• Title/Summary/Keyword: Information security industry

Search Result 963, Processing Time 0.023 seconds

Development of Mobile Monitoring System for Home Security (홈 시큐리티를 위한 모바일 모니터링 시스템 개발)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.43-49
    • /
    • 2009
  • Network industry is complex combined with various fields of industry, such as communication, broadcast, construction, and home appliances. Moreover, it's fairly lucrative since the growth industry makes lots of added values, interacting with the others. The network industry, usually called 'Ubiquitous', connects some home appliances and makes an integrated system that you can use them with whenever and wherever. A demand for network security, however, has skyrocketed due to the relatively low safety. It's been expected that the market of home security is going to be grown up nearly 30 percent every year. Recently, analog surveilance cameras have been replaced with digital ones, and they will be providing stronger security services taking advantage of mutual interaction with related industies. In this paper, a mobile monitoring system for home security is proposed, which makes it possible to supervise all home appliances wherever you're, using the conventional wired/wireless network infra.

A Design on the Information Security Auditing Framework of the Information System Audit (정보시스템 감리에서의 정보보호 감리모형 설계)

  • Lee, Ji Yong;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.233-245
    • /
    • 2010
  • This paper proposes security architecture, security audit framework, and audit check item. These are based on the security requirement that has been researched in the information system audit. The proposed information security architecture is built in a way that it could defend a cyber attack. According to its life cycle, it considers a security service and security control that is required by the information system. It is mapped in a way that it can control the security technology and security environment. As a result, an audit framework of the information system is presented based on the security requirement and security architecture. The standard checkpoints of security audit are of the highest level. It was applied to the system introduction for the next generation of D stock and D life insurance company. Also, it was applied to the human resources information system of K institution and was verified. Before applying to institutions, system developers and administrators were educated about their awareness about security so that they can follow guidelines of a developer security. As a result, the systemic security problems were decreased by more than eighty percent.

Business model correlation analysis according to the technology maturity of the information security industry (정보보호 산업의 기술성숙도에 따른 비즈니스 모델 상관성 분석)

  • Lim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.165-171
    • /
    • 2019
  • The domestic information security market is booming, For the development of the information security industry. I wanted to suggest a strategy for finding and developing a good business model. So the main products were classified by similar industries. And The sector was selected as the dependent variable. Expert interviews were conducted and classified according to technical maturity. Independent variables were sales, number of employees, and performance. Average analysis result, sales amounted to 8.798 billion won, 13.51 years in industry, and 64.3 employees. As a result of SPSS statistical analysis, the correlation between industry type and sales according to technical maturity (r = -.729) was within 5% of significance level. The regression results were significant. (p= .047<0.05) Therefore, industry classification and sales are related to technological maturity.

Development of Korean Cybersecurity Goods Menu (Korean Cybersecurity Goods Menu 개발)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.266-267
    • /
    • 2015
  • The information security (information security knowledge) industry is technology-intensive, high value-added industries. South Korea's response has excellent ICT skills and experience and skills in a variety of cyber attacks, has become a benchmark in the world. However, the small size of the domestic information security company, supporting infrastructure is lacking. Domestic information security industry is the primary condition to activate the export. In order to export it is necessary to develop for the Korean Cybersecurity Goods Menu for products, services and technologies of the domestic information security industry. Buyer Menu as well as foreign and domestic Seller, companies and governments know the details of the assets and product information security industry and is a prerequisite to sell. In this paper, I study the Korean Cybersecurity Goods Menu development.

  • PDF

Differences in Perception of Information Security Knowledge and Skills Between Academia and Industry (정보보호 전문인력의 소요 지식 및 기술에 대한 산업체와 교육기관의 관점 비교)

  • Yoo, Hye-Won;Kim, Tae-Sung
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.113-129
    • /
    • 2009
  • With increasing interest in information security, many studies have been conducted on cultivation and management of information security manpower. The widespread application of information security made the activity of information security professionals more diverse. Therefore, it is essential to analyze the knowledge and skills that are necessary for information security professionals to carry out their job and we also need to take these into considerations for the development and operation of education programs. In this study, for analyzing the perception gaps of information security knowledge and skills level between academia and industry, we have derived 58 knowledge and skills by conducting the literature review and Delphi method and we also conducted a survey of information security knowledge and skills requirements for information security professionals who are now working in industries and educational organizations. As a result, we analyze the perception gaps between two groups of information security professionals and suggest some guidelines for establishing the demand-based curriculum for training information security professionals.

