• Title/Summary/Keyword: ISMS*P

Search Result 35, Processing Time 0.026 seconds

Phylogenetic Analysis of Mitochondrial DNA Control Region in the Swimming Crab, Portunus trituberculatus

  • Cho, Eun-Min;Min, Gi-Sik;Kanwal, Sumaira;Hyun, Young-Se;Park, Sun-Wha;Chung, Ki-Wha
    • Animal cells and systems
    • /
    • v.13 no.3
    • /
    • pp.305-314
    • /
    • 2009
  • The control region of mitochondrial DNA (13516-14619) is located between srRNA and $tRNA^{lle}$ gene in swimming crab, Portunus trituberculatus. The present study was investigated the genetic polymorph isms of the control region in samples of P. trituberculatus collected at coastal waters of the Yellow Sea in Korea. A total of 300 substitution and indel polymorphic sites were identified. In addition to SNPs and indel variation, a hypervariable microsatellite motif was also identified at position from 14358 to 14391, which exhibited 10 alleles including 53 different suballeles. When the hypervariable microsatellite motif was removed from the alignment, 95 haplotypes were identified (93 unique haplotypes). The nucleotide and haplotype diversities were ranged from 0.024 to 0.028 and from 0.952 to 1.000, respectively. The statistically significant evidence for geographical structure was not detected from the analyses of neighbor-joining tree and minimum-spanning network, neither. This result suggest that population of P. trituberculatus are capable of extensive gene flow among populations. We believed that the polymorph isms of the control region will be used for informative markers to study phylogenetic relationships of P. trituberculatus.

Information Security Consultants' Role: Analysis of Job Ads in the US and Korea (정보보호 컨설턴트의 역할: 미국과 한국의 구인광고 분석)

  • Sang-Woo Park;Tae-Sung Kim;Hyo-Jung Jun
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.157-172
    • /
    • 2020
  • The demand of information security consultants is expected to increase due to the emergence of ISMS-P incorporating ISMS and PIMS, the implementation of European Privacy Act (GDPR) and various security accidents. In this paper, we collected and analyzed advertisements of job advertisement sites that could identify firms' demand explicitly. We selected representative job advertisement sites in Korea and the United States and collected job advertisement details of information security consultants in 2014 and 2019. The collected data were visualized using text mining and analyzed using non-parametric methods to determine whether there was a change in the role of the information security consultant. The findings show that the requirements for information security consultants have changed very little. This means that the role does not change much over a five year time gap. The results of the study are expected to be helpful to policy makers related to information security consultants, those seeking to find employment as information security consultants, and those seeking information security consultants.

Association Study Between Genetic Polymorph isms in Interleukin-1 Gene Family and Adult Periodontitis in Korean

  • Kang, ByungYong;Kang, Chin Yang;Lee, Kang Oh
    • Toxicological Research
    • /
    • v.20 no.4
    • /
    • pp.299-305
    • /
    • 2004
  • Adult periodontitis (AP) is a chronic inflammatory disease whose etiology is not well defined. Some studies suggested that the clinical characteristics of this disease may be in part explained by genetic factors, and some attempts to find genetic markers for this disease were successful. The interleukin-1 (IL-1) gene family as one of genetic factors may influence the expression of adult periodontitis. The aim of present study is to investigate the frequencies of genetic polymorphisms in the IL-1 gene family encoding three genes (IL-1A, IL-1B and IL-1RN) in Korean AP patients and periodontically healthy controls. There were no significant differences in genotype and allele frequencies of these polymorph isms between two groups, respectively. However, -511 polymorphism of IL-1 B gene was significantly associated with mean pocket depth (MPD, mm) value in AP patients (P<0.05). Therefore, our results suggest that -511 polymorphism in the IL-1B gene may be useful as a genetic marker for the severity of AP in Koreans.

Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag

  • Oh, Sangik;Kim, Byung-Gyu;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.7 no.3
    • /
    • pp.215-220
    • /
    • 2020
  • Many state agencies and companies collect personal data for the purpose of providing public services and marketing activities and use it for the benefit and results of the organization. In order to prevent the spread of COVID-19 recently, personal data is being collected to understand the movements of individuals. However, due to the lack of technical and administrative measures and internal controls on collected personal information, errors and leakage of personal data have become a major social issue, and the government is aware of the importance of personal data and is promoting the protection of personal information. However, theory-based training and document-based intrusion prevention training are not effective in improving the capabilities of the privacy officer. This study analyzes the processing steps and types of accidents of personal data managed by the organization and describes measures against personal data leakage and misuse in advance. In particular, using Capture the Flag (CTF) scenarios, an evaluation platform design is proposed to respond to personal data breaches. This design was proposed as a troubleshooting method to apply ISMS-P and ISO29151 indicators to reflect the factors and solutions to personal data operational defects and to make objective measurements.

