• Title/Summary/Keyword: it security

Search Result 11,390, Processing Time 0.034 seconds

Performance Evaluation of VoIP Security Protocols (VoIP를 위한 보안 프로토콜 성능 평가)

  • Shin, Young-Chan;Kim, Kyu-Young;Kim, Min-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.109-120
    • /
    • 2008
  • VoIP utilizes the Internet for the services, and therefore it is vulnerable to intrusions and attacks. Because provided services deal with information related to privacy of users, it requires high level security including authentication and the confidentiality/integrity of signaling messages and media streams. However, when such a protocol is implemented in a VoIP phone, the implementation can have limitations due to the limited resources. The present study purposed to implement VoIP security protocols and to evaluate their performance in terms of connection quality and voice quality by applying them to SIP proxy and UA (User Agent). In the result of performance evaluation, the application of the security protocols did not lower voice quality, but connection quality was high in the DTLS based security protocol. As the protocol was applicable to signaling and media paths based on DTLS, we found that it can be a solution for the limited resources of VoIP phone.

A study of the ISCS(Information Security Check Service) on performance measurement model and analysis method (정보보호 안전진단 성과관리 측정 모델 및 성과 분석 방안 연구)

  • Jang, Sang-Soo;Shin, Seung-Ho;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.127-146
    • /
    • 2010
  • This report has continuously improved in Information Security Level of Information Communication Service Companies which are applicable to Information Security Safety Inspection System. Also, it presents a decided methodology after verified propriety and considered the pre-research or expropriation by being developed the way of Information Security Safety Result Measurement. Management territory weighted value was established and it was given according to the point of view and the strategy target and the and outcome index to consider overall to a measurement item. Accordingly, an outome to the Information Security Check Service is analyzed by this paper and measurement model and oucome analysis methodology are shown with this, and gives help to analyze an outcome. Also it make sure the the substantial information security check service will be accomplished, prevent a maintenance accident beforehand and improve an enterprise outcome independently by institutional system performance securement and enterprise.g corporate performance.

Enhancement of Enterprise Security System Using Zero Trust Security (제로 트러스트 보안을 활용한 기업보안시스템 강화 방안)

  • Lee, Seon-a;Kim, Beom Seok;Lee, Hye in;Park, Won hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.214-216
    • /
    • 2021
  • It proposes a plan to strengthen the limitations of existing corporate security systems based on Zero-Trust. With the advent of the era of the Fourth Industrial Revolution, the paradigm of security is also changing. As remote work becomes more active due to cloud computing and COVID-19, security issues arising from the changed IT environment are raised. At the same time, in the current situation where attack techniques are becoming intelligent and advanced, companies should further strengthen their current security systems by utilizing zero trust security. Zero-trust security increases security by monitoring all data communications based on the concept of doubting and trusting everything, and allowing strict authentication and minimal access to access requestors. Therefore, this paper introduces a zero trust security solution that strengthens the existing security system and presents the direction and validity that companies should introduce.

  • PDF

The Proposal of Problems in Private Security Law (경비업법령의 문제와 개정방향)

  • Ahn, Hwang Kwon;Choi, Kyung Chul
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.39-48
    • /
    • 2016
  • In 1976, privative security law in Korea was enacted. Through the law has been revised 23 times, and it reflected changing security environment. Since the private security is now in charge of the daily safety as well as the police, private security law should be revised in overall dimension. First, the name of private security service and terms should be reorganized with applying the current environment of security. For instance, there should be an appropriate range of security service which could contain security consulting, planner, private investigator, and convergence security. Second, the errors of private security law should be corrected and applied to the revised law. Third, some inappropriate contents in the private security law should be revised. Forth, revising the private security law should consider to solve problems in selection, education, and election of security instructor.

Study on Development of Framework of Company Classification in Information Security Perspective (정보보호 관점의 기업 유형 분류 프레임워크 개발에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.3
    • /
    • pp.18-29
    • /
    • 2016
  • For most organizations, a security infrastructure to protect company's core information and their technology is becoming increasingly important. So various approaches to information security have been made but many security accidents are still taking place. In fact, for many Korean companies, information security is perceived as an expense, not an asset. In order to change this perception, it is very important to recognize the need for information security and to find a rational approach for information security. The purpose of this study is to present a framework for information security strategies of companies. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. To develope measures to classify the types of companies, 12 information security professionals have done brainstorming, and based on previous studies, among the factors that have been demonstrated to be able to influence the information security of the enterprise, three factors have been selected. Delphi method was applied to 29 security experts in order to determine sub items for each factor, and then final items for evaluation was determined by verifying the content validity and reliability of the components through the SPSS analysis. Then, this study identified characteristics of each type of eight companies from a security perspective by utilizing the developed sub items, and summarized what kind of actual security accidents happened in the past.

