• 제목/요약/키워드: Enterprise Security Strategy

검색결과 31건 처리시간 0.026초

IoT시대의 기업 융합보안 전략에 대한 연구 (A Study on the Enterprise security convergence strategy in the IoT(the Internet of Things) Era)

  • 노종호;이종형;권헌영
    • 융합보안논문지
    • /
    • 제17권2호
    • /
    • pp.33-39
    • /
    • 2017
  • 사물인터넷(IoT) 시대의 본격화와 더불어, 융합보안이라는 개념은 어디서나 쉽게 접하고 있다. 그러나 기존의 융합보안이라는 개념이 IoT 특성을 제대로 반영하고 있다고 보기에는 다소 어려움이 있다. 이에, 기존의 융합보안 개념을 IoT 특성을 고려하여 보완된 개념을 제시하였다. 더불어, 융합보안의 개념 모델 재정립과 기업의 융합보안전략을 수립하는 데 있어 필요한 거버넌스 체계와 기술적 요인에 대해 기술하였다.

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • 제16권3호
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF

조직 정보 시스템 보안을 위한 총괄 전략 프레임워크 (Grand Strategy Framework for Information Systems Security in Organizations)

  • 박상서
    • 융합보안논문지
    • /
    • 제9권2호
    • /
    • pp.7-21
    • /
    • 2009
  • 정보 시스템 보안 체계를 보다 체계적으로 구축하고 효율적으로 운영하기 위해서는 보안에도 전략이 도입되어야 한다. 또한, 전략이 구현되어 성공적으로 작동하기 위해서는 조직 차원의 참여가 필수적이다. 하지만, 조직의 정보 시스템 보안 전략에 관한 연구는 아직까지 전략적 사고에 의한 보안 체계의 배치와 운영에 초점이 맞추어져 있어, 조직 전체를 움직이고 이끌기 위한 총체적 프레임에 관한 연구는 부족한 실정이다. 따라서 본 논문에서는 조직 차원의 보안 전략 수립에 활용할 수 있는 프레임워크를 연구한다. 이를 위하여 조직 차원의 전략 수립이라는 측면에서 총괄 전략의 개념을 도입하였으며, 총괄 전략이 갖는 4차원적 특성을 기반으로 정보 시스템 보안 총괄 전략을 구성하기 위한 프레임워크를 제시한다.

  • PDF

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • 제27권6호
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정 (Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison)

  • 김희올;백동현
    • 산업경영시스템학회지
    • /
    • 제39권4호
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.

Formation of the Strategy of Digital Marketing of the Enterprise in the Conditions of the Competitiveness Intensification in the International Market

  • Solntsev, Sergii;Smerichevskyi, Serhii;Skyba, Halyna;Zabashtanska, Tetiana;Bazaliyska, Natalia;Kolbushkin, Yuriy
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.47-56
    • /
    • 2022
  • The article defines the principles of formation of digital marketing strategy of enterprises in the conditions of intensification of competition on the international market. The stages of development of digital marketing strategy of enterprises in the conditions of intensification of competition in the international market are substantiated, which includes: setting goals, which envisages observance of the principles of SMART-scheme; product or service analysis; monitoring of competitors; analytics of definition and segmentation of the target audience of the enterprise; selection of digital marketing tools and channels for promotion on the international market of products or services; formation of a unique, unique trade offer, selection of indicators for evaluating the effectiveness of digital marketing strategy and its tools. It is proved that according to the principle of SMART method of goal setting it is necessary that the goals have: specificity, measurability, achievability, relevance, achievement of the goal should be limited in time, have specific deadlines. To increase the effectiveness of digital marketing strategy, it is necessary to analyze the internal and external environment using the method of SWOT-analysis, the advantage of which is a comprehensive assessment of the company, competitors and the industry as a whole in the face of competition in the international market. The main indicators of evaluation of the effectiveness of digital marketing strategy in the conditions of intensification of competition on the international market are substantiated.

