• Title/Summary/Keyword: Information Assurance

Search Result 645, Processing Time 0.025 seconds

Analysis of Information Assurance Schemes for New Korean Information Assurance Scheme (새로운 한국형 정보보증 제도 개발을 위한 기존의 정보보증 제도의 분석)

  • Ha, Soo-Cheol;Lee, Gang-Soo
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.207-240
    • /
    • 2011
  • There are many information assurance schemes(i.e., evaluation criteria and methodology) for security assurance of information systems, since the security is one of the most important characteristics in the modem information systems. However, there are confusions among schemes and redundancies of assurance. In this paper, we survey and classify conventional information assurance schemes by view points of assurance targets, life-cycles and nations. We propose three new information assurance schemes as the result of survey. Those are as follows: the schemes of the assurance on the requirement itself which is evaluated and certificated after standardizing the security requirements about the organizations and the applications, on the developing information system, and on the accreditation and certification about new information system. This will be helpful to set up a security assurance of National Defense.

  • PDF

A modified RIO for Improving Assured Service Performance (대역폭 보장 서비스를 위한 개선된 RIO 알고리듬)

  • Kim, Hyo-Gon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3320-3331
    • /
    • 1999
  • In this paper, we explore two ways to improve the bandwidth assurance performance of Assured Service(AS). It is well known that AS fails to meet the bandwidth assurance target for large-profile TCP flows competing with many small-profile flows. This flows after the back-offs induced by packet drops. Thus currently proposed solution to this problem naturally focus on modifying TCP's behavior to counter the unfairness in the TCP dynamics. Unfortunately, these proposals lack practicability in terms of the required changes in the incumbent Internet infrastructure. Admitting this difficulty, we instead look to not yet deployed Diff-Serv mechanisms for practical solutions. In particular, we investigate the role of RIO, RED with IN(in-profile) and OUT(out-profile), queue management scheme in the assurance failure for As. Specifically, we identify the inadequacy of RIO that aggravates the bandwidth assurance failure. Then we alleviates the bandwidth assurance failure problem by separately controlling the out-of-profile packet queue length. Through extensive simulations we demonstrate that RI+O extends the regime where AS consistently provides the bandwidth assurance.

  • PDF

A Study on Certification System for Assurance of Secure Information Security Product Development (안전한 정보보호제품 개발 보증을 위한 인증 제도에 관한 연구)

  • Kang, Soo-Young;Park, Jong-Hyuk
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.247-252
    • /
    • 2010
  • According to IT technology has evolved, a lot of information are moving through network. The correct internet users can obtain useful information. But incorrect users expose information and cause various damage for malicious purpose. To solve this problem, various information security products are being developed. For development of secure information security product, the development process should be secure. Also evaluation system is being used about product evaluation and security module for the assurance of secure product. In this paper, we proposed assurance system for secure development of information security product. Therefore this paper proposed more secure product development and assurance scheme.

A Study on the Electronic Commerce Assurance Service (전자상거래 인증서비스에 관한 연구)

  • Kim Jung-Chan;Kim Tae-Soo;Jang Seok-Oh
    • Management & Information Systems Review
    • /
    • v.10
    • /
    • pp.117-133
    • /
    • 2002
  • In December 1999, the AICPA introduced WebTrust, a electronic commerce assurance service of ensuring safe trading on the web, in order to effect consumer confidence into electronic commerce. Shortly afterwards, CPA associations of other advanced nations, such as Canada, Australia, also adopted this service. This study focuses on introduction of electronic commerce assurance service of ensuring safe trading on the web. WebTrust assurance service expected to be the international standard in electronic commerce in the near future and not only as a source of income for domestic accounting firms, which have simpler income structure than the international counterparts, but also as catalyst for stimulating electronic commerce. The findings of the study are expected to contribute to accounting practice, academy of accounting and electronic commerce firms in the following ways. Domestically, as Korea is considering using the electronic commerce assurance service, this study will help promote adoption of WebTrust assurance service. This study has shown, in the midst of declining income of accounting firms by audit, a way to increase their audit boundary.

