• Title/Summary/Keyword: 보안 위험관리

Search Result 342, Processing Time 0.031 seconds

A Study on the Development of Korean National Integrated Emergency Management System(IEMS) (국가 통합위기관리체계(IEMS)의 구축방안에 관한 연구)

  • Joo, Sung-Bhin;Choi, Eung-Ryul
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.279-311
    • /
    • 2013
  • This study is to explore the development of Korean National Emergency Management System. For the study's purpose, the concept of Emergency, Emergency Management and the existing system and related laws of National Emergency Management have been reviewed. In South Korea, the concept of National Emergency Management contains the variety concept of emergency management; safety management, security management, risk management and disaster management etc. and sometimes using them interchangeably. In addition, there are several laws related to emergency management, making different agencies managing inter-related emergency without nationalized coordination and control tower that results in ineffective management of national emergency. This study attempts to clarify the concept of national emergency and to suggest the necessity of National Integrated Emergency Management System(IEMS). Then, it suggests existing system and related laws's integrate for the development of South Korean National Emergency Management System.

  • PDF

Proposed of Intrusion detection model using the Mobile agent (이동에이전트를 이용한 침입탐지 모델의 제안)

  • 황인선;박경우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been Proposed. These advantages include : overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent. agent-to-platform, and platform-to-agent element risks . In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data. the best environment is served.

  • PDF

Security and Law for Medical Information (의료정보보호를 위한 법률과 방안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.677-680
    • /
    • 2013
  • The risk of leakage of personal information is growing with new services such as social networking and cloud services by the rapid development of information. In particular, the field of medical IT technology is required to solve problems arising from the aging society and sustainable economic development, and in accordance with the requirements to improve the quality of life, a new market for medical devices and healthcare services can be expected. However, most of the medical information system was computerized with the introduction of IT technology, and when they exchange and transfer of medical information between institutions, medical information leakage occurs and security risk is growing. In this paper we review and analyse the security of personal health information related to the major legal systems and technical and administrative protection.

  • PDF

Software Risk Management and Cyber Security for Development of Integrated System Remotely Monitoring and Controlling Ventilators (인공호흡기 원격 통합 모니터링 및 제어 시스템 개발을 위한 소프트웨어 위험관리 및 사이버보안)

  • Ji-Yong Chung;You Rim Kim;Wonseuk Jang
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.2
    • /
    • pp.99-108
    • /
    • 2023
  • According to the COVID-19, development of various medical software based on IoT(Internet of Things) was accelerated. Especially, interest in a central software system that can remotely monitor and control ventilators is increasing to solve problems related to the continuous increase in severe COVID-19 patients. Since medical device software is closely related to human life, this study aims to develop central monitoring system that can remotely monitor and control multiple ventilators in compliance with medical device software development standards and to verify performance of system. In addition, to ensure the safety and reliability of this central monitoring system, this study also specifies risk management requirements that can identify hazardous situations and evaluate potential hazards and confirms the implementation of cybersecurity to protect against potential cyber threats, which can have serious consequences for patient safety. As a result, we obtained medical device software manufacturing certificates from MFDS(Ministry of Food and Drug Safety) through technical documents about performance verification, risk management and cybersecurity application.

