그림 1. 서비스 기반의 안정성 증대 보안정책 균형모듈 기준 적용환경 Fig. 1 Service-based stability enhancement Security policy balance module standard application environment
그림 2. 서비스 기반 정보시스템 플랫폼 보안정책 적용에 따른 최적화 균형모듈 설계 Fig. 2 Design of optimization balance module according to application of service-based information system platform security policy
표 1. 온라인 정보운영과 활용을 위한 서비스 제공형태의 정보시스템 현황 Table 1. Information system in the form of providing service for online information operation and utilization
표 2. 네트워크 경로 접근 및 시스템 취약점 종류 Table 2. Network path access and system vulnerability types
표 3. 정보시스템 접속을 위한 네트워크 경로 기반의 공격현황 Table 3. Network path based attacks for information system access
표 4. 정보시스템 서비스 플랫폼의 4가지 보안영역 분류 Table 4. Classification of 4 security areas of information system service platform
References
- J. Hom, S. Heon, and T. Mhung, "A Sudy on an Extended Cyber Attack Tree for an Analysis of Network Vulnerability," J. of the Korea Society of Digital Industry and Information Management, vol. 6, no. 3, Sept. 2010, pp. 49-57.
- J. Jang, D. Mim, and C. Jhoi, "Study on Hybird Type Cloud System," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, June 2016, pp. 611-618. https://doi.org/10.13067/JKIECS.2016.11.6.611
- S. Park and N. Kim, "A Verification Csae Study about the Authentication of a Network using AAA," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 2, Apr. 2017, pp. 295-300. https://doi.org/10.13067/JKIECS.2017.12.2.295
- J. Song, B. Kim, and H. Kim, "A Design of A Modbus Application Protocol for Multiple SCU Connections," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 4, Apr. 2018, pp. 642-649. https://doi.org/10.5762/KAIS.2018.19.4.642
- H. Choi and Y. Cho, "Analysis of Security Threats from Increased Usage of Mobile App Services," J. of the Korea Society of Digital Industry and Information Management, vol. 14, no. 1, Mar. 2018, pp. 45-55. https://doi.org/10.17662/KSDIM.2018.14.1.045
- I. Kim, H. Lim, D. Ji, and J. Park, "A Efficient Network Security Management Model in Industrial Control System Environments," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 4, Apr. 2018, pp. 664-673. https://doi.org/10.5762/KAIS.2018.19.4.664
- B. Cha, S. Park, and J. Kim, "Prototype Design of Hornet Cloud using Virtual Honeypot Technique," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 8, Aug. 2015, pp.891-900. https://doi.org/10.13067/JKIECS.2015.10.8.891
- Y. Shin, S. Han, I. Jae, and J. Lee, "A Study on the Linkage between Intelligent Security Techno.logy based on Spatial Information and other Technologies for Demonstration of Convergence Technology," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 1, Jan. 2018, pp. 622-632. https://doi.org/10.5762/KAIS.2018.19.1.622
- K. Kim, D. Wang, and S. Ban, "Home Security System Based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 1, Feb. 2017, pp. 147-154. https://doi.org/10.13067/JKIECS.2017.12.1.147
- Y. Hee, Y. Seo, and W. Kim, "Hardware Implementation for High-Speed Generation of Computer Generated Hologram," J. of the Korea Society of Digital Industry and Information Management, vol. 9, no. 1, Mar. 2013, pp. 129-139.
- J. Lee and J. Lee, "Efficient Hierarchical Mobility Management Scheme for Mobile Content Centric Networking," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 2, Feb. 2018, pp. 37-41. https://doi.org/10.5762/KAIS.2018.19.2.37
- S. Jung, D. Kum, and S. Choi, "Channel Grade Method of multi-mode mobile device for avoiding Interference at WPAN," J. of the Korea Society of Digital Industry and Information Management, vol. 11, no. 3, Sept. 2015, pp. 91-98. https://doi.org/10.17662/ksdim.2015.11.3.091