• 제목/요약/키워드: Security Case

검색결과 1,791건 처리시간 0.033초

기업의 정보보안 투자에 시장이 어떻게 반응하는지에 대한 탐색적 연구 (How does the Stock Market Reacts to Information Security Investment of Firms in Korea : An Exploratory Study)

  • 박재영;정우진;김범수
    • 한국IT서비스학회지
    • /
    • 제17권1호
    • /
    • pp.33-45
    • /
    • 2018
  • Recently, many South Korean firms have suffered financial losses and damaged corporate images from the data breaches. Accordingly, a firm should manage their IT assets securely through an information security investment. However, the difficulty of measuring the return on an information security investment is one of the critical obstacles for firms in making such investment decisions. There have been a number of studies on the effect of IT investment so far, but there are few researches on information security investment. In this paper, based on a sample of 76 investment announcements of firms whose stocks are publicly traded in the South Korea's stock market between 2001 and 2017, we examines the market reaction to information security investment by using event study methodology. The results of the main effects indicate that self-developed is significantly related to cumulative average abnormal returns (CAARs), while no significant effect was observed for discloser, investment characteristics and firm characteristics. In addition, we find that the market reacts more favorably to the news announced by the subject of investment than the vendor, in case of investments with commercial exploitation. One of main contributions in our study is that it has revealed the factors affecting the market reaction to announcement of information security investment. It is also expected that, in practice, corporate executives will be able to help make an information security investment decision.

공공부문 정보보호 교육과정의 평가 : 사례 연구 (Evaluation of Public Information Security Training Programs : A Case Study)

  • 이송하;전효정;김태성
    • 한국IT서비스학회지
    • /
    • 제19권1호
    • /
    • pp.173-185
    • /
    • 2020
  • It is very important to evaluate training because it can systematically grasp the current status of training. Evaluation includes getting ongoing feedback from the learner, trainer and learner's supervisor, to improve the quality of the training and identify if the learner achieved the goals of the training. It also provides a justification for the implementation of training. Nonetheless, there is a lack of studies that attempt to evaluate information security training programs. In this study, we utilize the Philips model to evaluate the public training programs for the people who are in charge of the information security duties in the public sector and propose the training improvement plans. Research result has shown that it is necessary to evaluate the level of the trainees in advance and conduct training programs according to the information security skill level. In addition, it needs to conduct training according to duties such as information security management, information security operate and maintain. The limitation of this study is that each education program was not assessed individually because this study had developed an evaluation tool that could be used comprehensively.

원스톱 보안(One-Stop Security) 도입을 통한 항공화물 공급망 보안체계 강화 연구 - ICAO 국제기준 및 EU 사례를 중심으로 - (A Study on Securing of Air Cargo Supply Chain by Adapting One-Stop Security - Focusing on ICAO SARPs and EU Case -)

  • 박만희;이승열;허백용;황호원
    • 한국항공운항학회지
    • /
    • 제28권3호
    • /
    • pp.18-26
    • /
    • 2020
  • Cost reduction and equality by exempting re-scanning of passengers, baggage and cargo secured from the first airport of departure, mainly in the European Union/European Economic Area(EU/EEA), Switzerland, etc. One-Stop Security(OSS) is being promoted to maintain the level of security while increasing speed and convenience, and movement is expected to expand worldwide. Therefore, this paper establishes the basic concept of OSS through a literature review of ICAO Standards and Recommended Practices(SARPs), and analyzes the actual conditions of OSS implementation in major countries such as the United States and the EU. It is intended to present the political, economic benefits for Korea and highlight the urgency of implementing the OSS system in the aviation industry including the cargo sector. Therefore, the practical implications of strengthening international cooperation through the expansion of government and airport operators OSS implementation to overcome the resource shortage problem of the existing national air cargo security system and to strengthen the status as a global aviation powerhouse were drawn up. There is academic significance that it raised the need for effective implementation of OSS, which was not previously covered.

Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle

  • Kim, Dong Hee;Baek, Seung Jo;Lim, Jongin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.865-882
    • /
    • 2017
  • To improve passenger convenience and safety, today's vehicle is evolving into a "connected vehicle," which mounts various sensors, electronic control devices, and wired/wireless communication devices. However, as the number of connections to external networks via the various electronic devices of connected vehicles increases and the internal structures of vehicles become more complex, there is an increasing chance of encountering issues such as malfunctions due to various functional defects and hacking. Recalls and indemnifications due to such hacking or defects, which may occur as vehicles evolve into connected vehicles, are becoming a new risk for automakers, causing devastating financial losses. Therefore, automakers need to make voluntary efforts to comply with security ethics and strengthen their responsibilities. In this study, we investigated potential security issues that may occur under a connected vehicle environment (vehicle-to-vehicle, vehicle-to-infrastructure, and internal communication). Furthermore, we analyzed several case studies related to automaker's legal risks and responsibilities and identified the security requirements and necessary roles to be played by each player in the automobile development process (design, manufacturing, sales, and post-sales management) to enhance their responsibility, along with measures to manage their legal risks.

안드로이드 앱 악성행위 탐지를 위한 분석 기법 연구 (Android Application Analysis Method for Malicious Activity Detection)

  • 심원태;김종명;류재철;노봉남
    • 정보보호학회논문지
    • /
    • 제21권1호
    • /
    • pp.213-219
    • /
    • 2011
  • 스마트폰 시장이 급속하게 성장함에 따라 보안위협도 동시에 증가하고 있다. 가장 큰 스마트폰 보안위협 중 하나는 스마트폰 마켓에 안전성이 검증되지 않은 어플리케이션이 유통되고 있다는 점이다. 안드로이드 마켓의 경우 어플리케이션 검증을 수행하지 않아 악성 어플리케이션이 유통되고 있는 상황이다. 이와 같이 마켓을 통해 유포되는 악성 어플리케이션에 대응하기 위해서는 안드로이드 어플리케이선의 악성 행위 여부를 탐지할수 있는 기술이 필요하다. 본 논문에서는 안드로이드 어플리케이션의 악성행위를 탐지할 수 있는 분석 방법을 제안하고 구현내용을 소개하고자 한다.

국제 행사에 대한 테러대응 사례분석과 정책적 함의 (A Study on the Counter-Measures for International Events through the Case Studies and Its Implications for Counter-Terrorism Policy)

  • 박동균;신익주
    • 시큐리티연구
    • /
    • 제14호
    • /
    • pp.161-179
    • /
    • 2007
  • 국제회의 및 국제 스포츠 행사는 개최기간 중에 테러나 안전사고 등이 발생할 경우에 행사 그 자체가 실패할 뿐만 아니라 많은 생명과 재산이 파괴되고, 궁극적으로는 개최국의 신뢰도 저하가 수반되기 때문에 안전대책 이야말로 가장 중요한 요소이다. 이러한 맥락에서, 본 연구에서는 최근 10년간 세계 각국에서 실시한 국제회의 및 스포츠 행사에 대한 테러대응 사례를 분석하고, 이를 통해서 나타난 정책적 함의를 제시하는 목적에서 진행되었다. 본 연구에서 나타난 향후 국제회의 및 스포츠 행사에 대한 테러대응의 기본 방향을 압축하여 제시하면 다음과 같다. 먼저, 대규모 국제 행사 개최시 잘 훈련된 전문가인 안전요원 및 행사요원의 양성이 중요하다. 앞으로 자주 개최될 각종 국제행사에는 자칫 타성에 빠질 수 있는 정부 주도의 행사 보다는 각 지방자치단체가 지역내 대학과 연계되어 보안에 필요한 인력 및 재원확보를 안정적으로 해야 한다. 또한, 테러리스트들의 전략과 전술을 명확히 이해하고 정보를 활용하여 그들보다 앞서나 가는 시스템을 구축해야 한다. 따라서 정부의 주도하에 테러리즘에 대한 직 간접적인 교육과 연구 활동을 촉진시켜 테러리즘의 다양한 측면과 대응책 등 테러리즘에 대한 전반적인 안목을 국민들에게 길러줌으로써 만일의 사태에 총체적으로 대응 할 수 있는 기반을 만들어야 한다. 끝으로, 뉴 테러리즘의 한 수단으로서 사용되는 사이버 테러(cyber terror)에 대한 철저한 대비책을 마련해야 한다.

