• Title/Summary/Keyword: IT Security Service

Search Result 2,053, Processing Time 0.026 seconds

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction (IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Kwon, Soon-Jae;Lee, Kun-Chang;Kim, Chang-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.2
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.

Effects of Electronic Security Service Quality Satisfaction and Customer Satisfaction on Switching Barrier and Customer Loyalty (기계경비 서비스품질만족과 고객만족이 전환장벽 및 고객충성도에 미치는 영향)

  • Kim, Chang-Ho;Yoon, Jong-Dae;Jung, Chul-Kyu;Lee, Bong-Keun
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.111-137
    • /
    • 2013
  • The purpose of this study is to examine the effects of electronic security service quality satisfaction and customer satisfaction on switching barrier and customer loyalty. Survey questionnaires were distributed to business owners in Seoul that are using electronic security system and the total of 500 copies were used as research data except 60 copies with insufficient responses. The results are as follow. First, as for the effects of electronic security service quality satisfaction on electronic security customer satisfaction, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on electronic security customer satisfaction. Second, as for the effects of electronic security service quality satisfaction on switching cost, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on switching cost. As for the effects of electronic security service quality satisfaction on human relations, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on human relations. It indicates that the effects of electronic security service quality satisfaction on alternative attraction was not meaningful. Third, as for the effects of electronic security customer satisfaction on switching cost, it indicates that the higher electronic security customer satisfaction achieves, the more it has positive effects on switching cost. As for the effects of electronic security customer satisfaction on human relations, it indicates that the higher electronic security customer satisfaction achieves, the more it has positive effects on human relations. But, it indicates that the effects of electronic security customer satisfaction on alternative attraction was not meaningful. Fourth, As for the effects of electronic security service quality satisfaction and electronic security customer satisfaction on customer loyalty, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on customer loyalty. As for the effects of switching cost on customer loyalty, it indicates that the higher switching cost achieves, the more it has positive effects on customer loyalty. As for the effects of alternative attraction on customer loyalty, it indicates that there is no meaningful relation between alternative attraction and customer loyalty. But, effects of human relations on customer loyalty, it indicates that there is no meaningful relation between human relations and customer loyalty. Based on the above results, it is noticeable that in the effects of electronic security service quality satisfaction and electronic security customer satisfaction on switching barrier, all of them had meaningful effects except for alternative attractiveness. This signifies that switching barrier factor can increase when the service quality of electronic security and customer satisfaction increase. In other words, it can be said that increased awareness of electronic security service quality satisfaction and electronic security customer satisfaction by electronic security users can lead to high customer loyalty by establishing switching barrier through such increased awareness.

  • PDF

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain (온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구)

  • Yoo, Dong-Young;Seo, Dong-Nam;Kim, Huy-Kang;Choi, Jin-Young
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.293-308
    • /
    • 2011
  • The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.

A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services (신규 IT 서비스에 대한 정보보호 등급 인증 타당성 연구)

  • Chang, Hang Bae;Joe, Tae Hee;Kim, Hyo Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.113-119
    • /
    • 2009
  • In this study we analyzed and gauged the information security needs for the new IT service which will be proceeding. Then we designed Information Security Rank Authentication System to raise the level of information security. To achieve this study, we analyzed rank authentication system of the inside and outside of the country and developed the practical propulsive system and the evaluation model which reflects IT service's own feature differing from the general evaluation of IS information security. The result of this study can be utilized to assess the level of domestic IT service information security objectively, and it can be applied as the means of rational decisionmaking for establishing a policy to raise degree of information security of corporations providing IT service.

  • PDF

A Study on Measurements of IT Security Service Quality : Feasibility of Quantitative Measures (IT 보안 서비스 품질의 측정 방법에 관한 연구 : 정량 지표의 사용 가능성)

  • Kyung, Ji Hoon;Kim, Chong Su
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.30-38
    • /
    • 2015
  • IT security service provides customers with the capability of protecting the networked information asset and infrastructures, and the scope of security service is expanding from a technology-intensive task to a comprehensive protection system for IT environment. To improve the quality of this service, a research model which help assess the quality is required. Several research models have been proposed and used in various service areas, but few cases are found for IT security service. In this work, a research model for the IT security quality has been proposed, based on research models such as SERVQUAL and E-S-QUAL. With the proposed model, factors which affect the service quality and the best quality measure have been identified. And the feasibility of using quantitative measures for quality has been examined. For analysis, structural equation modeling and various statistical methods such as principal component analysis were used. The result shows that satisfaction is the most significant measure affected by the proposed quality factors. Two quality factors, fulfillment and empathy, are the main determinants of the service quality. This leads to a strategy of quality improvement based on factors of emotion and perception, not of technology. The quantitative measures are considered as promising alternative measures, when combined with other measures. In order to design reliable quantitative measures, more work should be done on target processing time and users' expectation. It is hoped that work of this research will provide efficient tools and methods to improve the quality of IT security service and help future research works for other IT service areas.

A Study on Selection of Core Services for Deciding ISMS Scope

  • Kang, Hyunsik;Kim, Jungduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.51-57
    • /
    • 2017
  • The first thing to be prioritized is to set the scope of the management system when establishing an information security management system for systematic and effective information security management. It is important to set the scope for an organization's information security goals due to the scope affects the organization's overall information security activities. If the scope is set incorrectly, it might become impossible to protect important services and therefore, the scope of the management system should be determined in consideration of the core business services of the organization. We propose a core service selection model based on the organization's mission-critical service and high risk service in order to determine the effective information security management system scope in this paper. Core service selection criteria include the type of service, contribution to sales, socio-economic impact, and linkage with other services.

An Empirical Approach to the Influence of IT Assets and Information Security Service on Information Security Quality and Satisfaction (IT자산과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Gwon, Sun-Jae;Lee, Geon-Chang;Kim, Chang-Hyeon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.467-481
    • /
    • 2006
  • In the era of the Internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security qualty positively, leading to users' satisfaction eventually To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets and Information Security Service influence informations security quality positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets and Information Security Service helped great improve the information security quality and user satisfaction.

  • PDF

Limit of interpreting 'security service' in current 「Security Services Industry Act」 and direction of legislating and revising private security industry (현행 「경비업법」상 경비개념과 경비업무 해석의 한계 및 민간보안산업 관련 입법의 제·개정 방향)

  • Choi, Eun-Ha;Kim, Na-Ri;Yoo, Young-Jae
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.35-57
    • /
    • 2017
  • Security Act has been partially revised many times since it was revised to "Security Service Act". Main contents of such revision consist of the addition of security work such as protection or special security, responsibility enforcement of security company or security guard and systematic management of security service based on security work of previous security service act. But, it needs to be checked out that the fundamental matter about the concept of 'security' is directly related as double-edged sword in such flow of legal revision. That is because security service satisfies the multiple needs for security in the modern risky society and is based on the concept of active management whose goal is to forster and develop the function of actual security service comparing that current "Security Service Act" regulates the formal security service whose goal is permission of security service and systematic management based on article 2 as previous facilities and manned security that is guard duty-centered security service in another respect. So, this study pointed out the limit of interpreting security and security service in "Security Services Industry Act" in respect of providing private security service and drew the conclusion that the legislation and efforts are required for 'security for citizen' by reinterpreting the legislation and revision of private security service-related law as the normal regulation of "Security Services Industry Act" and the special law of "Private Security Services Industry Act".

  • PDF