• Title/Summary/Keyword: Security Assurance

Search Result 230, Processing Time 0.028 seconds

A Study on the Information Security Technical Architecture focusing on the Primary Defense Information Infrastructure (국방주요정보통신기반시설 중심의 정보보호기술구조 연구)

  • Choi, Ji-Na;Nam, Kil-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.1 s.24
    • /
    • pp.80-88
    • /
    • 2006
  • The purpose of this thesis is to research and propose a practical Information Security Technical Architecture on Primary Defense Information Infrastructure with regard to requirement of information security. The scope of this research is limited to national defense information master plan & security rule, and U.S. DoD's IATF is used to plan a detailed structure. The result of this research can be used as a guide book for providing security for Army IT infrastructure now and in the future as well as to devise a plan for research and development in information protection technology.

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.

A Study on the Development of Korea Defense PKI for Information Assurance (정보보증을 위한 국방PKI 구축 방안에 관한 연구)

  • 김종문;남길현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.637-641
    • /
    • 2002
  • 현재 국방부는 국방 정보 통신망에서 소통되는 정보에 대한 기밀성 및 무결성을 보장하고, 접근통제, 사용자 식별 및 인증, 부인봉쇄 등의 보안서비스를 제공하기 위한 국방 인증체계 구축 사업을 추진하고 있다. 본 논문은 미 국방부의 미 국방 PKI를 연구하고, 현재 우리 군에서 추진하고 있는 국방 인증체계 구축 노력에 대한 문제점을 분석하여 앞으로 우리 군이 국방 인증체계 구축을 위해 추진해 나가야 할 방향을 제시하였다.

  • PDF

The Viability of the Malaysian Penal Code in Handling Physical Damage Caused by Malware

  • Rahman, Rizal;Zakaria, Mohd Sophian
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.52-56
    • /
    • 2021
  • There is no assurance that malware could only cause virtual damage to computer programs and data as its potential is endless. However, legal provisions were earlier developed to cater to either a physical damage caused by a physical action or a virtual damage caused by a virtual action. When crossovers occur, it becomes quite uncertain as to how viable the current laws are in handling this matter. The author seeks to address the issue from the perspective of the laws of Malaysia.

A Study on the development of metrics for security evaluation of secondary schools (중등학교의 보안성 평가를 위한 지표 개발에 관한 연구)

  • 고진홍;안성진
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.145-151
    • /
    • 2004
  • School Networks environment is implemented in many schools to support educational activities for networking resources required in teaching-teaming activities with government initiative. On the other hand, the open system in school which are used in internet in internet do considerable damage committed by intruder and cracker to the preservation of computer data and system due to second schools security state. Therefore this study is to present assortment in information resources of schools, security items and problem. finally, we give the effective and systematic metrics of estimates for security of secondary schools in information resources parts.

  • PDF

A Study on the Secure Coding for Security Improvement of Delphi XE2 DataSnap Server (델파이 XE2 DataSnap 서버의 보안성 개선을 위한 시큐어 코딩에 관한 연구)

  • Jung, Myoung-Gyu;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.706-715
    • /
    • 2014
  • It is used to lead to serious structural vulnerability of the system security of security-critical system when we have quickly developed software system according to urgent release schedule without appropriate security planning, management, and assurance processes. The Data Set and Provider of DataSnap, which is a middleware of Delphi XE2 of the Embarcadero Technologies Co., certainly help to develop an easy and fast-paced procedure, but it is difficult to apply security program and vulnerable to control software system security when the connection structure Database-DataSnap server-SQL Connection-SQL Data set-Provider is applied. This is due to that all kinds of information of Provider are exposed on the moment when DataSnap Server Port is sure to malicious attackers. This exposure becomes a window capable of running SQL Command. Thus, it should not be used Data Set and Provider in the DataSnap Server in consideration of all aspects of security management. In this paper, we study on the verification of the security vulnerabilities for Client and Server DataSnap in Dlephi XE2, and we propose a secure coding method to improve security vulnerability in the DataSnap server system.

Refining software vulnerbility Analysis under ISO/IEC 15408 and 18045 (ISO/IEC 15408, 18045 기반 소프트웨어 취약성 분석 방법론)

  • Im, Jae-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.969-974
    • /
    • 2014
  • CC (Common Criteria) requires collecting vulnerability information and analyzing them by using penetration testing for evaluating IT security products. Under the time limited circumstance, developers cannot help but apply vulnerability analysis at random to the products. Without the systematic vulnerability analysis, it is inevitable to get the diverse vulnerability analysis results depending on competence in vulnerability analysis of developers. It causes that the security quality of the products are different despite of the same level of security assurance. It is even worse for the other IT products that are not obliged to get the CC evaluation to be applied the vulnerability analysis. This study describes not only how to apply vulnerability taxonomy to IT security vulnerability but also how to manage security quality of IT security products practically.

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

A Study on Security Evaluation Methodology for Industrial Control Systems (제어시스템 보안성 평가 방법에 관한 연구)

  • Choi, Myeonggil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.287-298
    • /
    • 2013
  • Industrial Control systems which are operated in the industrial infrastructure adopts the various functions and face various threats in these days. To assure the security of the industrial control systems, the security evaluation methodology should be necessarily developed. This study suggests the processes and methodology for evaluating control systems, verifies the effectiveness of processes and methodologies through development of security checklists. The results of the study will be utilized for operators, evaluators and obtainers of industrial controls and be basis for developing and assuring the industrial controls systems.

A Study on Critical Success Factors of Electronic Commerce (전자상거래의 주요 성공요인에 관한 연구)

  • Kim Jung-Yeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.267-273
    • /
    • 2005
  • The internet is not simply a new technology that businesses are adopting to reduce their costs of operations and increase revenues. It is literally transforming the way business work. Electronic commerce refers generally to all forms of transactions relating to commercial activities. This research was conducted to identify the critical success factors of electronic commerce. In this study it is found that price and customer service are very important to increase customer satisfaction and intention to repurchase. In addition, the result of this study shows that (1) ease of use, (2) transaction efficiency and (3) qualify assurance are very important to increase customer satisfaction. And, the result of this study shows that (1) ease of use and (2) security are very important to increase intention to repurchase.

  • PDF