A Study on Development of Evaluation Indicators for the Human Competency and Management In Managed Security Service (MSS)

보안관제 업무의 인적 역량 및 관리에 대한 평가지표 개발 연구

  • Received : 2016.03.10
  • Accepted : 2016.04.20
  • Published : 2016.06.30


Currently many central administrative agencies, municipalities and public and private institutions operate Managed security services to cope with cyber security incidents. These entities exert efforts in operating efficiencies rather than introduction of services as they used to. Accordingly, quite a few policies, directions and guidelines have been established for stable operation of Managed security services. Still, Managed security is operated by individuals, whose competencies influence the quality of Managed security services to a great extent. In this respect, the present article examines Managed security technology and methods and describes evaluation methods and examples relevant to human competencies, so as to seek for some potential courses for further development as well as more efficient approaches to human resource management in terms of institutional Managed security services.


Managed Security Service;Human Cometency;Human Cometency Evaluation


  1. Ministry of the Interior [Internet],, Oct., 2014.
  2. Young-jin Kim, Su-yeon Lee, Hun-young Kwon, and Jong-in Lim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services," Jonornal of The Korea Institute of Information Security & Cryptology, Vol.19, No.1, pp.103-111, Feb., 2009.
  3. Korea Internet & Security Agency, "INTERNET & SECURITY FOCUS," Aug., 2013.
  4. Hyun-do Lee and Sang-jin Lee, "A Study on development of evaluation indicators on the Managed Security," Jonornal of The Korea Institute of Information Security & Cryptology, Vol.22, No.5, pp.1133-1143, Oct., 2012.
  5. Ja-young Oh, "What's Managed Security Service," boannews, Dec., 2006.
  6. Woo-jong Suh, Dae-seok Kang, Yong-won Kang, and Jin-won Hong, "A Competency Analysis Methodology for Improving the Productivity of IT Human Resources," The Journal of Productivity, Vol.22, No.1, pp.69-91, Feb., 2008.
  7. Wan-suk Yi, Woong Go, Dong-ho Won, and Jin Kwak, "Development of S-SLA's Grading Indicator based on the Analyses of IPS's Security Functions," Jonornal of The Korea Institute of Information Security & Cryptology, Vol.20, No.6, pp.221-235, Dec., 2010.
  8. Korea Software Industry Association [Internet],
  9. Hyun-jeong Cho, "IPS, the future network security product," Journal of Computing Science and Engineering, Vol.23, No.1, pp.21-26, Jan., 2005.
  10. Young-su Jang, "Sofeware security vulnerability improvement using open static analysis tool," Korea Unviersity, Feb., 2011.
  11. Alberto Dainotti, Antonio Pescape, and Giorgio Ventre, "A Packet-level Characterization Of Network Traffic," CAMAD, pp.38-45, June, 2006.
  12. Joong-gil Park, "Methodology of Analyze the Risk Using Method of Determinated Quantity," The Journal of Information Processing System, Vol.13, No.7, pp.851-858, Dec., 2006.
  13. The Open Web Application Security Project(OWASP) Project Handbook 2013 [Internet],, Oct., 2012.
  14. Jin-kook Kim, Jung-heum Park, and Sang-jin Lee, "A Framework for Data Recovery and Analysis from Digital Forensics Point of View," Journal of Information Processing Systems, Vol.17, No.5, pp.391-398, Oct., 2010.
  15. Jae-Chan Moon and Seong-je Cho, "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development," Jonornal of Korea Society of Computer, Vol.17, No.2, pp.127-137, Feb., 2012.
  16. Chae-tae Im, Joo-hyung Oh, and Hyun-cheol Jeong, "Study of Technical Trends and Analysis Method of Recent Malware," Journal of Computing Science and Engineering, Vol.28, No.11, pp.117-126, Nov., 2010.
  17. Noh Ung-rae congressman [Internet],, Sep., 2015.