• Title/Summary/Keyword: Security Measurement

Search Result 445, Processing Time 0.029 seconds

Security Issues & Application in Korea SCADA

  • Kim, Hak-Man;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.9
    • /
    • pp.95-100
    • /
    • 2007
  • The importance of communication security is increased in the power industry. The representative communication network of power industry is the SCADA(Supervisory Control and Data Acquisition) systems. The SCADA system has been used for remote measurement and control in the power industry. Recently, many studies of SCADA network security have been carried out around the world. In this paper, we introduce recent security issues in the SCADA network and propose the application of a symmetric encryption method to the Korea SCADA network.

Developing key Performance Indicators for Financial IT Security (금융IT 보안조직 역량강화를 위한 핵심성과지표(KPI) 도출에 관한 연구)

  • Jang, Sung Ok;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.125-142
    • /
    • 2013
  • As a reinforcing strategic-alignment of IT business, Financial Service becomes more rely on IT systems. It needs to continuous information security activities to provide a secure and reliable finance service. Performance measurement of information security activities can be useful for decision and management support. The purpose of this study is to derive CSF(Critical Success Factor) and KPI(Key Performance Indicator) based on K-ISMS, Financial IT Information Security Standards. Providing a rationale can be used to determine key performance indicators, which are utilized as basic data for establishing security policies for financial IT security competency.

Improvements of Information Security Level in Electronic Financial Infrastructure(By Analyzing Information Security Management Level) (전자금융기반시설 정보보호 수준강화 방안 (정보보호 관리수준 분석을 통한))

  • Park, Keun-dug;Youm, Heung-youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1605-1618
    • /
    • 2016
  • In recent years, security incidents - such as personal information leakage, homepage hacking, DDoS and etc. - targeting finance companies(banks, securities companies, credit card companies, insurance companies and etc.) have increased steadily. In this paper, we analyze problems of information security management level in the existing electronic financial infrastructure from perspective of compliance and information security certification system and propose improvements to enable sustainable high level of information security activities under a comprehensive management system for the financial sector characteristics using ISMS, SECU-STAR and CNIVAM system.

Development and Validation of Food Security Measure (식품 보장 측정의 개발과 타당도 연구)

  • Kim, Ki-Rang;Kim, Mi-Kyung
    • Journal of Nutrition and Health
    • /
    • v.42 no.4
    • /
    • pp.374-385
    • /
    • 2009
  • This study aims to develop an index of food security in order to assess food security status in Korea and to evaluate reliability and validity of the index. The index of food security was developed based on the US Household Food Security Survey Module (US-HFSS). After the US-HFSS was translated and back-translated, it was evaluated and modified by a focus interview for experts. The developed Korean Household Food Security Survey Module (K-HFSS) was tested by cognitive interviews and a pretest for general community population to assess its application for Korean population. For the reliability and validity of K-HFSS, the survey was conducted with 300 adults aged 40 years or more living in a rural community and 212 infants and toddlers living in an urban community. The reliability was assessed by Cronbach' alpha and the validity was evaluated by content validity, construct validity, and criterion-related validity. The questionnaire items of K-HFSS were partly modified, accounting for Korean social and cultural backgrounds and adapted by general community population. The reliability was relatively high, showing Cronbach' alpha coefficients ranged from 0.80 (for adults) to 0.87 (for infants and toddlers). The content and construct validities were all acceptable. The result of criterion-related validity showed that food security status was significantly related to the household income level. In conclusion, the K-HFSS would be used as a reliable and valid instrument to assess food security status in parts of the Korean population.

Financial Security of Vietnamese Businesses and Its Influencing Factors

  • NGUYEN, Van Cong;NGUYEN, Thi Ngoc Lan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.2
    • /
    • pp.75-87
    • /
    • 2020
  • This paper aims to not only investigate the nature of financial security and its measurement, but also to compare financial security level in 629 listed companies divided into four different industries (materials, industrials, health care, and consumer goods) before building a theoretical framework and regression models to examine the determinants of financial security. By gathering 2,167 financial statements published in Vietnamese Stock Exchange during eight years from 2012 to 2019, with the support of STATA, the research results indicate that six different internal factors, which are liquidity, profitability, firm size, debt management ratios, asset management ratios, and cash flows, explain 77.7% the change of financial security ratio and 3.4% the change in sustainable growth ratio. Specifically, while firm size has a positive impact on sustainable growth ratio but a negative impact on financial security ratio, deb management and profitability have an insignificant influence on the financial security level. Furthermore, an increase in asset management ratios would result positively in both two dependent variables whereas a rise in sustainable growth and a decline in financial security ratio are expected to witness if there is an increase in cash flows.

