• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.035 seconds

항만보안 효율성 제고를 위한 우선순위 평가에 관한 연구

  • Gang, Min-Gu;Kim, Hwa-Yeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.11a
    • /
    • pp.355-356
    • /
    • 2018
  • 본 연구에서는 국내 항만보안 효율성을 측정하기 위한 사전연구로 항만보안에 있어서 중요 평가항목을 선정하고 평가하는데 목적이 있다. 이를 위해 문헌조사 및 관계자들의 인터뷰를 통해 평가항목을 선정하였고, 이들 항목을 4개의 대분류와 12개의 중분류로 분류하였다. 다음으로 해양수산부 공무원, 항만공사 직원, 학계 관계자들로 구성된 전문가들의 설문조사를 통해 평가항목에 대하여 AHP 기법을 이용하여 중요도를 산출하였다. 상위 수준의 중요도 산출결과, 해양수산부 공무원 그룹과 항만공사 직원 그룹은 시설 지원 항목의 중요도가 높았으며 학계 관계자 그룹의 경우 인력예산 지원 항목의 중요도가 높았다. 하위 수준 항목의 종합중요도 분석 결과, 해양수산부 공무원 그룹과 항만공사 직원 그룹에서는 항만 내 통합시스템 구축 및 유관기관 간의 협조를 통한 운영시스템 강화의 순위가 가장 높았으나, 학계 관계자 그룹의 경우 보안인력들의 처우개선이 가장 높은 순위로 나타났다.

  • PDF

Response to Security Threats through Importance Analysis of NFT Service Provider Security Level Check Items (NFT 서비스 제공자 보안 수준 점검 항목 중요도 분석을 통한 보안 위협 대응)

  • Dong Sung Im
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.126-135
    • /
    • 2023
  • Demand for NFT is expanding along with Blockchain. And cyber security threats are also increasing. Therefore, this study derives security level inspection items by analyzing status related to NFT security such as NFT features, security threats, and compliance for the purpose of strengthening NFT security. Based on this, the relative importance was confirmed by applying it to the AHP model. As a result of the empirical analysis, the priority order of importance was found in the order of Security management system establishment and operation, encryption, and risk management, etc. The significance of this study is to reduce NFT security incidents and improve the NFT security management level of related companies by deriving NFT-related security level check items and demonstrating the research model. And If you perform considering relative importance of the NFT check items, the security level can be identified early.

  • PDF

Design and Implementation of Security Solution Structure to Enhance Inside Security in Enterprise Security Management System (통합보안관리 시스템에서 내부 보안을 향상시킨 보안 솔루션 구조의 설계 및 구현)

  • Kim Seok-Soo;Kang Min-Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.360-367
    • /
    • 2005
  • Corporation's computerization developed by diffusion of internet, and dysfunction of Information is increasing greatly with virus, computing network infringement. Therefore, the today, corporation security is more and more emphasized. Security solution by that importance of security rises so is developing together Security solution is developing to ESM system in existing single system and important thing is function of each security solution and optimizing design of policy. Existent security policy taking a serious view security from external invasion but security of interior the importance rise the today. Accordingly, must construct ESM system of new structure for this. This paper proposes and embodied integration security administration system that solidify interior security utilizing IDS. Experiment external IP and ID access and analyzed the result.

  • PDF

An Analysis of the Relative Importance of Security Level Check Items for Autonomous Vehicle Security Threat Response (자율주행차 보안 위협 대응을 위한 보안 수준 점검 항목의 상대적 중요도 분석)

  • Im, Dong Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.145-156
    • /
    • 2022
  • To strengthen the security of autonomous vehicles, this study derived checklists through the analysis of the status of autonomous vehicle security. The analyzed statuses include autonomous vehicle characteristics, security threats, and domestic and foreign security standards. The derived checklists are then applied to the AHP(Analytic Hierarchy Process) model to find their relative importance. Relative importance was ranked as one of cyber security management system establishment and implementation, encryption, risk assessment, etc. The significance of this study is to reduce cyber security incidents that cause human casualties as well improve the level of security management of autonomous vehicles in related companies by deriving the autonomous vehicle security level checklists and demonstrating the model. If the inspection is performed considering the relative importance of the checklists, the security level can be identified early.

SW 개발보안을 위한 보안약점 표준목록 연구

  • Ahn, Joonseon;Lee, Eunyoung;Chang, Byeong-Mo
    • Review of KIISC
    • /
    • v.25 no.1
    • /
    • pp.7-17
    • /
    • 2015
  • 정보시스템의 안전을 위한 시큐어 코딩의 중요성이 강조되고 있으며, 이를 지원하기 위한 보안약점 및 보안취약점 관련 연구로서 보안약점목록의 구축, 주요 보안약점의 발표, 보안취약점목록의 구축, 보안약점과 보안취약점 중요도 정량평가 방법의 개발 등이 수행되고 있다. 특히 대표적인 국내 사례로 행정자치부와 한국인터넷진흥원에서는 SW 개발단계에서 보안약점 제거활동을 의무화하는 SW 개발보안을 법제화하여 시행하고 있다. 본 논문에서는 시큐어 코딩을 지원하기 위한 국내외 연구 동향을 소개하고, 행정자치부 SW 개발보안을 위한 보안약점 표준목록 연구결과를 소개한다.

