• 제목/요약/키워드: Security evaluation

검색결과 1,488건 처리시간 0.029초

Security Evaluation Criteria for Firewalls in Kirea

  • Lee, Cheol-Won;Hong, Ki-Yoong;Kim, Hak-Beom;Oh, Kyeong-Hee;Kwon, Hyun-Jo;Sim, Joo-Geol
    • 정보보호학회논문지
    • /
    • 제8권3호
    • /
    • pp.63-78
    • /
    • 1998
  • Recently, to use the evaluated firewall is recognized as a solution to achieve the security and reliability for government and organizarions in Korea. Results of firewall evaluation using ITSEC(Information Technology Security Evaluation Criteria) and CCPP(Common Criteria Protection Peofile)have been announced. Because there are problems to apply ITSECor CCPP for the firewall evaluation in korea environment, korea government and korea Information security Agency (KISA) decided to develop our own security dvaluation critrtia fir firewalls.As a result of the efforts, Korea firewall security evaluation criteria has been published on Feb. 1998. In this paper, we introduce Korea security evaluation criteria for firewalls. The ceiteria consists of functional and assurance requirements that are compatible with CC Evaluation Assurance Levels(EALs)

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권6호
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

A Relationship between Security Engineering and Security Evaluation

  • Kim, Tai-Hoon
    • 융합보안논문지
    • /
    • 제4권2호
    • /
    • pp.71-75
    • /
    • 2004
  • The Common Criteria (CC) philosophy is to provide assurance based upon an evaluation of the IT product or system that is to be trusted. Evaluation has been the traditional means of providing assurance. It is essential that not only the customer' srequirements for software functionality should be satisfied but also the security requirements imposed on the software development should be effectively analyzed and implemented in contributing to the security objectives of customer's requirements. Unless suitable requirements are established at the start of the software development process, the re suiting end product, however well engineered, may not meet the objectives of its anticipated consumers. By the security evaluation, customer can sure about the quality of the products or sys tems they will buy and operate. In this paper, we propose a selection guide for If products by show ing relationship between security engineering and security evaluation and make help user and customer select appropriate products or system.

  • PDF

사이버보안 전문인력 획득을 위한 사이버보안 훈련생에 특화된 훈련성과 측정 모델에 관한 연구 (A Study on the Model of Training Performance Measurement Specialized to Cyber Security Trainee for Cyber Security Professionals Acquisition)

  • 김기훈;엄정호
    • 디지털산업정보학회논문지
    • /
    • 제12권4호
    • /
    • pp.59-69
    • /
    • 2016
  • We proposed a specialized model of performance measurement to measure the training performance of the trainees in cyber practical training. Cyber security professionals are cultivating their expertise, skills, and competencies through cyber practical training in specialized education and training institutions. The our proposed process of trainee evaluation is consisted of an evaluation component discovery, evaluation item selection, evaluation index catalog, ratings and criteria decision, and calculation formula. The trainee evaluation is consisted of a formative evaluation during the training and an overall evaluation after finished training. Formative evaluation includes progress evaluation and participation evaluation, and overall evaluation includes practice evaluation and learning evaluation. The evaluation is weighted according to the importance of evaluation type. Because it is evaluated actual skills and abilities, competencies are assigned a high weight, while knowledge and attitudes are assigned a low weight. If cyber security trainees are evaluated by the proposed evaluation model, cyber security professionals can be cultivated by each skill and knowledge level and can be deployed by importance of security task.

공통평가기준에 의한 보안정책모델 평가방법 (An Evaluation Method for Security Policy Model Based on Common Criteria)

  • 김상호;임춘성
    • 정보보호학회논문지
    • /
    • 제13권5호
    • /
    • pp.57-67
    • /
    • 2003
  • 보안정책모델은 평가대상제품(Target of Evaluation, TOE)의 보안정책을 비정형적, 준정형적, 또는 정형적 방법을 사용하여 구조적으로 표현하는 한 것이다. 보안정책모델은 보안기능요구사항과 기능명세간의 일관성 및 완전성을 제공함으로써 평가대상제품이 요구사항과 기능명세간 불명확성으로 인한 보안결점을 최소화할 수 있도록 보증성을 보장한다. 이러한 이유로 ISO/IEC 15408(공통평가기준. CC) 등 IT 제품 및 시스템의 보안성 평가기준의 고등급 평가에서 보안정책모델을 요구하고 있다. 본 논문에서는 보안정책모델의 개념과 관련 연구 및 공통평가기준의 보안정책모델 보증요구사항을 분석하여 보안정책모델 평가방법을 제시한다.

