• Title/Summary/Keyword: 정보자산

Search Result 1,226, Processing Time 0.025 seconds

Case Study for Information System Vulnerability Assessment through Improved OCTAVE Approach (개선된 OCTAVE 접근방법을 이용한 정보시스템 취약성 평가 사례연구)

  • 김기윤;양동구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.69-79
    • /
    • 2003
  • We analyze key business process by using IDEF method in the perspective of business continuity, identify key information assets by using Skandia model, and use Nessus Version 1.4.2 to assess vulnerability about the sever of library information system according to OCTAVE(The Operationally Critical Threat, Asset, and Vulnerability Evaluation) approach. We suggest the vulnerability assessment case for introducing improved OCTAVE method including IDEF method and Skandia model.

A study for Cybersecurity Risk Management by Blockade and Defense Level Analysis (봉쇄와 보안장비 수준 기반 정보보호 위험관리 수준 측정 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1261-1266
    • /
    • 2021
  • Existing information security risk assessment methods focus on evaluating the vulnerability of information assets. However, when the form of information assets changes and new types of information assets emerge, there is a limitation in that the evaluation standards for them are also added or deleted. Existing methods have insufficient research on the path through which cyber threats are introduced. In particular, there is very little research on blocking the inflow path for web-based information systems with public IPs. Therefore, this paper introduces the main research contents of the BDLA (Blockade and Defense Level Analysis)-based information security risk assessment model. In addition, by applying the BDLA-based information security risk assessment model, the information security risk level was studied by measuring the blockade level and security equipment level of 17 public institutions.

Flow and Brand Equity on the Internet Auction (인터넷 경매에서 플로우의 형성요인과 브랜드 자산에 미치는 영향)

  • Lee, Seung-Chang;Won, Jung-Jong;Lee, Ho-Geun
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.56-82
    • /
    • 2008
  • The topic on Flow is generating increased interests in e-commerce studies. Flow has been identified as a key component in e-commerce. Studies on Flow have so far focused on internet shopping mall, but scarcely looked at the Flow of Internet auction. The purpose of study is to find out which factors play a major role in building Flow on internet auction and how the built-up Flow affect Brand Equity. Therefore, the research model investigates what factors influence Flow. Furthermore, the research is designed to understand how the Flow influences Brand Equity. The antecedents of Flow classifies into three types such as personal (Challenge, Skill), IT characteristic, Internet Auction characteristic. The results of this empirical study shows that three characteristics significantly affected the flow:personal (Challenge), IT (information quality, system quality), and Internet Auction (interactivity). And also Flow has significant effect on the brand equity. This result indicates that customer's optimal experience is important to increase brand equity. That is, the flow is influenced by multi-dimensional factors and plays an important role in increasing brand equity. Finally, the finding of this study suggests that personal challenge, information quality, system quality, and interactivity should be enhanced preferentially.

  • PDF

Analysis of the Application Method of Cyber Security Control to Develop Regulatory Requirement for Digital Assets in NPP (원전디지털자산 사이버보안 규제 요건 개발을 위한 보안조치 적용 방안에 대한 분석)

  • Kim, In-kyung;Byun, Ye-eun;Kwon, Kook-heui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1077-1088
    • /
    • 2019
  • As the cyber threats of nuclear power plants become more necessary to systematically prepare against the cyber attack, the international community and the domestic government are urged to apply proper security controls for Critical Digital Assets (CDA) through cyber security regulatory guidelines. In this study, we suggests the application of security controls to develop the regulatory requirements of the graded approach through the analysis of domestic and foreign cyber security regulation guidelines and best practices for digital assets directly related to nuclear accidents. In order to apply the regulatory requirements based on the consequence(impact of infringement) of the regulated facility, which is a basic consideration of the graded approach, we will classify two methods and describe details of each method. By reanalyzing existing security controls, it is introduced that the method of demanding digital assets directly related to accident to enhance security controls required for existing CDA or develop additional security controls and requiring minimum security controls for CDA that are not directly related to accident.

Portfolio of Real Estate Price Index for ICT Environment Study on Diversification Effect (ICT 환경에서 부동산 가격지수 포트폴리오 분산효과에 관한 연구)

  • Jang, Dae-Seub;Min, Guy-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.3
    • /
    • pp.393-402
    • /
    • 2014
  • ICT environment to the survey released by the Bureau of Statistics 2012 Household Finance. Korean Welfare survey 24.9% of all households in financial assets, real estate is about three times more than 69.9%, respectively. The problem is that the information is slow and income deciles(deciles 1-4), a relatively high proportion of households with low(78.8 to 69%) of the real estate assets of the expansion of the world economy with low growth and low uncertainty, work from home due to the information changes in the structure of the economy, such as increases in real estate prices remain exposed to the risk of a phenomenon such as Pour House Pour Talent and low-income people is bound to be more serious symptoms. This low correlation is by constructing a composite asset portfolio, the weighted average risk of the individual assets while increasing overall revenue decrease that risk is based on the principle of portfolio by type and different areas in the ICT environment in a portfolio of real estate price index low correlation to financial assets by including the effect of dispersion stable complex asset portfolio and empirical Growth was divided.

Conceptual Study for Risk Assessment of Asset Management of Infra Structure System (국가기반시설 자산관리위험도분석 개념 연구)

  • Park, Mi Yun;Park, Hung Ju
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.43-47
    • /
    • 2012
  • The asset management of infra facilities is a total framework for finally supporting a safe and comfortable service, which includes functions of supporting evaluation of condition and performance of infrastructures, making the decision method of repair or rehabilitation of deteriorated facilities, and lengthening the life cycle of structure through the decision of adequate cost and time of repair or reinforcement. In the range of the asset management, organization, human, the target, and information & data of company are included. Therefore, in this paper, appling the method of asset management analysis to the infra structures, the process of the risk assesment using BRE (Business Risk Exposure) and the basis of consisting ORDM (Optimized Renewal Decision-Making) are expressed.