Optimization of multiplication-techniques for a Pairing for sensor network security protocol based on bilinear map (Bilinear map 기반 센서네트워크 보안프로토콜을 위한 Pairing용 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Lee, Dong-Geon;Kim, Ho-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06a
    • /
    • pp.166-170
    • /
    • 2010
  • 센서네트워크는 유비쿼터스 환경을 실현할 수 있는 기술로서, 최근 무인 경비 시스템이나 에너지 관리, 환경 모니터링, 홈 자동화, 헬스케어 응용 등과 같은 다양한 응용 분야에 활용되고 있다. 하지만 자신의 정보가 무선통신상에 쉽게 노출됨으로써 도청과 전송 메시지에 대한 위변조, 서비스 거부 공격을 받을 위험이 있다. 더욱이 센서네트워크의 자원 제약성(적은 메모리, 컴퓨팅 성능의 제약)과 키분배 관리의 어려움으로 인해 기존의 공개키, 대칭키 기반의 면안프로토콜을 대체할 수 있는 프로토콜이 필요하다. 그러므로 키분배 관리에 장 접을 가지는 Bilinear map 기반 프로토콜은 적합한 대안이다. 하지만 프로토콜에 사용되는 Pairing연산은 높은 컴퓨팅 성능이 요구된다. 따라서 제한된 성능을 가진 센서상의 구현을 위해서는 Computation Cost를 줄이고 연산 수행 속도를 가속화 할 필요성이 있다. 본 논문에서는 프로토콜 구현에 필요한 Pairing의 핵심 연산인 Multiplication을 대표적인 센서노드 프로세서인 MSP430상에서 최적화 구현함으로써 성능을 개선한다.

  • PDF

A Study on the Lightweight Cryptographic Algorithms for Remote Control and Monitoring Service based on Internet of Things (사물인터넷 기반 원격 제어 및 모니터링 서비스를 위한 경량 암호화 알고리즘 연구)

  • Jeong, Jongmun;Bajracharya, Larsson;Hwang, Mintae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.437-445
    • /
    • 2018
  • Devices have a lot of small breakdowns rather than big breakdowns. But it often wastes time and increases cost of maintenance, such as calling a service technician for small breakdowns. So, if we use remote control and monitoring service using Internet of Things, we can minimize the time period and cost for the maintenance. However, security is important because remote control and monitoring services contain personal information which when leaked, may be dangerous. There are many types of Internet based monitoring devices that are in use, but it is difficult to expect a high level of security because there are many cases in which the performance is minimal. Therefore, in this paper, we classify remote control and monitoring services based on Internet of Things type and derive encryption requirement for four types. We also compared and analyzed the lightweight cryptographic algorithms that can be expected to use high performance even on the Internet of Things. And it is derived that LED is used as a equipment management type, DESLX as a environment management type, CLEFIA as a healthcare management type and LEA as a security management type are the optimal lightweight cryptographic algorithms for each type.

A Study on Utilization Effect and Implementation Model of Directory Service Based Information Resource Management System (디렉터리 서비스 기반 정보자원 관리시스템의 활용 효과 및 구축 모델에 대한 연구)

  • Lee, Sung-Jun;Kim, Hyuk;Lee, Kwang Soo;Kim, Minsoo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.427-439
    • /
    • 2014
  • Introduction of new information systems due to continuous progress of ICT has made the enterprise IT environment into a mixed pot of various IT resources. Rapidly changing business situation has emphasized the integration of organizational IT resources as one of key competitive advantages. Those distributed IT resources are now demanding to solve the problems not only on their own effective management but also on security and control issues against unauthorized infiltration and information leakages. Under the situation that the number of IT resources is constantly increasing, it is needed to study a management model and its implementation that integrally solves above all problems. In this paper, it is revealed that a directory service can be used to integrally manage distributed IT resources and a directory service based system model for distributed IT resource management is suggested. By implementing an HR solution over active directory service, it is demonstrated that our integrated management model for distributed resources is applicable to real business cases. It is expected that for small and medium sized enterprises with limited IT investments, directory service based IT resource management system can be a cost-effective solution for increasing security threats and lack of governance.

A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System (정보보호관리체계(ISMS) 항목의 중요도 인식과 투자의 우선순위 비교 연구)

  • Lee, Choong-Cheang;Kim, Jin;Lee, Chung-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.919-929
    • /
    • 2014
  • Recently, organizational efforts to adopt ISMS(Information Security Management System) have been increasingly mandated and demanded due to the rising threat and the heavier cost of security failure. However there is a serious gap between awareness and investment of information security in a company, hence it is very important for the company to control effectively a variety of information security threats within a tight budget. To phase the ISMS, this study suggests the priorities based on evaluating the Importance of 13 areas for the ISMS by the information security experts and then we attempt to see the difference between importance and investment through the assessment of the actual investment in each area. The research findings show that intrusion incident handling is most important and IT disaster recovery is the area that is invested the most. Then, information security areas with the considerable difference between priorities of importance and investment are cryptography control, information security policies, education and training on information security and personnel security. The study results are expected to be used in making a decision for the effective investment of information security when companies with a limited budget are considering to introduce ISMS or operating it.

