Digital Library
Search: "[ keyword: Security ]" (547)
국내 중소 제조 기업 실정에 적합한 Modbus 프로토콜 취약점 대응 대책 연구
유정훈,
고승철,
배춘석,
Vol. 31, No. 2, pp. 245-262,
4월.
2021
10.13089/JKIISC.2021.31.2.245
주제어: ICS Protocol, Modbus protocol, CIP, Industrial Control System, ICS Security Checklist, ICS Protocol, Modbus protocol, CIP, Industrial Control System, ICS Security Checklist
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: ICS Protocol, Modbus protocol, CIP, Industrial Control System, ICS Security Checklist, ICS Protocol, Modbus protocol, CIP, Industrial Control System, ICS Security Checklist
신뢰 실행 환경의 안전한 TPM 활용을 위한 보안 기술
한승균,
장진수,
Vol. 31, No. 2, pp. 167-174,
4월.
2021
10.13089/JKIISC.2021.31.2.167
주제어: Trusted Execution Environment, Trusted Platform Module, Virtualization, Mobile Security, Trusted Execution Environment, Trusted Platform Module, Virtualization, Mobile Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Trusted Execution Environment, Trusted Platform Module, Virtualization, Mobile Security, Trusted Execution Environment, Trusted Platform Module, Virtualization, Mobile Security
방산기술보호를 위한 방산기술 마스터 데이터 관리 체계구현 방안
박흥순,
김세용,
권혁진,
Vol. 31, No. 1, pp. 111-122,
2월.
2021
10.13089/JKIISC.2021.31.1.111
주제어: National Defense, Defense Industry, Defense Technology Security, Master Data Management(MDM), National Defense, Defense Industry, Defense Technology Security, Master Data Management(MDM)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: National Defense, Defense Industry, Defense Technology Security, Master Data Management(MDM), National Defense, Defense Industry, Defense Technology Security, Master Data Management(MDM)
국가 암호정책에 대한 연구:암호접근권한을 중심으로
김동훈,
권헌영,
홍석희,
Vol. 31, No. 1, pp. 99-109,
2월.
2021
10.13089/JKIISC.2021.31.1.99
주제어: cryptanalysis, Cryptography Policy, National Security, misuse cryptography, cryptanalysis, Cryptography Policy, National Security, misuse cryptography
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: cryptanalysis, Cryptography Policy, National Security, misuse cryptography, cryptanalysis, Cryptography Policy, National Security, misuse cryptography
ICT 공급망 보안기준 및 프레임워크 비교 분석
민성현,
손경호,
Vol. 30, No. 6, pp. 1189-1206,
12월.
2020
10.13089/JKIISC.2020.30.6.1189
주제어: Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management, Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management, Supply Chain Security, Supply Chain Attack, Supply Chain Risk Management
사이버보안 기술적 대응 직무 역량 프레임워크 제안 및 적용 모델 구현 사례
홍순좌,
박한진,
최영한,
강정민,
Vol. 30, No. 6, pp. 1167-1187,
12월.
2020
10.13089/JKIISC.2020.30.6.1167
주제어: Cybersecurity Competency, AMCJT, CtrJC, CtrJC-R, Cybersecurity Competency, AMCJT, CtrJC, CtrJC-R
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Cybersecurity Competency, AMCJT, CtrJC, CtrJC-R, Cybersecurity Competency, AMCJT, CtrJC, CtrJC-R
산업제어망 보안 컴플라이언스를 위한 패치 영향성 평가 방안에 관한 실증 연구
최인지,
김승주,
Vol. 30, No. 6, pp. 1141-1149,
12월.
2020
10.13089/JKIISC.2020.30.6.1141
주제어: Security Compliance, Industrial Control System, Patch Impact Assessment, Patch Deployment, Security Compliance, Industrial Control System, Patch Impact Assessment, Patch Deployment
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Security Compliance, Industrial Control System, Patch Impact Assessment, Patch Deployment, Security Compliance, Industrial Control System, Patch Impact Assessment, Patch Deployment
CIA-Level 기반 보안내재화 개발 프레임워크
강수영,
김승주,
Vol. 30, No. 5, pp. 909-928,
10월.
2020
10.13089/JKIISC.2020.30.5.909
주제어: Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering, Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering, Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering
자원제약적 임베디드 환경에서 종단간 보안을 지원하는 수정된 MQTT-SN
남혜민,
박창섭,
Vol. 30, No. 5, pp. 859-870,
10월.
2020
10.13089/JKIISC.2020.30.5.859
주제어: Internet of Things, MQTT-SN, end-to-end security, Internet of Things, MQTT-SN, end-to-end security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Internet of Things, MQTT-SN, end-to-end security, Internet of Things, MQTT-SN, end-to-end security
사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구
최영한,
장인숙,
황인택,
김태균,
홍순좌,
박인성,
양진석,
권영재,
강정민,
Vol. 30, No. 5, pp. 805-821,
10월.
2020
10.13089/JKIISC.2020.30.5.805
주제어: Cyber defense exercise, Cyber Security Training, Cyber defense exercise, Cyber Security Training
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Cyber defense exercise, Cyber Security Training, Cyber defense exercise, Cyber Security Training