• Title/Summary/Keyword: information security product

Search Result 309, Processing Time 0.062 seconds

Developing Security Level of Product Development in Industrial Control System Using IEC 62443 Series (IEC 62443 Series를 활용한 산업제어시스템 개발단계 보안성 검증방안)

  • Kim, Chang Yeon;Lee, Kyungho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.246-248
    • /
    • 2018
  • 사이버 위협이 증가하면서 국가 기반시설을 담당하는 산업제어시스템 보안에 대한 위험이 증가하고 있다. 이를 보완하기 위해 산업제어시스템의 다양한 분야에서 표준화가 진행되고있고, IEC 62443 Series는 산업제어시스템의 전반적인 안전을 위한 가이드를 제시한다. 본 논문은 최근 발행 된 IEC 62443-4-1의 통제항목들을 타 표준들과 비교 및 ?석하여 개선방안을 제시하고 최종적으로 산업제어시스템의 제품 개발단계 보안을 향상에 기여하여 전반적인 기반시설 보안 수준을 향상하는 것을 목표로 한다.

A Simple Program of Domestic IT Product Evaluation Service (국내 정보보호 제품 평가 서비스 간소화 방안)

  • Go, Woong;Lee, Dong-Bum;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.141-153
    • /
    • 2009
  • Recently, public and national institutions establish secure system with installed and operational by IT products for security. They required the Common Criteria for assurance of IT products. However, many company hard to decide when IT products release and develop investment because of cost and spend-time problem. Therefore, in this paper, we analyze domestic and international IT products evaluation services, and proposes simplification IT products evaluation service compared with previous services.

Development of a Electronic Commerce System of Multi-Modal Information (다중모달을 이용한 전자상거래시스템 개발)

  • 장찬용;류갑상
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.729-732
    • /
    • 2001
  • Individual authentication system that take advantage of multimodal information is very efficient method that can take advantage of method of speech recognition, face recognition, electron signature etc. and protect important information from much dangers that exits on communication network whole as skill that construct security system. This paper deal product connected with hardware from internet space based on public key sign and electron signature description embodied system. Maintenance of public security is explaining that commercial transaction system implementation that is considered is possible as applying individual authentication.

  • PDF

Design and Implementation of A UPnP Security Model (UPnP보안 모델의 설계 및 구현)

  • Lee Dong-Gun;Lim Kyeng-Sik;Park Kwang-Ro
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.2
    • /
    • pp.30-42
    • /
    • 2002
  • UPnP(Universal Plug and Play) is commercial product for the first time in home network middlewares, but it has problem that it has no security standards in UPnP specification. In this paper, we present UPnP security model. It is based on XML Signature of XML Security. It provides UPnP with secure services which are device control message authentication and user access level control. It is independent of UPnP modules and has mobility of secure service modules for non secure ability user part. We conclude this paper with an example of applying UPnP Security model to the UPnP audio device control and an test example.

  • PDF

A Study on the Security Enhancement of the Industrial Control System through the Application of IEC 62443 Standards (IEC 62443 표준 적용을 통한 산업제어시스템 보안성 강화 연구)

  • Jin, Jungha;Kim, Juntae;Park, SangSeon;Han, Keunhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.280-283
    • /
    • 2021
  • SME(small and medium sized enterprise) 환경의 스마트공장 환경에서는 실제 제조라인에서 동작하는 센서(Sensor) 및 액추에이터(Actuator)와 이를 관리하는 PLC(Programmable Logic Controller), 더불어 그러한 PLC를 제어 및 관리하는 HMI(Human-Machine Interface), 그리고 다시 PLC와 HMI를 관리하는 OT(Operational Technology)서버로 구성되어 있으며, 제어자동화를 담당하는 PLC 및 HMI는 공장운영을 위한 응용시스템인 OT서버 및 현장 자동화를 위한 로봇, 생산설비와의 직접적인 연결을 수행하고 있어서 스마트공장 환경에서 보안 기술의 개발이 중점적으로 필요한 영역이다. 이러한 SME 환경의 스마트공장 보안 내재화를 이루기 위해서는, 스마트공장 SW 및 HW 개발 단계에서 IEC 62443-4-1 Secure Product Development Lifecycle에 따른 프로세스 정립 및 IEC 62443-4-2 Component 보안 요구사항과 IEC 62443-3-3 System 보안 요구사항에 적합한 개발 방법론의 도입이 필요하다.

