• Title/Summary/Keyword: 정보보호 컨설팅

Search Result 40, Processing Time 0.039 seconds

A Study on Network Analysis and Security System for Enhanced Security of Legislative Authority (입법기관의 보안강화를 위한 네트워크 분석 및 보안 시스템 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.467-470
    • /
    • 2011
  • 최근 7.7 DDoS 사건과 해킹 사건 등으로 국가기관의 정보보호에 관한 중요성이 대두되고 있고, 정보보호 관련 법률이 국회에서 논의되고 있다. 하지만 국회사무처의 정보보호컨설팅 결과 61.2점으로 매우 낮게 평가 되었으며, H/W, S/W분야의 평가에서도 보안성이 취약한 것으로 나타났다. 본 논문은 입법지원 기관인 국회사무처의 인터넷 네트워크와 사용 시스템 등에 대한 관리적, 기술적, 물리적 보안 요소에 대한 현황을 기밀성, 가용성, 무결성 등의 보안기준에 따라 파악하고, 이를 분석한다. 그리고 입법지원 기관이 갖추어야 할 인터넷 네트워크와 사용 시스템 등에 대한 보안 강화를 위한 설계를 연구한다. 본 연구를 통해 입법지원기관의 보안 현황을 분석하고, 사회적인 책임기관으로서 역할과 보안 강화를 위한 자료를 제공하고자 한다.

  • PDF

Company information security portal based on jsp for small or medium sized business enterprise (중소기업을 위한 JSP기반의 기업정보보호포탈)

  • Kwon, Young-Beom;Park, Sung-Wook;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1017-1020
    • /
    • 2012
  • 최근 정보화의 급속한 발전과 함께 다양하고 첨단화된 서비스를 제공하기 위해 개인정보에 대한 의존도 및 활용도가 높아지고 있다. 특히 오늘날 개인정보는 사회의 모든 분야에서 없어선 안 되는 필수재 역할을 하고 있고, 이러한 이유로 개인정보보호는 단순히 개인의 권익에 관한 문제로 국한되지 않고, 기업의 사활을 좌지우지하는 비즈니스 이슈로 대두되고 있다. 따라서 본 논문에서는 보안 컨설팅을 중소기업을 대상으로 제공하여 개인정보를 보다 안전하게 보호하고 중소기업 또한 기업 활동에 지장이 없게 도와줄 수 있도록 설계하고 구현한다.

Analysis of Economic Effects for Information Security Industry in Korea (정보보호 산업의 경제적 파급효과 분석)

  • Jeong, Woo-Soo;Min, Kyoung-Sik;Chai, Seung-Woan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.385-396
    • /
    • 2014
  • With development of Information Security industry and recognizing value of information as an asset, demand for information protection is foreseen to be expanding gradually. The Information Security industry in this paper defines as an industry where relative products as well as consulting services are developed, produced, and distributed. This study reclassifies sub-sectors of the Information Security industry based on the definition of product and services defined above, and it uses the RAS technique to broaden a scope of an input-output table to include the Information Security industry with purpose of analyzing economic spill-over effects industry will encounter during 2013~2017. Results show that investment in the Information Security industry during 2013-2017 induces total economic outputs to KRW 3,206.9 billion and is expected to employ additional 27,406 workforce.

회원사 탐방-엔디에스

  • Im, Il-Gon
    • 정보화사회
    • /
    • s.182
    • /
    • pp.38-39
    • /
    • 2006
  • 지난 1993 설립된 엔디에스(www.nds.nongshim.co.kr, 대표 신재덕, 이하 NDS)는 농심 그룹의 계열사로 이 회사의 정보시스템을 개발, 운영해 온 전산실을 모태로 10여 년간 국내외 정보 고도화를 추진해오고 있는 시스템통합(SI)전문 기업이다. NDS는 농심 외에도 정부, 공공기관, 민간기업 등 다양한 분야에 SI를 구축해오고 있다. 이 회사의 주력이라 할 수 있는 시스템통합(SI) 분야 외에도 IT컨설팅, 솔루션 개발.판매, IT 아웃소싱/ASP, 정보보호, NI, e-Business, 교육서비스 등에서도 축적된 경험과 시스템 구현 노력으로 검증받은 정보 서비스를 제공하고 있다.

  • PDF

An Empirical Study on the Obstacle Factors of ISMS Certification Using Exploratory Factor Analysis (탐색적 요인 분석을 이용한 기업의 ISMS 인증 시 장애요인에 관한 연구)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.951-959
    • /
    • 2014
  • In the past few years, data leakage of information assets has become a prominent issue. According to the National Intelligence Service in South Korea, they found 375 cases of data leakage from 2003 to 2013, especially 49 of cases have been uncovered in 2013 alone. These criminals are increasing as time passes. Thus, it constitutes a reason for establishment and operation of ISMS (Information Security Management System) even for private enterprises. But to be ISMS certified, there are many exposed or unexposed barriers, moreover, sufficient amount of studies has not been conducted on the barriers of ISMS Certification. In this study, we analyse empirically through exploratory factor analysis (EFA) to find the obstacle factors of ISMS Certification. The result shows that there are six obstacle factors in ISMS Certification; Auditing difficulty and period, Consulting firm related, Certification precedence case and consulting qualification, Internal factor, CA reliability and auditing cost, Certification benefit.