패스워드 매니저의 보안성 분석

  • Kim, Soolin;Kim, Hyoungshick
    • Review of KIISC
    • /
    • v.28 no.1
    • /
    • pp.36-42
    • /
    • 2018
  • 사용자는 비밀번호를 외워야하는 불편함을 줄이고 로그인 과정을 편리하게 이용하기 위해 패스워드 매니저를 사용한다. 패스워드 매니저는 크게 브라우저 기반의 패스워드 매니저와 웹 기반의 패스워드 매니저로 나눌 수 있다. 브라우저 기반의 패스워드 매니저의 경우 로컬에 사용자의 계정 정보와 암호화 키를 저장하기 때문에, 비밀번호 복구 프로그램을 사용하거나 간단한 코드를 이용하여 사용자의 계정 정보를 평문 형태로 추출할 수 있다. 로컬에 저장하는 브라우저 기반의 패스워드 매니저와 달리 웹 기반 패스워드 매니저는 웹을 기반으로 실행된다. 웹 기반 패스워드 매니저는 암호화 키를 웹 서버에 저장하기 때문에, 로컬 기반의 패스워드 매니저에 비해 키 노출 우려가 적다. 하지만 웹 기반이기 때문에 공격자가 웹 취약점을 이용하면 사용자의 정보가 누출될 위험성이 있다. 본 논문에서는 사용자의 편의성을 개선하고자 사용되는 패스워드 매니저를 브라우저에서 사용되는 브라우저 기반 패스워드 매니저와 웹에서 사용되는 웹 기반 패스워드 매니저로 분류하고 각 패스워드 매니저가 사용자의 계정 정보를 저장 및 관리하는 방법을 분석하고, 해당 패스워드 매니저들에서 발생 가능한 취약점에 대해 조사하였다.

Smart Plant Safety Framework based on Reliable-Secure USN (USN기반의 스마트 플랜트안전 프레임워크 기술)

  • Choi, Suk-Won;Song, Byung-Hoon;Jung, Ji-Eun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.436-439
    • /
    • 2010
  • 최근 USN(Ubiquitous Sensor Network) 기술은 시범사업 수준의 테스트 환경을 벗어나 산업 현장 전반에 적용이 시도되고 있다. 현재의 USN 기술은 신뢰성 및 보안성이 취학하여 대규모 플랜트와 같은 난환경 산업 현장에의 적용이 어려운 현실이다. 또한 표준화된 기술의 부재로 인해 사용되는 USN 관련 장치들의 상호호환이 어려우며 기존 설비와의 호환이 어려워 산업 현장에 설치 규제가 심한 상태이. 다이러한 현실에도 불구하고 에너지 플랜트와 같은 고위험 시설물의 경우 설비에 대한 지속적인 감시 및 관리가 필요하며, 이를 위한 관련 기술의 개발이 필요하다. 본 논문에서는 USN 기술을 기반으로 에너지플랜트와 같은 고위험 시설물을 위한 고도화되고 지능화된 안전 인프라를 구축하여, 다양한 사고위험으로부터 안전성을 확보할 수 있는 스마트 플랜트안전 프레임워크를 제안한다. 제안하는 프레임워크에서는 플랜트를 위한 고위험 시설물의 감시에 필수적인 요소기술을 소개하고, 이를 통합하기 위한 프래임워크 구조를 제시하여 향후 관련 기술에 대한 기준점을 제시한다.

  • PDF