A Study on the Effects of University Students' Personal Information Protection Awareness on Information Security Attitudes: Information Security, Personal Information Infringement, Personal Experience, Information Security Intent Multi-Mediation Effect Analysis (대학생의 개인정보보호 인식이 정보보안 태도 미치는 영향연구: 정보보안, 개인정보침해, 개인적 경험, 정보보안 의도 다중매개효과분석)

  • Yun, Il-Hyun
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.125-132
    • /
    • 2021
  • This study analyzed the multi-mediating effects of information security, personal information infringement, personal experience, and information security intention in the relationship between personal information protection and information security attitude. For this purpose, a survey was conducted on 221 students from G University. First, information security, personal information infringement, and information security awareness had a simple mediating effect. Second, information security, personal information infringement, personal experience, and information security consciousness had parallel multi- mediation effects. Third, personal information infringement and information security awareness had a simple mediating effect in the parallel multiple mediation state. Fourth, information security had a simple mediating effect, but it was found that there was no simple mediating effect in the parallel multiple mediation state. This study is meaningful in that it empirically compared the simple and multi-mediation effects.

A Study on Improvement of Cyber Security Framework for Security Operations Center (보안관제 조직을 위한 사이버보안 프레임워크 개선에 관한 연구)

  • Cho, Changseob;Shin, Yongtae
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.111-120
    • /
    • 2019
  • As cyber-attacks become more intelligent and sophisticated, the importance of Security Operations Center(SOC) has increased and the number of SOC has been increasing. In order to cope with cyber threats, institutions and organizations use a variety of cyber security standards to create business procedures. However, SOC often need to be improved in accordance with the SOC environment because they collaborate with managed security service specialists rather than their own personnel. The NIST cyber security framework, information security management system, and managed security service companies were compared and analyzed. As a result, it was found that the NIST CSF is a framework that is easy to apply to managed security service, The content was judged to be insufficient. Therefore, in this study, NIST CSF was used as a reference model to derive the management items required for SOC environment, and the necessity, importance and ease of each item were confirmed through an Delphi technique and an improved cyber security framework was proposed.

A Study on Specialized Human Rights Education for Practicing Aviation Security Personnel's Human Rights Perspective (항공보안요원 인권관점 실천을 위한 특화된 인권교육에 관한 연구)

  • Young-Chun Kim;Min-Woo Park;Wontae Park
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.30 no.4
    • /
    • pp.117-131
    • /
    • 2022
  • Human rights education is to acquire understanding and knowledge about human rights, to develop values, attitudes and character that respect human rights, to develop the ability to overcome human rights violations and discriminatory acts, and to protect and promote the human rights of others. In order to prevent human rights violations of the transportation vulnerable, such as the disabled, it is necessary to develop specialized human rights education plans for aviation security personnel to practice human rights perspectives. Therefore, in accordance with the 「National Civil Aviation Security Education and Training Guidelines」, specialized human rights education should be included in the initial aviation security education and regular education courses. The point is that there is a need to reexamine the aviation security education program for aviation security personnel based on the essential knowledge and educational contents for aviation security personnel to perform security screening tasks in the aviation security education course. When this happens, various efforts must be made to improve the human rights of the transportation vulnerable, such as the disabled, during the security screening process, so that human rights violations will be significantly reduced. In particular, it is necessary to enhance the ability to detect dangerous terrorist items such as weapons or explosives that can be used for illegal sabotage through practical security screening training. For aviation security and aircraft safety, efforts to improve the quality of aviation security personnel training, such as human rights training, must be continuously made while thoroughly preparing for terrorism in advance.

A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection (정보보호 사전점검 활성화를 위한 점검항목 개선 연구)

  • Choi, Ju Young;Kim, JinHyung;Park, Jung-Sub;Park, Choon Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.933-940
    • /
    • 2015
  • IT environments such as IoT, SNS, BigData, Cloud computing are changing rapidly. These technologies add new technologies to some of existing technologies and increase the complexity of Information System. Accordingly, they require enhancing the security function for new IT services. Information Security Pre-inspection aims to assure stability and reliability for user and supplier of new IT services by proposing development stage which considers security from design phase. Existing 'Information Security Pre-inspection' (22 domains, 74 control items, 129 detail items) consist of 6 stage (Requirements Definition, Design, Training, Implementation, Test, Sustain). Pilot tests were executed for one of IT development companies to verify its effectiveness. Consequently, for some inspection items, some improvement requirements and reconstitution needs appeared. This paper conducts a study on activation of 'Information Security Pre-inspection' which aims to construct prevention system for new information system. As a result, an improved 'Information Security Pre-inspection' is suggested. This has 16 domains, 54 inspection items, 76 detail items which include some improvement requirements and reconstitution needs.

Effective Defense Mechanism Against New Vulnerability Attacks (신규 취약점 공격에 대한 효율적인 방어 메커니즘)

  • Kwak, Young-Ok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.499-506
    • /
    • 2021
  • Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.