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.

Security Enhancements for Distributed Ledger Technology Systems Based on Open Source (오픈소스 기반 분산원장기술 시스템을 위한 보안 강화 방안)

  • Park, Keundug;Kim, Dae Kyung;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.919-943
    • /
    • 2019
  • Distributed ledger technology, which is attracting attention as an emerging technology related to the 4th Industrial Revolution, is implemented as an open source based distributed ledger technology system and widely used for development with various applications (or services), but the security functions provided by the distributed general ledger system are very insufficient. This paper proposes security enhancements for distributed ledger technology systems based on open source. To do so, potential security threats that may occur under running an open source based distributed ledger technology systems are identified and security functional requirements against the security threats identified are provided by analyzing legislation and security certification criteria (ISMS-P). In addition, it proposes a method to implement the security functions required for an open source based distributed ledger technology systems through analysis of security functional components of Common Criteria (CC), an international standard.

A study on the Establishment of a Digital Healthcare Next-Generation Information Protection System

  • Kim, Ki-Hwan;Choi, Sung-Soo;Kim, Il-Hwan;Shin, Yong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.57-64
    • /
    • 2022
  • In this paper, the definition and overview of digital health care that has emerged recently, core technology, and We would like to propose a plan to establish a next-generation information protection system that can protect digital healthcare devices and data from cyber attacks. Various vulnerabilities exist for digital healthcare devices and data, and cyber attacks are possible for those vulnerabilities. Through an attack on digital health care devices and information and communication networks, it can directly adversely affect human life and health, Since digital healthcare data contains sensitive and personal information, it is essential to safely protect it from cyber attacks. In the case of this proposal, for continuous safe management of data and cyber attacks on equipment and communication networks for digital health devices, It is expected to be able to respond more effectively and continuously through the establishment of the next-generation information protection system.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.

Genetic Analysis of Kallikrein-Kinin System in the Korean Hypertensives

  • Kang, ByungYong;Bae, Joon Seol;Lee, Kang Oh
    • Animal cells and systems
    • /
    • v.8 no.1
    • /
    • pp.41-47
    • /
    • 2004
  • The kallikrein-kinin system affects regulation of blood pressure, and genes encoding for the components of this system have been considered as good candidates for hypertension. To evaluate the relationship between genetic polymorphisms of candidate genes involved in this system and hypertension, we performed case-control studies using genetic markers in Korean normotensives and hypertensives, respectively. By association study, there was a marginal association with hypertension in AA genotype distribution of A1789G polymorphism in the hKLK1 gene (P=0.0754). Thus, this genetic polymorphism may weakly contribute to the susceptibility to hypertension in Koreans. We also observed that significant linkage disequilibrium exists among three polymorphic sites in the hKLK1 gene studied, suggesting that the three genetic polymorph isms can be useful as genetic markers in clinical association studies. Further studies using larger sample sizes and more genetic markers will be needed to clarify genetic influence of kallikrein-kinin system for hypertension.

Genetic diversity in merozoite surface protein(MSP)-1 and MSP-2 genes of Plasmodium falciparum in a major endemic region of Iran

  • Heidari Aliehsan;Keshavarz Hossein;Rokni Mohammad B.;Jelinek Tomas
    • Parasites, Hosts and Diseases
    • /
    • v.45 no.1 s.141
    • /
    • pp.59-63
    • /
    • 2007
  • Merozoite surface protein-1(MSP-1) and merozoite surface protein-2(MSP-2) were used to develop vaccines and to investigate the genetic diversity in Plasmodium falciparum malaria in Iran. Nested polymerase chain reaction amplification was used to determine polymorph isms of block 2 of the MSP-1 and the central domain of MSP-2 genes. A total of 67 microscopically positive P. falciparum infected individuals from a major endemic region, southeast Iran, were included in this trial. Nine alleles of MSP-1 and 11 alleles of MSP-2 were identified. The results showed that amplified product from these surface antigen genes varied in size and there was specific pattern for each isolate. Besides, regarding this pattern, 23 multiple infections with at least 2 alleles were observed. While the endemic regions of malaria in Iran is classified in low to moderate group, but extensive polymorphism was observed for each marker and the MSP-2 central repeat was the most diverse that could be considered in designing malaria vaccine.