• Title/Summary/Keyword: 물리적 보안

Search Result 524, Processing Time 0.031 seconds

정보보안 기술유형 분석

  • Lee, Gyeong-Seok
    • 정보화사회
    • /
    • s.104
    • /
    • pp.35-39
    • /
    • 1996
  • 정보화사회가 정착되면서 현재 정부나 민간의 거의 모든 분야에서 다양한 용도로 전산화가 추진되고, 국내외의 각종 통신망을 통하여 수많은 양의 정보를 유통시키고 있다. 이러한 정보통신망 이용의 급격한 증가로 최근에는 정보의 역작용에 대한 정보보안 문제가 새로운 이슈로 떠오르고 있으나, 정보보안을 위한 적절한 대책은 아직 충분하지 못한 실정이다. 보안이 필요한 주요 정보를 각종 정보관련 사고로부터 보호한다는 것은 전산기에 보관되어 있는 상태거나, 보관된 정보의 이동시에 사용자의 과실이나 제3자의 불법행위 혹은 물리적인 자연재해등으로 부터 정보의 안정성을 보장해주는 행위 일체를 말한다. 일반적으로 정보보안이란 물리적인 장애에 의한 정보파괴와 불법적 정보조작등의 모든 장해로부터 정보를 보호하는 것이다. 국방이나 외교적인 측면에서는 물론이고, 최근에는 기업에서도 동종 기업과의 경쟁에서 우위를 확보하고 국제경쟁력을 향상시키기 위하여 정보보안 유지가 반드시 필요한 주요요소중의 하나이다. 그러므로 컴퓨터와 정보통신망의 확산으로 발생되고 있는 불법적인 정보의 이용, 유출, 파괴, 등의 정보의 역작용을 억제하기 위한 노력이 시급히 필요하다. 이러한 정보의 역작용에 대한 보안기술로는 물리적 보안기술과 기술적(논리적) 보안기술로 구분할 수 있으며, 주요한 논리적 보안기술의 유형은 다음과 같은 암호시스템(Cryptosystems), 디지탈서명(Digital Signature), 키관리(Key Management), 인증(Authentication), 접근제어(Access Control) 및 부인봉쇄(Non-Repudiation)등이 있다.

  • PDF

Security Management Architecture Design for constructing the integrated computing environment (통합전산환경 구축에 따른 보안 관리 아키텍처 설계)

  • Hong, Ji-Boum
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.115-117
    • /
    • 2005
  • 범정부 통합전산센터 추진에 따라 수많은 공공기관의 통합전산환경 구축이 요구되고 있으며 이에 따른 보안 정책과 관리 대책 수립이 진행되고 있다. 일반적인 보안 개념에 유비쿼터스 개념인 언제 어디서나 제공될 수 있는 서비스에 따른 보안의 개념이 도입됨에 따라 보안 관리 대책은 관리적, 기술적, 물리적인 측면에서 검토되어야 한다. 본 논문에서는 통합전산환경의 보안 요구사항을 파악하여 보안 관리 아키텍처를 관리적, 기술적, 물리적인 측면에서 현재 진행되거나 향후 추진들 공공기관의 통합전산환경 구축의 기본적인 보안 관리 아키텍처로 제안한다.

  • PDF

The Effect of Information Protection Control Activities on Organizational Effectiveness : Mediating Effects of Information Application (정보보호 통제활동이 조직유효성에 미치는 영향 : 정보활용의 조절효과를 중심으로)

  • Jeong, Gu-Heon;Jeong, Seung-Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.71-90
    • /
    • 2011
  • This study was designed to empirically analyze the effect of control activities(physical, managerial and technical securities) of information protection on organizational effectiveness and the mediating effects of information application. The result was summarized as follows. First, the effect of control activities(physical, technical and managerial securities) of information protection on organizational effectiveness showed that the physical, technical and managerial security factors have a significant positive effect on the organizational effectiveness(p < .01). Second, the effect of control activities(physical, technical and managerial securities) of information protection on information application showed that the technical and managerial security factors have a significant positive effect on the information application(p < .01). Third, the explanatory power of models, which additionally put the information protection control activities(physical, technical and managerial securities) and the interaction variables of information application to verify how the information protection control activities( physical, technical and managerial security controls) affecting the organizational effectiveness are mediated by the information application, was 50.6%~4.1% additional increase. And the interaction factor(${\beta}$ = .148, p < .01) of physical security and information application, and interaction factor(${\beta}$ = .196, p < .01) of physical security and information application among additionally-put interaction variables, were statistically significant(p < .01), indicating the information application has mediated the relationship between physical security and managerial security factors of control activities, and organizational effectiveness. As for results stated above, it was proven that physical, technical and managerial factors as internal control activities for information protection are main mechanisms affecting the organizational effectiveness very significantly by information application. In information protection control activities, the more all physical, technical and managerial security factors were efficiently well performed, the higher information application, and the more information application was efficiently controlled and mediated, which it was proven that all these three factors are variables for useful information application. It suggested that they have acted as promotion mechanisms showing a very significant result on the internal customer satisfaction of employees, the efficiency of information management and the reduction of risk in the organizational effectiveness for information protection by the mediating or difficulty of proved information application.

