Digital Library
Search: "[ keyword: System ]" (251)
국내 무기체계에 대한 RMF 적용 실 사례 연구
조현석,
차성용,
김승주,
Vol. 29, No. 6, pp. 1463-1475,
12월.
2019
10.13089/JKIISC.2019.29.6.1463
주제어: RMF(Risk Management Framework), Weapon System, Secure SDLC, RMF(Risk Management Framework), Weapon System, Secure SDLC
주제어: RMF(Risk Management Framework), Weapon System, Secure SDLC, RMF(Risk Management Framework), Weapon System, Secure SDLC
국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구
최재혁,
김완주,
임재성,
Vol. 29, No. 5, pp. 1153-1165,
10월.
2019
10.13089/JKIISC.2019.29.5.1153
주제어: Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare, Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare
주제어: Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare, Cyber Resilience, Maturity model, Cyber Security, Defense Information System, cyber warfare
위험 평가 모델 기반의 정량적 사이버 보안 평가 체계
김인경,
박남제,
Vol. 29, No. 5, pp. 1179-1189,
10월.
2019
10.13089/JKIISC.2019.29.5.1179
주제어: Risk Assessment, Cyber security Scoring System, Quantitative Risk Model, Risk Assessment, Cyber security Scoring System, Quantitative Risk Model
주제어: Risk Assessment, Cyber security Scoring System, Quantitative Risk Model, Risk Assessment, Cyber security Scoring System, Quantitative Risk Model
분석적 방법을 적용한 원전디지털자산 취약점 평가 연구
김인경,
권국희,
Vol. 28, No. 6, pp. 1539-1552,
12월.
2018
10.13089/JKIISC.2018.28.6.1539
주제어: Nuclear digital assets, Control system cyber security, Vulnerability Assessment, Nuclear digital assets, Control system cyber security, Vulnerability Assessment
주제어: Nuclear digital assets, Control system cyber security, Vulnerability Assessment, Nuclear digital assets, Control system cyber security, Vulnerability Assessment
보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구
이상규,
김인석,
Vol. 28, No. 6, pp. 1585-1594,
12월.
2018
10.13089/JKIISC.2018.28.6.1585
주제어: information security, Information security management system, ISMS, Security Maturity Model, C2M2, information security, Information security management system, ISMS, Security Maturity Model, C2M2
주제어: information security, Information security management system, ISMS, Security Maturity Model, C2M2, information security, Information security management system, ISMS, Security Maturity Model, C2M2
생체 정보와 다중 분류 모델을 이용한 암호학적 키 생성 방법
이현석,
김혜진,
양대헌,
이경희,
Vol. 28, No. 6, pp. 1427-1437,
12월.
2018
10.13089/JKIISC.2018.28.6.1427
주제어: biometrics, Cryptosystem, Key-binding scheme, Multiple classifiers, biometrics, Cryptosystem, Key-binding scheme, Multiple classifiers
주제어: biometrics, Cryptosystem, Key-binding scheme, Multiple classifiers, biometrics, Cryptosystem, Key-binding scheme, Multiple classifiers
공개 취약점 정보를 활용한 소프트웨어 취약점 위험도 스코어링 시스템
김민철,
오세준,
강현재,
김진수,
김휘강,
Vol. 28, No. 6, pp. 1449-1461,
12월.
2018
10.13089/JKIISC.2018.28.6.1449
주제어: scoring system, risk based prioritization, CVE, CWE, CVSS, scoring system, risk based prioritization, CVE, CWE, CVSS
주제어: scoring system, risk based prioritization, CVE, CWE, CVSS, scoring system, risk based prioritization, CVE, CWE, CVSS
HyMES에 대한 결합 확률 분포 기반 단일 파형 분석
박병규,
김수리,
김희석,
홍석희,
Vol. 28, No. 5, pp. 1099-1112,
10월.
2018
10.13089/JKIISC.2018.28.5.1099
주제어: HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution, HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution
주제어: HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution, HyMES, McEliece, Code based cryptosystem, Side-Channel Analysis, Joint distribution
금융회사 클라우드 활성화를 위한 비중요정보처리시스템 지정방안 연구
장명도,
김인석,
Vol. 28, No. 4, pp. 889-903,
8월.
2018
10.13089/JKIISC.2018.28.4.889
주제어: Cloud computing, non - essential information processing system, Cloud computing, non - essential information processing system
주제어: Cloud computing, non - essential information processing system, Cloud computing, non - essential information processing system
무기체계의 사이버보안 시험평가체계 구축방안 연구
이지섭,
차성용,
백승수,
김승주,
Vol. 28, No. 3, pp. 765-774,
6월.
2018
10.13089/JKIISC.2018.28.3.765
주제어: cybersecurity, Test and Evaluation, Weapon Systems, cybersecurity, Test and Evaluation, Weapon Systems
주제어: cybersecurity, Test and Evaluation, Weapon Systems, cybersecurity, Test and Evaluation, Weapon Systems