• Title/Summary/Keyword: Security Management Framework

Search Result 358, Processing Time 0.227 seconds

Architectural Framework of a WAP-Based Management System for Resource Monitoring (자원 모니터링을 위한 WAP 기반 관리 시스템의 아키텍쳐 프레임워크)

  • Lee, DaeYeon;Koo, JaHwan;Lee, HaengGon;Lee, WonHyuk;Eum, YoungIk
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.27-35
    • /
    • 2004
  • A current trend in telecommunication is the convergence of wireless communication and computer network technologies, and the emergence of wireless application protocol(WAP) devices is an example. Computer system managers are often requested to solve urgent system problems. Many times, they cannot access a computer to perform remote system management tasks. Aiming at solving this problem, this paper presents a novel tool for system management that uses a WAP interface, and focuses on the description of the architecture and the associated application modules.

  • PDF

Thinking multiculturality in the age of hybrid threats: Converging cyber and physical security in Akkuyu nuclear power plant

  • Bicakci, A. Salih;Evren, Ayhan Gucuyener
    • Nuclear Engineering and Technology
    • /
    • v.54 no.7
    • /
    • pp.2467-2474
    • /
    • 2022
  • Nuclear Power Plants (NPPs) are the most protected facilities among all critical infrastructures (CIs). In addition to physical security, cyber security becomes a significant concern for NPPs since swift digitalization and overreliance on computer-based systems in the facility operations transformed NPPs into targets for cyber/physical attacks. Despite technical competencies, humans are still the central component of a resilient NPP to develop an effective nuclear security culture. Turkey is one of the newcomers in the nuclear energy industry, and Turkish Akkuyu NPP has a unique model owned by an international consortium. Since Turkey has limited experience in nuclear energy industry, specific multinational and multicultural characteristics of Turkish Akkuyu NPP also requires further research in terms of the Facility's prospective nuclear security. Yet, the link between "national cultures" and "nuclear security" is underestimated in nuclear security studies. By relying on Hofstede's national culture framework, our research aims to address this gap and explore possible implications of cross-national cultural differences on nuclear security. To cope with security challenges in the age of hybrid threats, we propose a security management model which addresses the need for cyber-physical security integration to cultivate a robust nuclear security culture in a multicultural working environment.

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

Implication of Industrial Security Capacity Based on Level Evaluation (산업보안 역량 수준평가 및 개선방안)

  • Kim, Moon Sun;Jeoune, Dae-Seong;Nam, Kyung H.;Kim, Gyu-Ro;Han, Chan-Myeong
    • Journal of Korean Society for Quality Management
    • /
    • v.41 no.4
    • /
    • pp.649-657
    • /
    • 2013
  • Purpose: In this study, the actual situation of domestic firms vulnerable to industrial security competence will be discussed. And accordingly be discussed for effective response measures. Methods: Using a structured questionnaire by mail, fax, e-mail and fill method was used respondents. By the end of '10 R&D Center, which holds 15,247 companies(population) among the 95% level of confidence, tolerance ${\pm}3%$ p-level corporate type, sector, region extraction method stratified multi-level companies were investigated through the final 1529. Results: The average level of industrial security capabilities 43.8%(out of 100) is very weak, so urgent and positive response measures also need to be investigated sought. Conclusion: we propose the effective management framework and improvement plans to prevent illegal industrial leakage are to be made.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Security Container CRYPTEX Model for Copyright Management of Software Source Code (소프트웨어 소스코드의 저작권 관리를 위한 보안 컨테이너 크립텍스 모델)

  • Cha, Byung-Rae
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.451-463
    • /
    • 2008
  • There are management and security of software source code equivalent to 10 assembly lines of important infrastructure in the early stage of information society directly. A support technology and framework to protect software source code are so poor state In this paper, the proposed model that is support protection and access control between software source code as object and subject that is not authenticated safely was named CRYPTEX model. And we propose active business model to provide delegate, mobile, and security/access control function for passive software source code in document state using CRYPTEX.

