• Title/Summary/Keyword: 보안성과

Search Result 1,444, Processing Time 0.021 seconds

A Study on the Effect of Institutionalization of the Security Education : Survey of National R&D Projects (국가연구개발사업 보안교육 실태조사를 통한 교육제도화에 관한 연구 -정부출연연구기관을 중심으로-)

  • Cho, Moo-Kwoan;Kim, Seong-Cheol;Hwang, Jeong-Mi;Kim, Seung-Chul
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.2
    • /
    • pp.21-29
    • /
    • 2014
  • In spite of the R&D level of Korea, the efforts to protect the R&D results from outflowing has not been raised up. We investigated the current status of security education and the level of researcher's awareness for research security in the government-financed institutes. Also, we attempted to find out the needs for institutionalization of the security education. We conducted a survey and in-depth interviews of all the security officers in the thirty-seven government-financed institutes. The results show that the awareness level of the researchers for R&D security is below adequate level, and that security education is necessary in order to increase the security awareness. Also, it is necessary to institutionalize the security education.

  • PDF

Deriving Performance Evaluation Indicator of Program for Developing the Next Generation of Top Security Leaders (차세대 보안리더 양성프로그램의 성과평가 지표 개발)

  • Park, Sung-Kyu;Kim, Tae-Sung;Kim, Jin-Seog;Yu, Seong-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.501-511
    • /
    • 2018
  • The purpose of this study is to develop the performance evaluation indicator of information security training program for developing the next generation of top security leaders. Through literature review and focus group interview, we derived the performance areas and indicators based on the logic model. We conducted AHP(Analytic Hierarchy Process) questionnaire to calculate the weight of the derived indicators, and developed the performance indicator based on the survey results. Performance indicators were composed of 18 indicators in four main categories.

Influences of Affectivity and Organizational Commitment on Job Satisfaction and Work Performance of Information Security Professionals (정보보안 종사자의 정서성과 조직몰입이 직무만족 및 업무성과에 미치는 영향)

  • Kim, Joon-Hwan;Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.225-234
    • /
    • 2018
  • The purpose of this study empirically examined relationship among affectivity(positive affectivity vs. negative affectivity) and organizational commitment on job satisfaction and work performance of information security professionals. To this end, we conducted a questionnaire survey on 174 information security professionals and analyzed the collected data using structural equation modeling (SEM). It was found that positive affectivity had a positive influences on organizational committment. But negative affectivity was not significantly related to organizational committment. In addition, organizational committment had a positive relationship with job satisfaction and work performance. The results of the empirical study are meaningful to understand the effects of the positive affective aspect of information security professionals on job satisfaction and work performance.

A Study on Developing of Performance Evaluation Index and Method of Measurement for Information Security Outcomes applying BSC (균형성과표(BSC) 기반의 정보보호 성과 지표 개발 및 측정 방법에 관한 연구)

  • Jang, Sang Soo
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.41-53
    • /
    • 2014
  • In order to achieve efficient and effective organizational information security objectives, for the level of information security to accurately evaluation and direction for improving that performance evaluation index and method of measurement for information security outcomes are needed. For information security activities of domestic companies to measure the performance or effectiveness, that standard method of measuring and the available evaluation Index are insufficient. company is difficult to investment for information security budget. Therefore, the purpose of this study was developing of performance evaluation index and method of measurement for information security outcomes applying BSC available in the company. The results of this study that companies can determine the level of information security itself. Analysis of the information security status and the strategy establishment of the information security investment can be applied.

How to Combine Secure Software Development Lifecycle into Common Criteria (CC에서의 소프트웨어 개발보안 활용에 대한 연구)

  • Park, Jinseok;Kang, Heesoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.171-182
    • /
    • 2014
  • Common Criteria is a scheme that minimize IT products's vulnerabilities in accordance with the evaluation assurance level. SSDLC(Secure Software Development Lifecycle) is a methodology that reduce the weakness that can be used to generate vulnerabilities of software development life cycle. However, Common Criteria does not consider certificated IT products's vulnerabilities after certificated it. So, it can make a problem the safety and reliability of IT products. In addition, the developer and the evaluator have the burden of duplicating evaluations of IT products that introduce into the government business due to satisfy both Common Criteria and SSDLC. Thus, we researched the relationship among the Common Criteria, the static code analysis tools, and the SSDLC. And then, we proposed how to combine SSDLC into Common Criteria.