  • PDF

Visualized Assurance Approach for Enterprise Architecture

  • Zhi, Qiang;Zhou, Zhengshu;Yamamoto, Shuichiro
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.2
    • /
    • pp.117-127
    • /
    • 2019
  • In software engineering, to ensure reliability between systems, describing both system architecture and assurance arguments between system elements is considered necessary. There are proposals for system architecture assurance, but use of these traditional methods often requires development of different diagrams using different editors. Because the visual sense of the traditional methods is inadequate, errors readily occur when manipulating different diagrams. Therefore, it is essential that the assurance of dependability between components and systems is visualized and easy to understand. In this paper, an integrated approach to describe the relationship between system actors and system architecture is proposed, and this approach is clarified using an enterprise architecture modeling language. A case study is carried out and comparison to the traditional approach $d^*$ framework is explained. The comparison results show that the proposed approach is more suitable for ensuring dependability in system architecture.

A Study on a Security Engineering Methodology for Information Security Systems Considering Quality and Cost (품질과 비용을 고려한 프로세스 기반의 보안공학방법론에 관한 연구)

  • Choi, Myeong-Gil
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.2
    • /
    • pp.23-43
    • /
    • 2009
  • For reliability and confidentiality of information security systems, the security engineering methodologies are accepted in many organizations. To improve the effectiveness of security engineering, this paper suggests a security methodology ISEM, which considers both product assurance and production processes, takes advantages in terms of quality and cost. To verify the effectiveness of ISEM, this paper introduces the concepts of quality loss, and compares the development costs and quality losses between ISEM and CC through the development of VPN system.

  • PDF

Development of a Quality Assurance Safety Assessment Database for Near Surface Radioactive Waste Disposal

  • Park J.W.;Kim C.L.;Park J.B.;Lee E.Y.;Lee Y.M.;Kang C.H.;Zhou W.;Kozak M.W.
    • Nuclear Engineering and Technology
    • /
    • v.35 no.6
    • /
    • pp.556-565
    • /
    • 2003
  • A quality assurance safety assessment database, called QUARK (QUality Assurance Program for Radioactive Waste Management in Korea), has been developed to manage both analysis information and parameter database for safety assessment of low- and intermediate-level radioactive waste (LILW) disposal facility in Korea. QUARK is such a tool that serves QA purposes for managing safety assessment information properly and securely. In QUARK, the information is organized and linked to maximize the integrity of information and traceability. QUARK provides guidance to conduct safety assessment analysis, from scenario generation to result analysis, and provides a window to inspect and trace previous safety assessment analysis and parameter values. QUARK also provides default database for safety assessment staff who construct input data files using SAGE(Safety Assessment Groundwater Evaluation), a safety assessment computer code.

A Study on the effect of perceived online shopping mall attribute on trust, commitment, purchasing intention

  • Kim, Hyun-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.123-132
    • /
    • 2018
  • This study presents perceived reputation, perceived quality, perceived assurance of online shopping malls as the attributes factors of online shopping malls and identifies the impact of perceived online shopping mall attributes on trust, involvement and purchasing intention. Also we analyzed whether trust on online shopping mall affect involvement and purchasing intention, and whether involvement on online shopping mall affect purchasing intention. The results show that perceived quality, perceived assurance of online shopping malls influence positively on trust, but perceived reputation does not. Second, perceived reputation, perceived quality, perceived assurance of online shopping malls doesn't influence positively on involvement. Third, perceived quality, perceived assurance of online shopping malls influence positively on purchasing intention, but perceived reputation does not. Forth, trust on online shopping mall influence positively on involvement and purchasing intention. Fifth, involvement on online shopping mall influence positively on purchasing intention.

A Study on a quality of Voice Codec for Internet Telephone Service (인터넷 전화서비스의 음성 코덱 품질에 관한 연구)

  • Min, Gyeong-ju;Lee, Jong-kuk;Lee, Jae-jeong;Hong, Jae-Hwan;Nam, Ki-dong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1021-1024
    • /
    • 2007
  • 인터넷이 발달하고 VoIP 의 활성화로 인하여 사용자들은 인터넷 전화서비스의 통화품질에 대한 관심이 크게 증가하고 있다. 본 고에서는 인터넷 전화서비스의 단말에 사용하고 있는 음성 코덱의 품질 측정을 위해 IP 패킷 전송품질 파라미터(ITU-T Y.1540)들을 인가하면서 이들 파라미터들의 변화에 따른 E-Model(ITU-T G.107) 종합 음성품질(R 값)을 측정하여 인터넷전화 단말의 프로세싱 품질을 파악하고 종단간서비스에서 단말이 차지하는 부분을 분석하여 인터넷 전화서비스의 통화품질 개선 및 향후 단말의 인증기준 등에 활용하고자 한다.

  • PDF