A Study of Quantitative Characterization of Physically Uncloanble Functions (물리적 복제 불가능 회로 정량적 특성 평가 방법 연구)

  • Moon-Seok Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.143-150
    • /
    • 2023
  • Applications on physically unclonable circuits (PUFs) for implementing and utilizing security protocols with hardware is on the rise. PUFs have the capability to perform functions such as authentication, prevention of replication, and secure storage of critical information in integrated circuits and security systems. Through the implementation of physically unclonable circuits, a wide range of security features, including confidentiality, integrity, and availability, can be applied. Therefore, PUFs are promising candidate to build secure integrated circuits and hardware systems. However, in order that PUFs possess security features, PUFs should possess characteristics such as unpredictability, uniqueness, and robustness characteristics. This study provides a detailed explanation and introduction of the methods to characterize the PUF properties. By applying the results, it becomes possible to quantitatively evaluate the characteristics of implemented PUFs and assess their availabilities for security system applications.

Measures to Improve Physical Security of Local Governments Using Artificial Intelligence (AI) Technology (인공지능(AI) 기술을 적용한 지방자치단체의 물리적 보안 개선방안)

  • Jeong, Woo_Seok;Kim, Tae_Hwan
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.329-330
    • /
    • 2023
  • 인공지능(AI)은 지방자치단체 청사의 물리적 보안 시스템을 개선하는 데 활용될 수 있는 유망한 기술이다. 방대한 데이터를 분석하고 패턴을 식별할 수 있어, 테러나 폭력과 같은 위협을 사전에 예방하는데 도움이 될 수 있다. 또한, 인공지능(AI)은 실시간으로 보안 상황을 모니터링하고 이상 징후를 감지할 수 있어, 보안 인력의 업무 효율성을 향상시키고 비용을 절감하는 데에도 도움이 되기에 인공지능(AI)을 적용한 물리적 보안 시스템 개선방안에 대해 제안하고자 한다.

  • PDF

A Study on Physical Security factors of National Major Facilities - Focussed on Port Security - (국가중요시설의 물리적 보안 요인 분석 - 항만보안을 중심으로 -)

  • Lee, Min Hyung;Lee, Jung Hun
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.45-53
    • /
    • 2015
  • The security activity suitable for the port can be achieved, provided that the physical security factors specialized for the port security should be presented as preceding conditions. The advanced research about the theoretical data of the port security factors is incomplete and the study on the physical security factors of the port facilities should be done. In this study, the necessity and suitability of port security factors was evaluated with Delphi technique. Consequently, 19 variables of physical security factors were derived in the primary survey and through the second survey of necessity evaluation and the third survey of suitability evaluation 12 variables were selected as the physical security factors of th port facilities.

Multi-Channel Authentication based Security Card Design and Implementation (다중 채널 인증 기반 보안 카드의 설계 및 구현)

  • Seo, Hwa-jeong;Kim, Ho-won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.81-86
    • /
    • 2016
  • In this paper, we present multi-channel authentication based security card design. Since this security card is written on the transparent paper, security information is extracted by overlaying the card with smartphone screen. This method removes the limitations of physical layout in previous security card and improves the security level. Furthermore, our security card is secure when our card is exposed to malicious users.

A Study on Convergence of Cyber Security Monitoring and Industrial Security (기밀유출방지를 위한 융합보안 관리 체계)

  • Lee, Chang-Hun;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.61-67
    • /
    • 2010
  • Information communication the dazzling development life was convenient with to join in and planned an industrial technical advance. Not only the nation with technical security of the enterprise between the description competition keenly in the present point of view which rushes to technical competitive time of the nation between is become accomplished. The damage which is caused by with outflow of industrial secrecy that company prevents this effectively because is threatening at the degree which will threaten the existence of the nation and the technique which manages is become accomplished with the domestic foreign enemy. Prevents an industrial secret outflow the research for on a large scale with physical security technique and information security to be divided, is researched.

Improvement of Physical security System Operation (물리적 보안시스템 운용수준 분석)

  • Chung, Taehwang
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.282-286
    • /
    • 2014
  • This study is to present an improvement of physical security system operation by survey on the install and operation of physical security system of 90 facilities. The level of CCTV operation is higher than Access Control system and Intrusion Detection System. But the level of maintenance and management of physical security system is low. The rate of install of X-ray Inspection device show the concern on material detection, although the rate is low. The level of install and operation for the Integration of physical security system is low, so integration of security personnel and security system is necessary for the effective operation. For reinforcement of access control management, security gate and preparing of some obstacles are required with RFID.

Study on the physical vulnerability factors in the convergence IT environment (융합 IT 환경의 물리적 취약요인에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.59-68
    • /
    • 2016
  • Recently, many domestic and foreign industries is increasing gradually in the importance of security such as the emergence of a Convergence Information Technology(internet of things, cloud computing service, big data etc). Among these techniques, the industrial security market is expected to grow gradually and the evolution of security technologies, as well as vulnerabilities are also expected to increase. Therefore, an increase in physical vulnerability factors it is no exaggeration to standards that are determining the security of industrial security. In this paper will be analyzed to the physical security technology and case study, physical vulnerability factor. Thereby this is expected to be utilized as a basis for the countermeasure of physical corresponding infringement and attack in a future.