Puzzle Model and Application for Flooding of Service Tolerance of Security Server System (보안서버시스템의 폭주서비스 감내를 위한 퍼즐 모델 및 응용)

  • Kim Young Soo;Suh Jung Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1493-1500
    • /
    • 2004
  • Today's Commercial security server system which provide secrecy, integrity and availability may still be vulnerable to denial-of-service attacks. Authentication system whith use a public key cryptography and process RSA encryption is relatively slow and the slowness has become a major security threat specifically in service flooding attacks caused by authentication requests. The service flooding attacks render the server incapable of providing its service to legitimitive clients. Therefore the importance of implementing systems that prevent denial of service attacks and provide service to legitimitive users cannot be overemphasized. In this paper, we propose a puzzle protocol which applies to authentication model. our gradually strengthening authentication model improves the availability and continuity of services and prevent denial of service attacks and we implement flooding of service tolerance system to verify the efficiency of our model. This system is expected to be ensure in the promotion of reliability.

The Security Life Cycler Energy Service Platform for Universal Middleware (유니버설미들웨어기반 생명주기 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1197-1202
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support start, stop and updating of the security module by applying the security policy module layer concept. It is modular system enabling to design of dyanmic models in the smart grid, the service was intended to be standardized and applied to the security service platform.

패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인

  • Kim, Jong-Gi;Gang, Da-Yeon
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.959-965
    • /
    • 2007
  • 최근 정보시스템의 개방성과 접근성의 확대는 조직 내 외부로부터 보안위협을 증가시키고 있다. 일반적으로 정보시스템은 패스워드를 이용하여 사용자 인증과 자료의 접근을 제한하고 있으므로 패스워드의 선택은 정보보안에 있어서 매우 중요하다. 적절한 패스워드의 선택은 정보시스템의 오 남용 방지 및 불법적인 사용자의 제한 등의 보안효과를 가져올 것이다. 본 연구의 목적은 정보를 보호하기 위한 적절한 패스워드선택을 위한 사용자의 보안행위의도에 미치는 요인을 분석하는 것이다. 이를 위하여 정보시스템 사용자의 적절한 패스워드의 선택에 영향을 미치는 핵심적인 요인으로 위험분석 방법론을 토대로 한 위험을 활용한다. 또한 위험을 사용자의 보안의식과 패스워드 관리지침을 패스워드 선택의 태도에 영향을 미치는 요인으로 보고, 사용자의 적절한 패스워드의 보안행위의도를 TRA (Theory of Reasoned Action)를 기반으로 모형을 설계하였다. 본 연구를 분석한 결과 정보자산이 위험에 관련성이 없는 반면, 정보자산을 제외한 위협, 취약성, 위험, 사용자의 보안의식, 패스워드 보안상태, 보안행위의도는 요인간에 유의한 영향을 미치는 것으로 분석되었다.

  • PDF

무선 메쉬 네트워크의 보안 위협 및 공격 분석

  • Gang, Nam-Hui
    • Information and Communications Magazine
    • /
    • v.29 no.8
    • /
    • pp.51-56
    • /
    • 2012
  • 본고에서는 적용의 유연성과 비용 효율의 장점으로 다양한 커뮤니티 네트워크 기술로 고려되는 무선 메쉬 네트워크(WMN: Wireless Mesh Networks)에서 고려해야 하는 보안 위협을 다룬다. 특히, WMN를 구성하는 무선 전송 계층과 인터넷 (IP) 계층에서 발생할 수 있는 보안 취약점과 공격의 예를 기술한다.

"밝은 도시환경조성을 위한 보안등 설치 ESCO사업 실시"

  • 에너지절약전문기업협회
    • The Magazine for Energy Service Companies
    • /
    • s.19
    • /
    • pp.20-23
    • /
    • 2002
  • 전주시는 올해 보안등의 신설 또는 개체가 필요한 일부지역에 ESCO사업을 통한 보안등 교체공사를 실시해 밝은 거리 조성에 나섰다. 예산부족에 따른 사업비부담과 전력요금부담을 덜면서 민원을 해결할 수 있는 방안으로 ESCO사업을 추진한 것이다. 에너지절약성과가 가시화되고 사업의 성패여부가 판가름나는 내년부터는 다른 지역의 자치단체에 미치는 파급효과도 클 것으로 예상된다.

  • PDF