The impact of the introduction of information security solutions by public organizations on the improvement of information security level (공공기관의 정보보안 솔루션 도입이 정보보안 수준 향상에 미치는 영향)

  • Kim, Hyeob;Eom, Su-Seong;Kwon, HyukJun
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.19-25
    • /
    • 2017
  • Public institutions invest about half of the information protection budget annually to introduce information security products and information protection services in order to prevent cyber terrorism and establish organizational security. However, research on whether introduced information security products has a positive influence on improving the information security level of the actual institution is in an incomplete state, and accordingly, There are problems such as the measurement of the investment effect of the information security product introduced in the organization and the difficulty in selecting the optimum information security product that the agency actually needs. In this paper, prior research will conduct research on the influence of the introduction of information security products on the improvement of information security level of organization through analysis of operational data of inadequate information security products, and based on the research results, It would be useful to use it for information security practices such as optimal product selection and internal security policy formulation through validation of the introduction of information security products of public institutions.

A Study on Method for Network Security Measurement (네트워크 보안성 측정방법에 관한 연구)

  • Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.79-86
    • /
    • 2007
  • In recent, one of the interesting research areas is about quality of network system. Therefore many research centers including ISO are preparing the measuring and evaluating method for network quality. This study will represent an evaluating model for network security based on checklist. In addition, we propose an measuring and evaluating method for network performance. The purpose of two studies is to present the evaluating procedure and method for measuring security of network on set workwill be identified and a measuring method and procedure will be proposed.

  • PDF

A Study on Design of Model for Research Security Level Measurement (연구보안 수준측정 모형 설계에 관한 연구)

  • Lee, Hyojik;Kim, Jawon;Na, Onechul;Chang, Hangbae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.295-298
    • /
    • 2017
  • 최근 국가연구개발사업은 개방형 연구환경으로 변화되어지고 있다. 이러한 변화는 연구개발 자원 및 시간 절감, R&D 투자효과 증대 등 긍정적인 효과를 동반하지만 연구 수행 과정, 연구성과물 유출과 같은 역기능이 발생하고 있다. 따라서 본 연구에서는 연구환경 변화에 따른 연구성과물 유출 가능성을 줄이기 위해서 자체적으로 보안관리 및 평가를 할 수 있는 연구보안 수준측정 모형을 설계하고자 한다. 이는 연구기관의 보안 수준 파악과 향상을 위해 유용하게 활용될 것으로 기대된다.

Study on the Measurement of Consumption Cost Applying the Security of High-Performance Wired and Wireless network (고성능 유·무선 통신망에서의 보안 적용 시 소모비용 측정에 대한 연구)

  • Park, MyungSeo;Yun, Seunghwan;Yi, Okyeon;Kim, Jongsung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.845-848
    • /
    • 2013
  • 유 무선 통신망을 통한 여러 서비스들에 대해 정보의 정확성, 전달속도 및 신뢰성은 서비스 제공에 중요한 요소도 작용된다. 뿐만 아니라 최근 정보보호의 인식이 커지면서 보안 적용도 중요한 요소로 자리 잡고 있다. 하지만 보안 적용 시 속도 지연 및 서비스 품질 저하의 문제가 발생할 수 있다. 이러한 문제는 보안 적용에 필수적인 암호 알고리즘 수행 시 내부적으로 소모되는 연산 비용이 크기 때문에 발생할 수 있다. 본 논문에서는 암호 장치를 추가한 테스트 환경을 구축하여, 보안을 적용하였을 때 소모되는 비용을 암호 알고리즘 레벨로 측정 및 분석하였다. 결과적으로 암호 장치를 추가하여 암호를 수행했을 때 암호화에 대한 소모비용은 데이터 통신에 많은 영향을 주지 않는다는 것을 확인하였다.

Measurement of Remediation for Compromised User Account of Web Single Sign-On (SSO) (침해된 웹 SSO 계정 보호를 위한 보안 조치 실험 연구)

  • Nam, Ji-Hyun;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.941-950
    • /
    • 2021
  • Single Sign-On (SSO) service manages user's account passwords from multiple websites so that security in a high level is required. Users who use the SSO service are authenticated through the Identity Provider (IdP) when logging into the website. We present the security requirements that IdP can take in order to minimize the user's risk whose IdP account is compromised. We describe the security threats that arise when the security requirements are not satisfied. Through evaluation, we prove that the attacker's session cannot be canceled even if the user recognizes the attack if the IdP does not satisfy the security requirements.