A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System (보안관리체계 분석을 통한 산업중심 보안수준평가 모형 설계 방향 연구)

  • Bae, Je-Min;Kim, Sanggeun;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.177-191
    • /
    • 2015
  • Recently, the necessity of systematic security management system that consider company' character and environment has appeared because of increasing security accident continuously in domestic companies. However, most of companies has applied to only K-ISMS which is existing information security management system, although They are different from object, purpose and way of security level evaluation by companies. According to this situation, Many experts have questioned that there are many problems with effectiveness of introducing security management system. In this study, We established definition of information security management system, industrial security management system and research security management system through analysis of previous study and developed evaluation item which can implement security in whole industry comparing and analyzing the control items of them. Also, we analyzed existing security level evaluation and suggest design direction of industry-centric security level evaluation model considering character of industry.

A Study on the Curriculum of Department of Information Security in Domestic Universities and Graduate Schools and Comparison with the Needs of Industry Knowledge (국내 대학 및 대학원 정보보호 교육과정 분석 및 산업체 필요 지식과의 관련성 비교)

  • Kim, Min-Jeong;Lee, Haeni;Song, Shin-Jeong;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.195-205
    • /
    • 2014
  • These days cyber attacks are increasing all over the world, and the national critical infrastructure and information network protection has become important. For this reason, the concentrated investment in information security and development of professional human resource are essential, but there is a shortage of information security workforce in Korea. Currently, departments of information security in domestic universities make efforts to develop human resource of information security and have a increasing interest in the curriculum design. So this paper investigates the curriculums of information security in domestic universities and graduate schools. And then, it compares with the needs of industry knowledge and skills by using SPSS. Through this analysis, we will get implications about curriculum design of Information security.

The Improvement Plan of the Curriculum for Development in Study of Security (경호학의 발전을 위한 교육과정 개선방안)

  • Jeong, Youn-min;Bak, Jun-seok;Yang, Deok-youl
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.2
    • /
    • pp.88-106
    • /
    • 2009
  • The potential risks of Korean public security has been increasing by economic stagnation. As a result of this, a feeling of unrest about our society causes expansion of private security industry as well as necessity of professional education. It has been 15years to produce security expert in colleges which is professional education institute, and academic efforts and contributions to society are shown remarkable results for the period. A private security industry had got public interest as a potential favorable job, because of increasing dependence of public to take care of unrest facts. Many colleges have introduced courses about public security because of facing necessity of professional education system. Then total 59 institutes including 22 universities and 37 colleges introduce courses of public security. Although name of courses are diverse depends on institution, purpose of course or members of course, the ultimate purpose of these courses is preventing public from crimes and managing public security. A fixed and out of date education system of universities in Korea can not produce talent person who people, companies and government want. The institutions have been recruiting many student so far, and it shows growth of the industry in quantity aspects. However quality aspect of the industry has been failed because it is hard to get a job for graduated students. Consequently, to improve quality of the industry people need cooperation of institution, professors and students.

  • PDF

On the Prediction of the Sales in Information Security Industry

  • Kim, Dae-Hak;Jeong, Hyeong-Chul
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.4
    • /
    • pp.1047-1058
    • /
    • 2008
  • Prediction of total sales in information security industry is considered. Exponential smoothing and spline smoothing is applied to the time series of annual sales data. Due to the different survey items of every year, we recollect the original survey data by some basic criterion and predict the sales to 2014. We show the total sales in infonnation security industry are increasing gradually by year.

  • PDF

Assessing the Importance of Information Security Factors Using AHP: Case of Defense Agency's Outsourcing Development of Information Systems (AHP를 이용한 정보보안 요소의 중요도 평가: 국방기관 정보시스템 외주개발 사례)

  • Park, Dongsoo;Yoon, Hanseong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.55-68
    • /
    • 2018
  • In this paper, we identify and evaluate the information security factors considered in outsourcing development of information systems for defense agency with analytic hierarchy process(AHP). To assess the information security elements, we prepared three groups including the experts of a defense agency, subcontractor managers and subcontractor practitioners who are involved in developing information systems. And the relative importance of security factors were analyzed using questionnaires and responses. As a result of analysis of 27 security factors, factors corresponding to human and physical security as a whole were evaluated as having higher importance. Although there are some differences in the ranking of some importance according to human roles, they can be positive for the implementation of complementary information security. And administrative security and technical security can be relatively insignificant considering that they can be considered as infrastructure of the overall information environment. The result of this paper will be helpful to recognize the difference of perception of information security factors among the persons in the organization where collaboration is activated and to prepare countermeasures against them.