• 제목/요약/키워드: information security system

검색결과 6,591건 처리시간 0.031초

정보시스템 감리에서의 정보보호 감리모형 설계 (A Design on the Information Security Auditing Framework of the Information System Audit)

  • 이지용;김동수;김희완
    • 디지털산업정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.233-245
    • /
    • 2010
  • This paper proposes security architecture, security audit framework, and audit check item. These are based on the security requirement that has been researched in the information system audit. The proposed information security architecture is built in a way that it could defend a cyber attack. According to its life cycle, it considers a security service and security control that is required by the information system. It is mapped in a way that it can control the security technology and security environment. As a result, an audit framework of the information system is presented based on the security requirement and security architecture. The standard checkpoints of security audit are of the highest level. It was applied to the system introduction for the next generation of D stock and D life insurance company. Also, it was applied to the human resources information system of K institution and was verified. Before applying to institutions, system developers and administrators were educated about their awareness about security so that they can follow guidelines of a developer security. As a result, the systemic security problems were decreased by more than eighty percent.

전사적 정보보호 아키텍처에 근거한 금융 정보보호 모델 설계 (Design of Financial Information Security Model based on Enterprise Information Security Architecture)

  • 김동수;전남재;김희완
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.307-317
    • /
    • 2010
  • The majority of financial and general business organizations have had individual damage from hacking, worms, viruses, cyber attacks, internet fraud, technology and information leaks due to criminal damage. Therefore privacy has become an important issue in the community. This paper examines various elements of the information security management system and discuss about Information Security Management System Models by using the analysis of the financial statue and its level of information security assessment. These analyses were based on the Information Security Management System (ISMS) of Korea Information Security Agency, British's ISO27001, GMITS, ISO/IEC 17799/2005, and COBIT's information security architecture. This model will allow users to manage and secure information safely. Therefore, it is recommended for companies to use the security management plan to improve the companies' financial and information security and to prevent from any risk of exposing the companies' information.

정보보호시스템도입에 따른 보안위협요소 대응방안수립에 관한 연구 (A Study on establishing countermeasures to security threats due to the introduction of information protection system.)

  • 경지훈;정성재;배유미;성경
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.693-696
    • /
    • 2013
  • 정보보호시스템(Information protection system)기반의 IT 환경 구축이 보편화되면서 공공기관 및 기업체에서는 정보시스템 자원의 활용과 통합을 위한 하나의 필수적인 환경으로 인식하기 시작하였고, 클라우드 시스템(Cloud System), 클라우드 보안(Cloud Security), 빅데이터(Big Data), 빅데이터 보안(Big Data Security), 산업보안(Industry Security)등이 이슈화 되고 있다. 이러한 영향으로 인해 정보보호시스템(Information protection system) 구축에 따른 내외부적인 보안 위협요소 분석과 대응방안 수립하고자 한다. 본 논문에서는 정보보호시스템(Information protection system) 도입에 따른 여러 가지 보안 위협요소를 알아보고 특히 산업보안적인 측면과 내외부 보안위협요소에 관한 측면을 조명하여 대응방안 수립에 관한 기반 지식을 제공하고자 한다.

  • PDF

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권8호
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Developing a Framework for the Implementation of Evidence Collection System: Focusing on the Evaluation of Information Security Management in South Korea

  • Choi, Myeonggil;Kang, Sungmin;Park, Eunju
    • Journal of Information Technology Applications and Management
    • /
    • 제26권5호
    • /
    • pp.13-25
    • /
    • 2019
  • Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the '6. Information System Security' of 'information security management actual condition evaluation index'. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • 제18권1호
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.