Design and Implementation of Digital Signature on Pedigree Using ECDSA (ECDSA를 사용한 Pedigree 디지털 서명의 설계 및 구현)

  • Khosiawan, Yohanes;Kwon, Joon-Ho;Hong, Bong-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.286-288
    • /
    • 2012
  • Facing the counterfeiting acts towards various products, many manufacturers implement ePedigree system to secure their supply chain. Using ePedigree, a distribution history including a valid product identifier from the manufacturer until the final retailer is recorded. And this ePedigree is signed by each involved supply chain party using digital signature. With this digital signature, any unauthorized alteration to the ePedigree document would generate a failed verification process. If there is a counterfeit product using a fake ePedigree document, it wouldn't be able to pass the verification process either. Hence, there wouldn't be any counterfeit product that could enter the legal supply chain and bought by the consumer. We are proposing to use ECDSA instead of RSA since it has faster performance and shorter key size. At a certain same security level, ECDSA only needs 163 bits, while RSA needs 1024 bits.

Construction of Security Evaluation Criteria for Web Application Firewall (웹방화벽의 보안성 평가 기준의 구축)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.197-205
    • /
    • 2017
  • To achieve web application security goals effectively by providing web security features such as information leakage prevention, web application firewall system must be able to achieve the goal of enhancing web site security and providing secure services. Therefore, it is necessary to study the security evaluation of web application firewall system based on related standards. In this paper, we analyze the requirements of the base technology and security quality of web application firewall, and established the security evaluation criteria based on the international standards for software product evaluation. Through this study, it can be expected that the security quality level of the web application firewall system can be confirmed and the standard for enhancing the quality improvement can be secured. As a future research project, it is necessary to continuously upgrade evaluation standards according to international standards that are continuously changing.

A Study on the Supplementation of the Korea's National Information Security Manual from the Perspective of Cyber Supply Chain Security (사이버 공급망 보안 관점의 국가 정보보안 기본지침 개선방안 연구)

  • You, Young-in;Bae, Sunha;Kim, So Jeong;Kim, Dong Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.309-327
    • /
    • 2022
  • As ICT convergence is progressing in all industrial fields and creating the global ecosystem of the supply chain is accelerating, supply chain risk related with cyber area are also increasing. In particular. the supply chain of ICT products is very complex in terms of technical and environmental factors to be managed, so it is vert difficult to transparently manage the entire life cycle. Accordingly, the US, UK, and EU, etc. are conducting and establishing cyber supply chainsecurity-related research and policies for ICT product supply chains. Korea also has the plan to establish management system to secure the supply chain of major ICT equipment as a task in the basic plan of the national cybersecurity strategy announced in 2019, but there is no concrete policy yet. So, In this paper, we review the cyber supply chain security management system in the United States and present a supplementary way to the National Information Security Manual in Korea from the perspective of cyber supply chain security. It is expected that this will serve as a reference material for cyber supply chain measures that can be introduced in domestic information security field.

An assurance level and product type based evaluation effort model for CC evaluation (CC기반에서 보증수준 및 제품유형별 평가업무량 모델)

  • Choi, Seung;Choi, Sang-Soo;Lee, Gang-Soo;Ahn, Sung-Soo;Park, Soon-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1811-1814
    • /
    • 2003
  • CC는 정보보호시스템의 국제표준이며 CC평가 및 인증체계에서는 평가기관을 운영하며 평가기관에서는 적정한 평가비 산정을 위한 근거가 필요하다. 본 연구에서는 CC기준과 기존의 PP 및 ST만을 바탕으로 하여 제품유형별 및 보증수준별 평가업무량의 상대적 배수를 평가실무자들의 경험, 보안기능의 사용율 개념, 기능점수방법 등을 이용하여 산정하였다. 본 결과는 CC평가환경에서 정보보호제품의 평가비 및 기간의 산정을 위한 기본자료로 활용될 수 있다.

  • PDF

Designing a Distributed Access Control Processor Model for Collaborative Product Commerce Services (협업적 제품거래 서비스를 위한 분산 접근제어 프로세서모델)

  • 김형선;박진섭
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.119-124
    • /
    • 2004
  • The service oriented architecture (SOA) is gaining more momentum with the advent of Web services on internet. A programmable and machine accessible Web is the vision of many, and might represent a step towards the semantic Web. However, security is a crucial requirement for the serious usage and adoption of the Web services technology. This paper proposes design goals for an distributed access control model for CPC(Collaborative Product Commerce). It then design a processor model for CPC components, along with web services standard and concept that can be used as a basis to design an access control processor independent of a particular CPC service implementation.

  • PDF