부합성 분석을 통한 정보보안 평가지표 개발 (A Development of Evaluation Indicators for Information Security by Means of the Coincidence Analyses)

  • 이영규;김상훈
    • 한국IT서비스학회지
    • /
    • 제7권3호
    • /
    • pp.175-198
    • /
    • 2008
  • The wide spread of the Internet has become a momentum to promote informatization, and thus individuals, organizations, and government bodies are competitively participating in this kind of new wave. Informatization enables us not only to circulate and utilize information without any limitation but also to maximize users' benefits and convenience. On the other hand, it brings about negative effects-security incidents such as cyber terror, Internet fraud and technology leakage, etc. Evaluation on security level should precede over all the others in order to minimize damage by security incidents since it diagnoses current status on security as it is and can be used as a guideline for appropriate security management. In this study, evaluation domains, items and indicators of information security to evaluate information security are theoretically developed on the basis of critically reviewing the major existing research. And then the coincidence level(content validity, ease and reliability of evaluation) of each evaluation indicators are empirically analyzed through performing the field study of 83 information security experts.

보안 안전성을 위한 자동화 보안진단평가 시스템에 관한 연구 (A Study on Automatic Security Diagnostic Evaluation System for Security Assurance)

  • 엄정호;박선호;정태명
    • 디지털산업정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.109-116
    • /
    • 2009
  • In the paper, we designed an automatic security diagnostic evaluation System(SeDES) based on a security diagnostic evaluation model(SeDEM) for an organization's security assurance. The SeDEM evaluates a security level of an organization quantitatively by a security evaluation formula which is composed of security variables and security index as applying the statistical CAEL model for evaluate risk level of banks. The SeDES has a good expandability as changing security variables according to an organization scale, characteristics and so on. And it also has a excellent usage because it inputs only numeric data got from statistical technique to security index. We can understand more a security level correctly than the existent risk assessment system because it is possible to assess quantitatively with an security grade as well as score. analysis.

제품, 프로세스, 통제 관점의 통합된 보안평가 모델 (A Security Evaluation Model in Aspects of Product, Process and Control)

  • 이지은;최병주
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제11권2호
    • /
    • pp.192-207
    • /
    • 2005
  • 정보 보호에 대한 평가가 중요시 되고 있으며 보안 평가 방법론이 제안되었다. 이러한 보안 평가 방법론들은 크게 제품, 프로세스, 통제 중심의 세 가지 관점으로 분류될 수 있다본 논문에서는 제품, 프로세스, 통제 각기 하나의 관점에서 보안 평가할 때에 발생하는 문제점과 위협의 실례를 파악한다. 이 문제점을 해결하기 위하여 제품, 프로세스, 통제의 세 가지 관점을 통합한 보안평가 모델을 제안한다.

기업의 정보보호 수준 평가를 위한 평가지표 (A Study on the Evaluation Indices for Evaluation of the Information Security Level on the Enterprise Organization)

  • 나윤지;고일석;조영석
    • 융합보안논문지
    • /
    • 제6권3호
    • /
    • pp.135-144
    • /
    • 2006
  • 인터넷 및 정보기술의 발전은 정보의 생성 및 관리기술 뿐만이 아니라 정보보호의 중요성을 증대시키고 있다. 정보보호는 기술적인 측면만이 아니라 관리적인 측면을 포함한 영역이며 관리적 측면에서 정보보호 수준 평가에 대한 연구가 이루어지고 있다. 현재까지 대부분의 정보보호 평가체계는 정보보호제품에 중점을 두고 있다. 본 연구는 기업의 조직 관점에서 정보보호 수준 평가에 대한 연구를 목적으로 하고 있다. 기업의 정보보호수준을 평가하기 위해서는 기업 조직 전반에 대한 분석과 이를 기반으로 한 종합적이고 체계적인 평가 체계가 필요하다. 본 연구에서는 기업 전반에 대한 정보보호 요인을 기획, 환경, 지원, 기술 관리의 수준으로 구분하고 이를 기반으로 지표를 개발하여, 기업조직 전체의 정보보호 수준을 측정함으로서, 기업의 정보보호수준 위치 파악과 이를 통한 발전적인 정보보호 방향을 제시하기 위한 정보보호수준 평가체계를 연구하였다.

  • PDF

Developing a Framework for the Implementation of Evidence Collection System: Focusing on the Evaluation of Information Security Management in South Korea

  • Choi, Myeonggil;Kang, Sungmin;Park, Eunju
    • Journal of Information Technology Applications and Management
    • /
    • 제26권5호
    • /
    • pp.13-25
    • /
    • 2019
  • Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the '6. Information System Security' of 'information security management actual condition evaluation index'. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.