levelling according to the characteristics of organizations.

  • PDF

Security from Cyber Crime and Terrorism (사이버공간 보안의 현황과 대응방향)

  • 하옥현
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.76-95
    • /
    • 2003
  • 정보통신기술의 발달로 지식정보사회로 급격히 전환함에 따라 Computer system과 Internet에 대한 의존도가 높아져 생활이 편리해지기도 하는 반면 여러 가지 역기능도 보여주고 있다. 특히 새로운 공간인 Cyberspace에서의 여러 형태의 범죄와 Terrorism은 날로 심각한 충격을 주고 있어 그 Security가 확보문제가 시급하다. 본고에서는 이와 관련 최근의 Cyber Security의 Trends에 대한 명확한 인식과 향후 방향 설정에 도움이 되고자 한다.

Threats and alternative of EPCglobal Class-1 Gen-2 RFID system (EPCglobal Class-1 Gen-2 RFID 시스템의 위협과 대안)

  • Kim Kyoung-Hyun;Choi Eun-Young;Lee Dong-Hoon
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.727-730
    • /
    • 2006
  • RFID 시스템은 유비쿼터스 컴퓨팅 환경에서 중요한 기술로 주목하고 있다. RFID의 국제 표준으로 자리 잡고 있는 EPCglobal Class-1 Gen-2 RFID 시스템을 통해서 전 세계 어디에서도 문제없이 인식될 것으로 보인다. 그러나 EPCglobal Class-1 Gen-2 RFID 시스템은 위협의 요소들을 가지고 있다. 본 논문에서는 표준에서 승인된 태그의 능력을 사용하여 표준의 수정을 최소화시켜 보안의 문제점을 해결 할 수 있는 방안을 제시한다.

  • PDF

Efficient Delta-CRL Issuing System (효율적인 Delta-CRL 발급 시스템)

  • Hyun, Sang-Woo;Kim, Rak-Hyun;Lee, Yong;Um, Hee-Jung;Yeom, Heung-Yeol
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.355-365
    • /
    • 2001
  • 본 논문은 현재 국내에서 개발되고 있는 인증서 발급 시스템에서 인증서가 취소되었을 경우에 발급되는 인증서 취소목록(Certificate Revocation List : CRL)에 따른 문제점 중, 유통되는 트래픽 부하를 줄이고, 발급되는 CRL의 크기를 감소시키며, 또한 전체 CRL의 발급 시간을 연장시킬 수 있는 Delta-CRL 발급 시스템의 정책, 운영 방안 및 발급 방법을 제시한다. 제안된 운영 방안은 Full-CRL의 Distribution Point를 이용하여 Base-CRL을 가리키고 Base-CRL의 Delta-CRL distribution point를 이용하여 Delta-CRL의 위치를 확인한다. 그리고 세 가지 Delta-CRL 발급 시스템의 동작 방법들을 분석하였다.

  • PDF