  • PDF

정보 보안 방안 선택을 위한 퍼지 AHP 방법의 비교 검토 (Comparison of Fuzzy AHP Decision Making Approaches for Selection among Information Security Systems)

  • 이경근;류시욱
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제19권3호
    • /
    • pp.59-73
    • /
    • 2010
  • Along with advance of information technology, value of information is growing much more than ever. And nearly all organizations pay great attentions to information security to protect their own important informations against every kind of hazardous accidents. Therefore, organizations want to select best information security system among many possible alternatives. For this purpose, several fuzzy AHP decision making approaches can be utilized. In this study, we consider a number of qualitative and quantitative factors to evaluate security systems and then apply three fuzzy AHP approaches for simple case to compare the results from three approaches. We find that final decision depends on both fuzzy AHP methods and degree of fuzziness.

사례로 살펴본 렌섬웨어 공격에 의한 피해를 최소화하는 연구 고찰 (Research on Minimizing the Damage from Ransomware Attack by Case Study)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.103-111
    • /
    • 2017
  • Recently, new variants of Ransomware are becoming a new security issue. Ransomware continues to evolve to avoid network of security solutions and extort users' information to demand Bitcoin using social engineering technique. Ransomware is damaging to users not only in Korea but also in all around the world. In this thesis, it will present research solution to prevent and cope from damage by new variants Ransomware, by studying on the types and damage cases of Ransomware that cause social problems. Ransomware which introduced in this paper, is the most issued malicious code in 2016, so it will evolve to a new and more powerful Ransomware which security officers cannot predict to gain profit. In this thesis, it proposes 4 methods to prevent the damage from the new variants of Ransomware to minimize the damage and infection from Ransomware. Most importantly, if user infected from Ransomware, it is very hard to recover. Thus, it is important that users understand the basic security rules and effort to prevent them from infection.

2006년도 지적재산보호 해외동향 및 사례 연구 (The International Trend and Case Study of Intellectual Property Protection in 2006)

  • 심미나;이영준;임종인
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.691-702
    • /
    • 2006
  • 최근 들어 IT기술의 발전과 정보의 디지털화와 더불어 지적재산권의 중요성이 커지고 있는 시점에서 최신 지적재산 보호의 주요국의 최신 동향과 지적재산과 관련된 분쟁사례를 조사 분석하고, 최신 동항의 주요 특징들을 통해 향후 우리나라의 권리보호와 관리기술의 개발 및 지적재산권 법제 개선의 발전방향을 모색하고자 한다.

  • PDF

클라우드 컴퓨팅 보안의 취약성에 관한 연구 (A study on the vulnerability of the Cloud computing security)

  • 전정훈
    • 정보보호학회논문지
    • /
    • 제23권6호
    • /
    • pp.1239-1246
    • /
    • 2013
  • 최근 클라우드 컴퓨팅 기술은 전 세계적으로 중요한 이슈로 부각되고 있으며, 기술과 서비스에 있어, 많은 주목을 받고 있다. 그러나 클라우드 컴퓨팅의 긍정적인 측면과는 달리, 여러 취약점들로 인해, 해킹기술의 진화에 따른 다양한 공격과 피해가 예상되고 있다. 따라서 본 논문은 클라우드 컴퓨팅의 위협과 취약성에 대해 실험 및 사례연구를 통해 관리 모델들을 분석함으로써, 향후, 클라우드 컴퓨팅의 보안 설계와 성능 향상을 위한 자료로 활용될 것으로 기대한다.