A Study on the Relative Importance of Evaluation Factors for Improvement of Port Security (항만보안 강화를 위한 평가요인과 상대적 중요도 분석)

  • Kang, Min-Gu;Kim, Hwa-Young
    • Journal of Navigation and Port Research
    • /
    • v.43 no.1
    • /
    • pp.49-56
    • /
    • 2019
  • The purpose of this study was to extract the evaluation factors and assess the relative importance between the factors. For this purpose, the evaluation factors were extracted through literature review and the process of brainstorming with experts, who are related to port security. The evaluation factors were then classified into four higher factors and twelve sub- factors through the use of the AHP method. A survey on the classified factors was conducted by experts composed of public officials, port authority employees and education institutions officials. We also carried out statistical tests to determine the perception gap of weights between the groups. As a result of a relative importance analysis of strength, the security operating system factor was highest, followed by improvement of hardware facilities and increase of security personnel. There was a difference in perception among the groups in policy support, facility support and personnel resources budget support. The results of the analysis show that the strength operating system through the establishment of an integrated monitoring system is a priority. It is necessary to understand the difference of perception between groups and build a systematic cooperation system. The evaluation factors extracted from this study can be used for the measurement of port security efficiency in further work.

Quantitative Scoring System on the Importance of Software Vulnerabilities (보안취약점 중요도 정량 평가 체계 연구)

  • Ahn, Joonseon;Chang, Byeong-Mo;Lee, Eunyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.921-932
    • /
    • 2015
  • We proposed a new scoring system on software vulnerabilities, which calculates quantitatively the severity of software vulnerabilities. The proposed scoring system consists of metrics for vulnerability severity and scoring equations; the metrics are designed to measure the severity of a software vulnerability considering the prevalence of the vulnerability, the risk level of the vulnerability, the domestic market share of the software and the frequency of the software. We applied the proposed scoring system to domestically reported software vulnerabilities, and discussed the effectiveness of the scoring system, comparing it with CVSS and CWSS. We also suggested the prospective utilization areas of the proposed scoring system.

Quantitative Scoring Criteria on the Importance of Software Weaknesses (소프트웨어 보안약점의 중요도에 대한 정량 평가 기준 연구)

  • Ahn, Joonseon;Bang, Ji-Ho;Lee, Eunyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1407-1417
    • /
    • 2012
  • In order to protect a software system from security attacks, it is important to remove the software security weaknesses through the entire life cycle of software development. To remove the software weaknesses more effectively, software weaknesses are prioritized and sorted continuously. In this paper, we introduce the existing scoring systems for software weakness and software vulnerability, and propose a new quantitative standard for the scoring system, which helps evaluate the importance of software weakness objectively. We also demonstrate the practicability of the proposed standard by scoring 2011 CWE/SANS Top 25 list with the proposed standard and comparing it to the original score of MITRE.

A Study on Priority of Certification Criteria for IoT Security Certification Service (IoT 보안인증서비스 인증기준 중요도 우선순위에 관한 연구)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.13-21
    • /
    • 2019
  • Because security of Internet of Things(IoT) products and others is poor, there are many hacking incidents To prevent security threats, it is important for companies to first make products with high security levels and choose products that are safe for users. In response, the Korea Internet & Security Agency is testing the security of IoT products and linked mobile apps to impose ratings. Security certification service is a service that tests IoT products and linked mobile apps to ensure certain levels of security and issues certificates when they meet the criteria. It can induce autonomous security enhancement of IoT products, contribute to strengthening security capabilities of IoT companies in Korea and vitalizing their overseas advancement, and have the expected effect of resolving public anxiety over IoT products. In this study, the criteria for IoT security certification are presented, but the importance priority is sought to be derived for assessment items that need to be strengthened. This will help to provide guidelines that can contribute to strengthening the security capabilities of domestic Internet companies and boosting their overseas advancement.

The Important Factors in Security for Introducing the Cloud Services (클라우드 서비스 도입을 위한 보안 중요도 인식에 대한 연구)

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.33-40
    • /
    • 2012
  • The cloud service has become the significant factor to save the IT operation cost and to improve the productivities in companies. It was introduced to Korea for enterprise services of major companies in 2008. As the increase of recognition for its effect, more small businesses and public institutions plan to introduce the cloud computing services. The cloud computing researches have only focused on the security threats and response technologies to them. Therefore, this research analyzed the importances of responses to security threats in specific domains. The domains were divided into managerial, physical, and technical security. The specific factors in three domains were used for the analysis in this research as well. The ordered logit model was used for the analysis and the analysis results showed that physical security and managerial security are considered to be significantly important in the cloud computing security. The results also presented that the security policy, the control and surveillance to service infrastructure, and application security are highly important in the respect of specific factors. This research will contribute to enterprises or institutions in Korea, which want to introduce the cloud computing services, by aiding the establishment of effective security strategies.