• 제목/요약/키워드: information security service

검색결과 2,721건 처리시간 0.033초

IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구 (An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction)

  • 권순재;이건창;김창현
    • 한국경영과학회지
    • /
    • 제32권2호
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권12호
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

클라우드 컴퓨팅 서비스에 관한 정보보호관리체계 (Information Security Management System on Cloud Computing Service)

  • 신경아;이상진
    • 정보보호학회논문지
    • /
    • 제22권1호
    • /
    • pp.155-167
    • /
    • 2012
  • 클라우드 컴퓨팅 서비스는 이용자 요구에 실시간으로 유연하게 컴퓨팅 자원을 제공하고 사용량만큼 과금하는 고효율의 차세대 IT 서비스이다. 그러나 이용자는 데이터를 '위탁'하고, 인프라, 플랫폼, 어플리케이션 서비스를 '제공'받는 '위탁/제공'의 서비스 구조와 적용기술, 자원공유, 데이터센터 위치 등으로부터 비롯된 많은 위협에 직면해 있다. 클라우드 서비스 도입의 가장 큰 걸림돌로 작용하는 보안과 신뢰성을 담보하기 위해서는 객관적인 평가 기준이 필요하다. 지금까지 정보보호관리체계는 조직의 보안관리 및 IT 운영의 보안 지표로 활용되어 왔다. 그러나 클라우드 컴퓨팅 서비스는 기존의 조직 내 IT 환경과는 다른 관점의 보안관리와 평가기준이 필요하다. 본 논문에서는 클라우드 특성에 맞는 정보보호관리체계를 설계하기 위하여 클라우드 서비스의 핵심요소를 위협관리영역으로부터 도출하고 기본적인 보안관리가 누락되지 않도록 기존 정보보호관리체계의 모든 통제영역을 포함하고 있다. 또 온라인 셀프환경에 따른 서비스 이용을 지원하고 서비스 계약, 제공자 사업현황을 포함하는 서비스 보안관리를 추가하여 설계한다.

A Study on Selection of Core Services for Deciding ISMS Scope

  • Kang, Hyunsik;Kim, Jungduk
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권2호
    • /
    • pp.51-57
    • /
    • 2017
  • The first thing to be prioritized is to set the scope of the management system when establishing an information security management system for systematic and effective information security management. It is important to set the scope for an organization's information security goals due to the scope affects the organization's overall information security activities. If the scope is set incorrectly, it might become impossible to protect important services and therefore, the scope of the management system should be determined in consideration of the core business services of the organization. We propose a core service selection model based on the organization's mission-critical service and high risk service in order to determine the effective information security management system scope in this paper. Core service selection criteria include the type of service, contribution to sales, socio-economic impact, and linkage with other services.

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

융합보안 공급자 자기 적합성 제도 (Convergence Security Provider Self-Conformity System)

  • 백남균
    • 디지털산업정보학회논문지
    • /
    • 제15권2호
    • /
    • pp.53-61
    • /
    • 2019
  • In this paper, we propose 'a self - conformance system of convergence security provider' to provide basic data for security and reliability of convergence industrial technology, system and service. It is difficult to evaluate convergence security systems, limited to information and communication service providers, unable to check convergence security items, burden of submission documents, difficulty in measuring convergence security service level and we will summarize product and service-based requirements that can be integrated and systematically measure the level of convergence security and define renewed life cycle-based convergence security information and content security and assurance requirements. On the basis of this, each convergence security company declares conformity with the standard itself without the certification of the certification body, and introduces the provider conformity certification system which can manufacture and sell. This will enable the company to strengthen its competitiveness through timely launch and implementation of products and services and cost reduction.

융합보안 서비스 사이언스를 위한 기상정보 활용모델 연구 (A Study about Practical Model of Meteorological Information for Convergence Security Service Science)

  • 최경호;이동휘;김민수;김종민;김귀남
    • 융합보안논문지
    • /
    • 제13권3호
    • /
    • pp.79-84
    • /
    • 2013
  • 본 연구에서는 보안서비스 제공과정을 비즈니스 프로세스로 살펴보고, 여기서 나타나는 문제점을 해결하기 위한 융합보안기술의 적용 및 이의 프로세스화를 통한 개선된 서비스 혁신모델을 제시해 보고자 한다. 이를 위해 대표적으로 시설관리, 무인경비 등을 제공하는 물리보안 분야를 살펴보고, 여기서 나타나는 한계점을 해결하기 위해 적용 가능한 융합보안기술로 기상정보를 활용하는 방법을 서비스 사이언스 관점에서 제안한다. 본 연구의 기여도는 첫째, 서비스 혁신 관리를 통해 융합보안기술을 기반으로 위험관리 방법을 개선했다는 것이며, 둘째, 서비스의 효과를 계량화하여 위험관리 활동을 정량적 수치로 평가할 수 있다는 것이며, 마지막으로, 기상정보를 활용한 물리보안 서비스 제공 방법론을 체계적으로 프레임워크화 했다는 것이다.

클라우드 컴퓨팅 서비스 제공자의 개인정보보호 조치방안에 대한 연구 (A Study on the Privacy Security Management under the Cloud Computing Service Provider)

  • 유우영;임종인
    • 정보보호학회논문지
    • /
    • 제22권2호
    • /
    • pp.337-346
    • /
    • 2012
  • 인터넷 기술을 활용한 클라우드 컴퓨팅 서비스의 확산에 따라 개인정보 유출 위험과 정보에 대한 통제가 불가능해질 수 있는 보안 위협이 증가되고 있으나, 현재 클라우드 컴퓨팅 서비스 제공자는 개인정보보호에 대한 충분한 보호조치를 서비스 이용자에게 제공하지 못하고 있는 상황이다. 본 논문에서는 클라우드 컴퓨팅 서비스에 대한 개인정보보호 고려 사항을 살펴보고, 클라우드 컴퓨팅 서비스 환경에서의 개인정보보호 위협에 대응하는 방안을 제안한다.

IT자산과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구 (An Empirical Approach to the Influence of IT Assets and Information Security Service on Information Security Quality and Satisfaction)

  • 권순재;이건창;김창현
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 2006년도 추계학술대회
    • /
    • pp.467-481
    • /
    • 2006
  • In the era of the Internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security qualty positively, leading to users' satisfaction eventually To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets and Information Security Service influence informations security quality positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets and Information Security Service helped great improve the information security quality and user satisfaction.

  • PDF

한국 경비업발전 전망에 따른 경호관련학과 교육과정 연구 (A Study on the Education Curriculum for Bodyguarding Related Departments with the Prospect of Security Services)

  • 김영인
    • 시큐리티연구
    • /
    • 제5호
    • /
    • pp.89-108
    • /
    • 2002
  • The prospect of security services industries is as followings. First, integrated security system will be increased in the security service sphere of collective housing such as apartments. Second, the needs to security services with high-tech electronic security system and systematic security service against crimes will be increased. Third, the needs to crime prevention and disaster prevention service including information security service by means of internet and information and communication technology will be increased. Fourth, perhaps domestic market of security service will be reshaped in relation with localization trend and entrance of foreign security service companies to our country. With these conclusions I think that the departments of universities related to security services will focus on their social roles.

  • PDF