DOI QR코드

DOI QR Code

사회기술적 시스템의 시스템보안과 시스템엔지니어링

Systems Approach to Sociotechnical Systems - Cyber Security

  • 발행 : 2014.06.30

초록

As one member of the Korea Society of Systems Engineering (KOSSE) and especially as a member of Sociotechnical Systems session of the KOSSE, I tried to contribute somehow to the activity of KOSSE to help development of better Korea systems. This report is a brief discussion of the need for KOSSE activity in the Cyber Security area especially for the protection of national critical infrastructure systems from cyber terror.

키워드

참고문헌

  1. Miller, "Systems Thinking for a Secure Digital World," Cross Talk 2012. Sept-Oct. P.11
  2. MIT Engineering Systems Division
  3. INCOSE http://www.incose.org/
  4. Korea Society of Systems Engineering, http://www.kosse.or.kr/?MID=home-Club&TOP=NQ==
  5. KIPA, Social Risk and Safety management Research Collection, "Studies on Comprehensive National Crisis Management against Natural Disasters and National Crisis", Bobmunsa, 2009.12
  6. Chung Ji-Bum, "Building Robust Social Systems against Disasters-Resilience and Social capital," Bobmunsa, 2009.12
  7. Chung K H, et al., "A Study on Digital Risk Management for the Information Advance" KISDI, 2011.12
  8. Lim J I et al, "Digital Risk management and Digital Disaster Response Model Development," KISDI, 2011.12
  9. Chung K H, et al., "A Study on Digital Risk Management for the Information Advance" KISDI, 2011.12. p.18
  10. Chung K H, et al., "A Study on Digital Risk Management for the Information Advance" KISDI, 2011.12. p.12
  11. Chung K H, et al., "A Study on Digital Risk Management for the Information Advance" KISDI, 2011.12. p.19
  12. Park Dae-Woo, "A Study on Hacking in the National Cyber Security Policy," KIISC review / v.21 no.6, 2011년, pp.24-41
  13. ISEC 2013, The 7th International Information Security Conference, COEX, Seoul, Korea, Nov. 18-19, 2013
  14. KISA, The 3rd ICS Cyber Security Seminar proceeding, 2013.11.18
  15. Ahn S J, "One Way Transmission Model," The 3rd Information Security Seminar proceeding, p.23, 2013.11.18
  16. Ahnlab, "The Threats and Solutions for Industrial Control System Security," The 3rd Information Security Seminar proceeding, p.97, 2013.11.18
  17. Moteff, J. D., "Critical Infrastructures : Background, Policy and Implementation," Congressional Research Service, July 11, 2011
  18. National Institute of Standards and Technology (NIST), "Improving Critical Infrastructure Cybersecurity Executive Order 13636, Preliminary Cybersecurity Framework".
  19. Klimburg A. ed, "National Cyber Security Framework Manual," The NATO Science for Peace and Security Program. 2012
  20. Rick Dove, "SE responsibility for System Security" INCOSE Enhancement Chapter, 2012. 9. 12
  21. INCOSE Insight, Vol 16, Issue 2, 2013. July.
  22. Slay, J. S. and E. Sitnikova, "Developing SCADA Systems Security Course within a Systems Engineering Program," Proceedings of the 12th Colloquium for Information Systems Security Education 2008.
  23. Shin J H, "Major Internet Accidents and Penetration Status, Korea," Internet & Security Focus, KISA, Sept., 2013, pp.36-53
  24. Choi Sang-Myung, ISEC 2013, "We are in the Real Cyber War," issue analysis, 2013.11.18
  25. Kim Yu-Tae, "Realization Theorem & Countermeasure for SCADA Viruse," The 3rd ICS Security Seminar, 2013.11.18
  26. Wald, M. L. "Attack Ravages Power Grid (Just a Test)," NewYork Times, 2013. 11. 14
  27. Miller, "Systems Thinking for a Secure Digital World," Cross Talk 2012. Sept-Oct. P.13, quoted from the original reference INCOSE INSIGHT 2011 July
  28. National Research Council of National Academies, "Professionalizing the Nation's Cybersecurity Workforce," Report to the US DHS, 2013