민간경비업체의 관계적 특성과 구매행동의 관계 (A Study on Correlations between Private Security Enterprise's Relationship Characteristics and Purchasing Behaviors)

  • 김인재;조성진
    • 시큐리티연구
    • /
    • 제29호
    • /
    • pp.35-57
    • /
    • 2011
  • 본 연구는 민간경비업체와 소비자들의 관계적 특성과 구매행동의 인과관계를 규명하여 무한 경쟁에 도립하고 있는 민간경비업체도 소비자의 필요와 욕구를 파악하여 최상의 서비스를 제공할 수 있는 마케팅 전략을 모색하는데 연구의 목적이 있다. 이러한 목적 달성을 위하여 연구대상은 충남 천안시를 동남과 동서로 나누어 민간경비업체를 이용하고 있는 상점 직원을 대상으로 편의표집법으로 236명을 표집하였다. 조사도구는 설문지로서 국내 외 선행연구를 기초로 하여 재구성하여 사용하였으며, 자료 처리는 SPSS version 18.0 통계패키지를 이용하여 빈도분석, 신뢰도분석, 요인분석, 상관관계분석, 회귀분석을 실시하였다. 이상의 연구방법과 절차에 따른 자료 분석을 통하여 다음과 같은 결론을 얻었다. 첫째, 민간경비업체의 관계적 특성과 구매행동 관계는 정(+)의 상관관계를 보이고 있어, 관계적 특성이 높을수록 구매행동은 높아진다. 둘째, 민간경비업체의 관계적 특성과 구매행동의 관계를 분석한 결과 평판, 물리적 특성, 커뮤니케이션은 구전활동에 영향을 미친다. 셋째, 민간경비업체의 관계적 특성과 반복구매의 관계를 분석한 결과 평판과 커뮤니케이션은 반복구매에 영향을 미친다.

  • PDF

정보보호 안전진단 성과관리 측정 모델 및 성과 분석 방안 연구 (A study of the ISCS(Information Security Check Service) on performance measurement model and analysis method)

  • 장상수;신승호;노봉남
    • 정보보호학회논문지
    • /
    • 제20권6호
    • /
    • pp.127-146
    • /
    • 2010
  • 정보보호 안전진단 제도를 적용받는 정보통신서비스 기업의 지속적인 정보보호 수준을 제고하고, 정보보호 안전진단 성과측정 방법을 개발하여 안전진단대상 기관들이 스스로 수준측정을 하여 지속적인 정보보호 개선활동을 하도록 측정 지표 및 방법론을 제시하였다. 본 논문에서는 안전진단 수검 전후와 수검후의 지속적인 기업이 정보보호에 대한 투자와 노력에 대한 성과를 측정하여 기업 자체적으로 측정가능하게 하여 정보보호관리체계를 지속적이고 종합적으로 유지하고 관리하도록 하였다. 또한 정부에서도 제도 전반적인 이행의 근거와 타당성을 확보하여 안전진단 자체가 정보 보호 수준을 한단계 높이는 실질적인 안전진단이 이루어 지도록하여 보안 사고를 사전에 예방하고 기업성과를 향상시키는데 도움을 주고자 한다.

반도체 산업에서의 Enterprise Document Management Architecture 구현에 관한 연구 (A Study on Constructing Approach of Enterprise Document Management Architecture in Semiconductor Business)

  • 장현성;이영중;송하석;한영준;안정삼
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2001년도 추계학술대회 논문집
    • /
    • pp.11-14
    • /
    • 2001
  • A systematic construction and re-use of technology related to the product development and production has been the most important for the semiconductor industry dependent on process and equipment. Therefore, numerous outputs in the form of paper has been produced in the process of information management ranging from the creation to recycling and disposal of technologies. In this research, the technology and documents necessary for the business management in the field of semiconductor manufacturing were classified in an effort to solve problems while the modeling of document management architecture at the enterprise level was performed by properly setting up the security system to prevent the unauthorized disclosure of the product development technology to the third parties. Especially, the product and process specification are designed in such a way as to ensure a real-time response in interface with the production system in order to shorten the development lead-time and improve the productivity. This paper is to discuss the modeling approach, the strategy to construct the system and its results.

  • PDF

방화벽 로그를 이용한 침입탐지기법 연구 (A Study on the Intrusion Detection Method using Firewall Log)

  • 윤성종;김정호
    • Journal of Information Technology Applications and Management
    • /
    • 제13권4호
    • /
    • pp.141-153
    • /
    • 2006
  • According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can't. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage.isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.

  • PDF