• Title/Summary/Keyword: protection profile

Search Result 187, Processing Time 0.028 seconds

A Study on the Development Method of Security Functional Requirements of Common Criteria-based Protection Profiles: Focused on development process of Intrusion Detection System Protection Profile (공통평가기준 기반 보호프로파일의 보안기능요구사항 개발 방법 연구: 침입탐지시스템 보호프로파일 개발 과정 중심)

  • 이태승;김태훈;조규민;김상호;노병규
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.51-57
    • /
    • 2003
  • By analysing the development process of Intrusion Detection System Protection Profile, we suggest the development method of Security Functional Requirements of Common Criteria- based Protection Profile and discuss how the method satisfies the requirements of If product or system Protection Profile in the development process.

  • PDF

Comparison & Analysis of Intrusion Detection System System Protection Profile of NSA and MIC (NSA IDS System PP와 국가기관용 IDS PP 가정사항 비교분석)

  • 김남기;박종오;김지영
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.57-65
    • /
    • 2003
  • A protection profile is the required specification document by consumer groups to specify what security purpose they would like to have in their specialized products. A protection profile assumption is the document that specifies consumer environment in the physical, artificial, network perspective and the contents of intended usage which include usage limitation, the value of latent asset, and additional applications for a TOE (Target of Evaluation). In this paper, we compare the assumptions of the NSA IDS PP and the IDS PP for government.

  • PDF

A Study on Cloud Database Management System Protection Profile for the Secure Cloud Environment (안전한 클라우드 환경을 위한 클라우드 데이터 관리 시스템에 적용 가능한 보호프로파일에 관한 연구)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.411-429
    • /
    • 2014
  • As cloud computing has enabled, a variety of cloud services has come into wide use. Thus, cloud computing products can be easily identified in the IT market. Common Criteria is international standards for security evaluation performed of IT products. In addition, Consumers can be used as a objective guideline for the evaluation results. And, it is a provides for protection profile(security target of security products). For general, IT products are providing the protection profile. However, for cloud-related products of protection profile is not being provided. Thus, about cloud security products, there is no way for evaluation. Therefore, in this paper, we propose protection profile on cloud database management system for the secure cloud environment in common criteria.

Biometric Information Protection Measures in the Biometric Person Authentication System Using Match-on-Card (Match-on-Card를 사용한 생체 개인 인증 시스템에서의 생체정보 보호대책)

  • 이상곤;조대성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.6
    • /
    • pp.237-246
    • /
    • 2003
  • To acquire certificate of security evaluation for information protection Products, it is necessary for a designer to grasp the threats listed in a protection profile and to reflect them in the product design. BDPP is a protection profile for the biometric devices. In this paper, we applied BDPP to a Match-on-Card, and ertracted some security requirements to protect biometric data against threats. We also studied some countermeasures satisfying the security requirements.

A Study on Development to Be Protection Profile for Interoperability of Heterogeneous DRM Systems (상이한 DRM 시스템의 호환성을 위한 보호프로파일 개발에 관한 연구)

  • Jo, Hea-Suk;Lee, Kwang-Woo;Jeon, Woong-Ryul;Lee, Yun-Ho;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.1-12
    • /
    • 2009
  • Today, Digital Right Management (DRM) is used to protect copyrights of digital contents from illegal reproduction and redistribution. Unfortunately, current DRM systems are causing user's discomfort because of lack of mutual compatibility. In order to overcome this drawback, technologies for interoperability of heterogeneous DRM systems are developing. In this paper, we study the protection profile for conversion technologies of heterogeneous DRM systems, using the Common Criteria. Especially, this paper is written by reuse of the existing protection profile. Therefore, performance analysis reveals that efficiency of time and cost is significantly improved. This protection profile can be used by contents provider and administrator who manage user's copyrights to reference data for copyright protection.

A Protection Profile for Access Control Based Database Security System (접근제어형 데이터베이스 보안 시스템의 보호프로파일)

  • Jeon, Woong-Ryul;Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.109-113
    • /
    • 2007
  • With increasing the mont of processed information over the network, the importance of database system increases rapidly. There are two types of security system for database, access control and data encryption. However, it is hard to evaluate security of database systems using the Common Criteria(CC) as there is no protection profile(PP) for these systems. In this paper, we propose a protection profile for secure database systems which can be used in formal evaluation using the Common Criteria. The proposed protection profile can be used by both developer and consumer to evaluate security of database systems.

The Concept and Threat Analysis of Intrusion Detection System Protection Profile (침입탐지 시스템 보호프로파일의 개념 및 위협 분석)

  • 서은아;김윤숙;심민수
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.67-70
    • /
    • 2003
  • Since IT industries grew, The information security of both individual and company has come to the front. But, nowadays, It is very hard to satisfy the diversity of security Protection Profile with simple Intrusion Detection System, because of highly developed Intrusion Skills. The Intrusion Detection System is the system that detects, reports and copes with of every kind of Intrusion actions immediately. In this paper, we compare the concept of IDS PPs and analyze the threat of PP.

  • PDF

Mandatory Access Control Protection Profile for Secure Operating System (보안 운영체제를 위한 강제적 접근 제어 보호 프로파일)

  • Ko Young Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.141-148
    • /
    • 2005
  • Nowadays, it is possible to access sharing data from unauthorized People. Access control prevents unauthorized access to computing resource, information resources, and communication resources. It is very important to defend the critical system resources from the unauthorized. The importance of this study is to develop Protection Profile for Mandatory Access Control (MAC) that satisfies TCSEC assurance level B2. protection profile for MAC will help developers to use reference for the development of requirements and formulating security specification.

  • PDF

Limitations of Common Criteria and Analysis of future Common Criteria with Collaborative Protection Profile (기존의 CC 평가제도의 한계와 cPP의 등장으로 인해 개정되는 새로운 CC 평가제도 분석)

  • Choi, Hyunduk;Yi, Okyeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.832-834
    • /
    • 2015
  • 최근 CCRA(Common Criteria Recognition Arrangement) 협정서 개정에 따라 공통평가기준인 CC(Common Criteria) 평가제도에 변화가 생기고 있다. 현재의 CC 평가제도가 가지는 한계를 보완하고자 PP(protection profile)를 대신하는 cPP(collaborative protection profile)가 개발되었는데, 기존의 폐쇄적으로 운영되던 PP 개발 프로세스와 달리 cPP 개발에는 CCRA 회원국의 여러 기관 및 기업이 적극적으로 개발에 참여할 수 있다. 따라서 현재 세계 각국에서 cPP 개발에 관한 논의가 활발히 진행되고 있으며 세분화된 연구도 요구되고 있다. 본 논문에서는 기존의 CC 평가제도가 가지는 한계를 살펴보고 이러한 한계를 극복하기 위한 cPP의 등장 및 개정되는 새로운 CC 평가제도의 운영을 분석한다.

A Study on the Security Requirements for Developing Protection Profiles (보호프로파일 개발을 위한 보안요구사항 도출 방법에 관한 연구)

  • Zheng, He;Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.133-138
    • /
    • 2007
  • As a formal document that expresses a set of security requirements for IT products that meets specific consumer needs in the ISO/IEC 15408(CC, Common Criteria) evaluation, protection profiles are developing by many national agencies and companies recently. Since a protection profile is a criteria for security evaluation when the IT systems and products are introduced, the importance of the protection profile is increasing. However, developing protection profiles are still difficult due to lack of detailed methodology and guidance to analyze security environments or to derive security requirements. In this paper, we analyze foreign instances of developing protection profiles and propose a methodology for deriving security requirements through analyzing the TOE security environment.