(그림1) 국내 ISMS와 ISO27001 통제항목별 연관도 (Figure 1) Degree of relationship among control items of domestic ISMS and ISO27001
(그림 2) 5개 범주에 기반 한 BS7799, ISO 27001:20005, ISO 27001:2013의 비교 (Figure 2) Comparison among BS7799, ISO 27001:20005 and ISO 27001:2013 based on five categories
(그림 3) 5가지 범주에 기반 한 ISO 27001:2005에서 삭제된 통제와 ISO 27001:2013에 추가된 통제의 비교 (Figure 3) Comparison between deleted controls from ISO 27001:2005 and inserted controls into ISO 27001:2013 based on five categories
(그림 4) 전 세계 ISO27001 인증 추이 (단위: 건) (Figure 4) Trends of world ISO27001 certification (unit: item)
(그림 5) 인증심사종류 (Figure 5) Type of certification audit
(그림 6) ISMS 구축 후 부적합 추이 (Figure 6) Non-conformity trends after introducing ISMS
(그림 7) 금융 관련 조직의 정보보호 주요 통제영역 (Figure 7) Primary information security control areas of finance-related organizations
(표 1) ISMS 인증 기준 (Table 1) ISMS certification criteria
(표 2) 국내 ISMS 인증서 누적 발급 건수 (단위: 건) (Table 2) Cumulative issuing number of domestic ISMS certification (unit: item)
(표 3) 산업별 인증 (Table 3) Certification by jndustrial sector
(표 4) ISO27001 도입에 따른 정보보호 수준 개선효과 분석 대상 업체 (Table 4) Analysis target organizations for improvement effect of information security level according to ISO27001 introduction
(표 5) ISO27001:2005 통제영역 별 빈도 (Table 5) Frequency of each ISO27001:2005 control area
(표 6) ISO/IEC TR 27015:2012에 따른 보안 조치 방안* (Table 6) Method for security execution according to ISO/IEC TR 27015:2012
참고문헌
- White Paper for National Information Security, Korea Internet and Security Agency (KISA), 2016, pp. 183-185. https://isis.kisa.or.kr/ebook/download_pdf/2016.pdf
- "Finance-related area, mandatory ISMS certification is abolished", Boannnews, 2016.05.31. https://www.boannews.com/media/view.asp?idx=50772&kind=2&search=title&find=
- ISMS Certification-related Documentation, Financial Security Institute, 2017.03.02. http://www.fsec.or.kr/user/bbs/fsec/148/319/bbsDataView/740.do?page=1&column=&search=&searchSDate=&searchEDate=&bbsDataCategory=
- R. Alavi, "Information Security Management Systems: Modelling Human Factors", The State of Security, Tripwire, 3 Nov. 2013. https://www.tripwire.com/state-of-security/security-data-protection/3
- Y.J. Jun, G.H. Cho, and W.K. Kim, "A Design and Implementation of Information Security Management and Audit System for Government Agencies," Journal of Internet Computing and Services, Vol. 7, No. 5, pp. 81-94, 2006. http://www.jics.or.kr/digital-library/423
- H.K. Kim, K.H. Lee, and J.I. Lim, "A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study", KSII Transactions on Internet and Information Systems, Vol. 11, No. 9, pp. 4588-4608, 2017. DOI: 10.3837/tiis.2017.09.022
- H.S. Jo, S.J. Kim, and D.H. Won, "Advanced Information Security Management Evaluation System," KSII Transactions on Internet and Information Systems, Vol. 5, No. 6, pp. 1192-1213, 2011. https://doi.org/10.3837/tiis.2011.06.006
- J.S. Kim, S.Y. Lee, and J.I. Lim, "Comparison of The ISMS Difference for Private and Public Sector", Journal of the Korea Institute of Information Security and Cryptology, Vol. 20, No. 2, pp. 117-129, 2010. https://academic.naver.com/article.naver?doc_id=181695427
- H.K. Kim, G.M. Gho, and J.I. Lee, "Comparison for Corporate Information Security Institution State and Certification Criteria of Information Security Management System According to the Revision for the Law of Information and Communication Network", Journal of the Korea Institute of Information Security and Cryptology, Vol. 23, No. 4, pp. 53-58, 2013. https://academic.naver.com/article.naver?doc_id=61862547
- S.S. Jang and H.S. Lee, "A study on the analysis for flaw item of Information Security Management Sysem (ISMS) certification audit", Journal of the Korea Institute of Information Security and Cryptology, Vol. 20, No. 1, pp. 31-38, 2010. https://academic.naver.com/article.naver?doc_id=41633109
- W. Boehmer, "Appraisal of The Effectiveness and Efficiency of an Information Security Management System based on ISO 27001", 2008 2nd International Conference on Emerging Security Information, Systems and Technologies, IEEE, 2008. https://doi.org/10.1109/SECURWARE.2008.7
- N.K. Sharma and P.K. Dash, "Effectiveness of ISO 27001, As an Information Security Management System: An Analytical Study of Financial Aspects", Far East Journal of Psychology and Business, Vol. 9, No. 5, pp. 57-71, 2012. https://ideas.repec.org/a/fej/articl/v9cy2012i5p57-71.html
- B. Shojaie, H. Federrath, and I. Saberi, "Evaluating the effectiveness of ISO 27001:2013 based on Annex A", 2014 9th International Conference on Availability, Reliability and Security, IEEE, 2014. https://doi.org/10.1109/ARES.2014.41
- ISO/IEC27001:2005 Requirement, ISO, 2005. http://bcc.portal.gov.bd/sites/default/files/files/bcc.portal.gov.bd/page/adeaf3e5_cc55_4222_8767_f26bcaec3f70/ISO_IEC_27001.pdf
- The ISO Survey of Management System Standard Certifications(2006-2012), ISO, 2013. http://www.pjr.com/downloads/iso_survey.pdf
피인용 문헌
- 정보보호 관리체계를 위한 주요 통제영역에 대한 연구: 국내 3개 산업을 중심으로 vol.22, pp.4, 2021, https://doi.org/10.5762/kais.2021.22.4.140