2004 상반기 SW 디지털콘텐츠 투자마트- 유망 벤처기업 발굴 및 투자유치 기회 제공

  • Sin, Seung-Cheol
    • Digital Contents
    • /
    • no.8 s.135
    • /
    • pp.67-67
    • /
    • 2004
  • 한국소프트웨어진흥원(KIPA)과 한국컨설팅협회(KCA)가 주최하고 정보통신부가 후원한‘2004년 상반기 SW 디지털콘텐츠 투자마트’가 지난 6월 24일 코엑스에서 개최됐다. 이번 투자마트에는 정보보호기술, 아이온커뮤니케이션즈, 마크애니, 엔로그소프트,윌로우소프트 등 유망 벤처기업들과 호서벤처투자, LG벤처투자, KTB네트워크, 한미창투 등 기관투자자들이 참석했다.

  • PDF

Evaluating the Efficiency of Personal Information Protection Activities in a Private Company: Using Stochastic Frontier Analysis (개인정보처리자의 개인정보보호 활동 효율성 분석: 확률변경분석을 활용하여)

  • Jang, Chul-Ho;Cha, Yun-Ho;Yang, Hyo-Jin
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.76-92
    • /
    • 2021
  • The value of personal information is increasing with the digital transformation of the 4th Industrial Revolution. The purpose of this study is to analyze the efficiency of personal information protection efforts of 2,000 private companies. It uses a stochastic frontier approach (SFA), a parametric estimation method that measures the absolute efficiency of protective activities. In particular, the personal information activity index is used as an output variable for efficiency analysis, with the personal information protection budget and number of personnel utilized as input variables. As a result of the analysis, efficiency is found to range from a minimum of 0.466 to a maximum of 0.949, and overall average efficiency is 0.818 (81.8%). The main causes of inefficiency include non-fulfillment of personal information management measures, lack of system for promoting personal information protection education, and non-fulfillment of obligations related to CCTV. Policy support is needed to implement safety measures and perform personal information encryption, especially customized support for small and medium-sized enterprises.

A Study on Regulations Status and Improving of Municipalities by Privacy Type (개인정보보호 유형에 따른 지자체 조례현황 및 개선방안 연구)

  • Yoo, Jung-Hoon;Han, Keunhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.331-342
    • /
    • 2015
  • In this paper, Seoul(25 regions), Jeonbuk(14 regions), Busan(16 regions) of 277 agencies for the based local governments were selected and reviewed an ordinance status and related laws. Based on information systems of self-regulation, the ordinance within the self-regulation for each region is being operated in the annexed form analyzed by the survey. A total of four categories(resident registration numbers, cell phone number, home number, income) by reference to the part that refused to disclose personal information, the survey analysis. Through this, The government manager who is frequently job rotation and consulting staff can understand and review the regulations by proposing the improving solution of the municipal rules. In addition, I suggested control item addition so that they can facilitate the municipal format revised review and verify the annexed form using Personal Information Management System.

A Study on the Performance Model and Measurement Method of the SMEs Information Security Support Policy (중소기업 정보보호 지원 사업 성과모델 및 측정 방법에 관한 연구)

  • Bae, Young-Sik;Jang, Sang-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.37-52
    • /
    • 2021
  • Due to the spread of COVID-19, it is rapidly changing from face-to-face to non-face-to-face work environments and is changing to a digital work environment that can be accessed anytime, anywhere, providing convenience to all lives. However, the number of breaches, personal information leakage, and technology leakage targeting SMEs that are vulnerable to security continues to increase. Accordingly, the government has been continuously promoting the information security consulting support project for SMEs every year since 2014. Therefore, this study intends to develop a performance model and measurement methodology for continuous and more systematic support and efficient management of information protection support projects in consideration of the importance of information security for SMEs. It is intended to be used as basic data when setting future operational directions and goals. The main method of this study is to derive performance models and indicators for SME information security support projects based on domestic literature, case studies, and survey results, utilize expert advice to verify the developed performance measurement indicators, and use pilot-test questionnaires. Conduct evaluation through surveys. Based on the verified indicators, we would like to present a performance model and measurement index for the information security support project for SMEs.

A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority (입법기관의 보안강화를 위한 Cloud 네트워크 분석 및 보안 시스템 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1320-1326
    • /
    • 2011
  • National institutions on the importance of information security is being recognized, information security laws are being discussed in Congress 3.4 DDoS incident and Nonghyup hacking, etc. However, National Assembly Secretariat when the results of the Information Security Consulting has been assessed very low 61.2 points, evaluation of hardware and software in secure areas were vulnerable. This paper, the legislative support agencies National Assembly and National Assembly Secretariat on the network and computer systems, and managerial, technical and physical security elements are analyzed for the status. And network should have the legislative support agencies and system for the physical network separation, DDoS attack response, Virus attack response, hacking attacks response, and Cyber Emergency Response Team/Coordination Center for Cyber infringing design and research through the confidentiality, integrity, availability, access control, authentication and security analysis is based on the evaluation criteria. Through this study, the legislative support agencies to strengthen the security of data and security laws enacted to provide the basis for.