  • PDF

An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone (스마트 폰의 소프트웨어 보안성 분석을 위한 FTA와 FMEA의 통합적 방법)

  • Kim, Myong-Hee;Toyib, Wildan;Park, Man-Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.541-552
    • /
    • 2013
  • Recently software security of the smart phone is an important issue in the field of information science and technology due to fast propagation of smart technology in our life. The smart phone as the security critical systems which are utilizing in terminal systems of the banking, ubiquitous home management, airline passengers screening, and so on are related to the risk of costs, risk of loss, risk of availability, and risk by usage. For the security issues, software hazard analysis of smart phone is the key approaching method by use of observed failures. In this paper, we propose an efficient integrative framework for software security analysis of the smart phone using Fault Tree Analysis (FTA) and Failure Mode Effect Analysis (FMEA) to gain a convergence security and reliability analysis technique on hand handle devices. And we discuss about that if a failure mode effect analysis performs simpler, not only for improving security but also reducing failure effects on this smart device, the proposed integrative framework is a key solution.

Unveiling the Effects of ICT Adoption in the Apparel Sector of Bangladesh Based on Technology-Organization-Environment Framework

  • S.M. Shafiul Alam
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.977-998
    • /
    • 2023
  • The study is based on the technology-organization-environment (TOE) model which, attempted to determine the factors that are going to influence ICT adoption. The proposed research model evaluates the interplay among technological context (IT infrastructure, system security, and user capacity), organizational context (top management commitment, and innovations strategies), environmental context (quick response to the external agencies, interactive network infrastructure, and competitive pressure) and ICT adoption (productivity growth, organizational change, and competitiveness). Data were collected from 243 senior executives of full member firms of the Bangladesh Garments and Manufacturers Association (BGMEA) of examining the relationships among the constructs in the proposed framework utilizing structural equation modeling (SEM). The analysis of TOE factors revealed that environmental, organizational, and technological factors have a significant impact on the successful implementation of ICT tools. The study also discusses implications for management practitioners.

Network intruder trace back mechanism in a Policy-based network security management framework (정책기반 네트워크보안 프레임워크에서의 네트워크 침입자 역 추적 메커니즘)

  • Bang, Hyo-Chan;Na, Jung-Chan;Jang, Jong-Su;Son, Sung-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.899-902
    • /
    • 2002
  • 본 논문에서는 정책기반의 네트워크 보안 프레임워크 내에서 동작하는 침입자 역 추적 방안을 제안하고, 필요한 기능 구성요소에 대해 논한다. 제안한 역 추적 방안에서는 라우터, 스위치 등과 같은 기존의 네트워크 노드에서 tracing 기능을 직접 수행하지 않고도 위조된 유해 패킷의 송신 근원지 파악이 가능하다. 특히 정책기반의 네트워크 보안 프레임워크 내의 구성요소(보안제어서버, 보안게이트웨이)만으로 근원지 주소를 파악할 수 있기 때문에 망 구성 환경에 영향을 받지 않으며 네트워크 서비스 성능에 영향을 끼치지 않고도 침입 근원지를 파악하여 대응 할 수 있는 능동적인 보안 기능이 가능하다.

  • PDF

Transition from Diagnosis to Assessment System in Public Institution Personal Information Protection Management: Policy Approaches and Recommendations (공공기관 개인정보보호 관리 수준 진단에서 평가 체계로의 전환 : 정책적 접근 및 제언)

  • Youn-hee Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.801-809
    • /
    • 2024
  • In the digital age, the importance of personal information has magnified, underscoring the need for enhanced personal information protection, especially within public institutions. Despite ongoing efforts since 2007, significant breaches in public sector information underline persistent vulnerabilities. This study advocates for a transition from a diagnostic to an assessment framework to fortify privacy management in public institutions, as mandated by recent legislative revisions. The amended Personal Information Protection Act introduces an assessment approach, aiming to comprehensively assess and mitigate risks by expanding the scope of evaluation and implementing robust regulatory measures. This study examines the limitations of the current diagnostic practices through literature review and case analysis and proposes a systematic approach to adopting the new assesment system. By enhancing the assessment framework, the study expects to improve the effectiveness of personal information management in public institutions, thereby restoring public trust and ensuring a stable progression into a more secure digital era. The transition to an assessment system is designed not only to address the gaps in the current framework but also to provide a methodical assessment that supports ongoing improvement and compliance with enhanced legal standards.