금융회사를 위한 기업 정보보호 포털(EISP) 시스템의 설계 및 구현 (Design and Implementation of Enterprise Information Security Portal(EISP) System for Financial Companies)

  • 김도형
    • 융합보안논문지
    • /
    • 제21권1호
    • /
    • pp.101-106
    • /
    • 2021
  • 금융회사는 금융정보를 보호하기 위해 정보보호 전략 및 계획을 수립하고 정보보호 관리체계 운영, 정보보호 시스템 구축 및 운영, 취약점 점검, 보안관제 등 다양한 정보보호 활동을 하고 있다. 본 논문에서는 금융회사에서 수행 중인 각종 정보보호 활동에 대한 가시성을 확보하고 통합 관리할 수 있는 금융회사를 위한 기업 정보보호 포털 시스템을 제시하고자 한다. 기업 정보보호 포털 시스템은 정보보호 부서의 활동을 시스템화하여 정보보호 활동이 정보보호 부서만의 활동이 아닌 최고경영자부터 임직원까지 참여할 수 있도록 통합된 환경을 제공한다. 이를 통해 최고경영진이 기업경영에 정보보호를 반영할 수 있는 정보보호 거버넌스로도 활용할 수 있다.

스마트그리드 전력망의 NSM 기반 보안관리시스템 설계 및 구현 (Design and Implementation of NSM based Security Management System in Smart Grid)

  • 장범환
    • 디지털산업정보학회논문지
    • /
    • 제9권3호
    • /
    • pp.107-117
    • /
    • 2013
  • In this paper, we designed the security management system based on IEC 62351-7 in the Smart Grid environment. The scope of IEC 62351-7 focuses on network and system management (NSM) of the information infrastructure as well as end-to-end security through abstract NSM data objects for the power system operational environment. However, it does not exist that security management system based on IEC 62351-7 manages the security of the power system in the Smart Grid environment, because power equipment or SNMP agents providing NSM data do not exist yet. Therefore, we implemented the security management system to manage the information infrastructure as reliably as the power system infrastructure is managed. We expect that this system can perform the security management of IEC 61850 based digital substation and can be a prototype of the security system for the Smart Grid in the future.

군 통합보안시스템 구축 방안 연구 (A study on method of setting up the defense integrated security system)

  • 장월수;최중영;임종인
    • 정보보호학회논문지
    • /
    • 제22권3호
    • /
    • pp.575-584
    • /
    • 2012
  • 군의 정보화, 과학화 추진에 따른 환경 변화에 따라 기존 수작업, 오프라인 중심의 제반 군사보안 업무도 효율적이고 체계적인 업무 수행을 지원할 수 있도록 변화와 발전이 필요하다. 이에 본 연구에서는 주요 군사보안 업무 분야에 대한 실태 및 문제점 분석과 미국, 영국 등의 사례 분석을 기반으로, 주요 군사보안 업무를 자동화, 정보화하기 위한 국방통합보안시스템 구축 표준 Model을 제시하였다. 표준 Model은 통합보안체계, 비밀관리시스템, 인원출입 시스템, 차량출입시스템, 첨단경계시스템, 테러 예방시스템 및 보안사고분석시스템 등의 단위 시스템으로 구성되며, 현재 가용한 기술 및 시스템을 기반으로 제안하였는데, 이를 각급부대에 적용할 경우 군사보안 발전에 기여할 것으로 기대된다.

클라우드 컴퓨팅 보안 위협에 기반 한 서버 가상화 시스템 보안 요구 사항 제안 (The security requirements suggestion based on cloud computing security threats for server virtualization system)

  • 마승영;주정호;문종섭
    • 정보보호학회논문지
    • /
    • 제25권1호
    • /
    • pp.95-105
    • /
    • 2015
  • 본 논문은 서버 가상화 시스템의 보안 함수를 개발하기 위해 선행해야 할, 보안 요구 사항을 제안하는 것에 그 목적을 두고 있다. 도출된 보안 요구 사항은 서버 가상화 시스템에 대한 보안 위협을 기반으로 하며, 제안 된 요구 사항이 보안 위협 사항을 방어할 수 있는 것을 보임으로써 보안 요구 사항의 타당성을 검증한다. 또한, 클라우드 컴퓨팅 보안 위협에서 서버 가상화 시스템에 가해지는 보안 위협을 도출하기 위해서, 보안 위협과 서버 가상화 시스템의 보안 이슈 사항의 관계를 분석 및 제시한다.