20 여상수(763~772).hwp

Similar documents
목 차 1. 정보보호시스템평가 인증제도 2. 국내외평가 인증제도비교 3. 국제공통평가기준 (CC: Common Criteria) 4. 국외 CC 활용동향 5. CC 수용효과 2

ISO17025.PDF

<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770>

3. 클라우드 컴퓨팅 상호 운용성 기반의 서비스 평가 방법론 개발.hwp

최종_백서 표지

< FC1A4BAB8B9FDC7D D325FC3D6C1BEBABB2E687770>

<C1B6BBE7BFACB1B D303428B1E8BEF0BEC B8F1C2F7292E687770>

학습영역의 Taxonomy에 기초한 CD-ROM Title의 효과분석

03-ÀÌÁ¦Çö

SW¹é¼Ł-³¯°³Æ÷ÇÔÇ¥Áö2013


디지털포렌식학회 논문양식

03.Agile.key

Journal of Educational Innovation Research 2018, Vol. 28, No. 3, pp DOI: NCS : * A Study on

ORANGE FOR ORACLE V4.0 INSTALLATION GUIDE (Online Upgrade) ORANGE CONFIGURATION ADMIN O

8-VSB (Vestigial Sideband Modulation)., (Carrier Phase Offset, CPO) (Timing Frequency Offset),. VSB, 8-PAM(pulse amplitude modulation,, ) DC 1.25V, [2

04서종철fig.6(121~131)ok


THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Nov.; 26(11),

Journal of Educational Innovation Research 2017, Vol. 27, No. 4, pp DOI: * A Study on Teache

Ⅰ. 들어가는 말 2005년 6월에 발생한 인터넷뱅킹 해킹 사건이 2005년 가장 기억에 남는 정보보호 뉴 스로 선정되었다고 한다. 해킹 등으로 인해 개인의 PC가 악의적인 해커에 의해 장악이 된 경우에는 어떤 보안시스템도 제 기능을 다하지 못함에도 불구하고, 해킹 사


13.11 ①초점

ETL_project_best_practice1.ppt

레이아웃 1

<353020B9DAC3E1BDC42DC5ACB6F3BFECB5E520C4C4C7BBC6C3BFA1BCADC0C720BAB8BEC820B0EDB7C1BBE7C7D7BFA120B0FCC7D120BFACB1B82E687770>

06_ÀÌÀçÈÆ¿Ü0926

DBPIA-NURIMEDIA

<BCAEBBE7C7D0C0A75FB3EDB9AE2D28B9DAC7F6C0DA292D E687770>

DBPIA-NURIMEDIA

DBPIA-NURIMEDIA

Output file

DBPIA-NURIMEDIA

< FC8A8C6E4C0CCC1F620B0B3B9DF20BAB8BEC8B0A1C0CCB5E5C3D6C1BE28C0FAC0DBB1C7BBE8C1A6292E687770>

Analysis of objective and error source of ski technical championship Jin Su Seok 1, Seoung ki Kang 1 *, Jae Hyung Lee 1, & Won Il Son 2 1 yong in Univ

IT현황리포트 내지 완

00내지1번2번

DBPIA-NURIMEDIA

목차 개요 3 섹션 1: 해결 과제 4 APT(지능형 지속 위협): 이전과 다른 위협 섹션 2: 기회 7 심층 방어 섹션 3: 이점 14 위험 감소 섹션 4: 결론 14 섹션 5: 참조 자료 15 섹션 6: 저자 소개 16 2

<313920C0CCB1E2BFF82E687770>

°í¼®ÁÖ Ãâ·Â

untitled


화판_미용성형시술 정보집.0305

APOGEE Insight_KR_Base_3P11

슬라이드 1

Sensitive Compartmented Information Facility (SCIF) and Special Access Program Facility (SAPF) Criteria

SchoolNet튜토리얼.PDF

±èÇö¿í Ãâ·Â

example code are examined in this stage The low pressure pressurizer reactor trip module of the Plant Protection System was programmed as subject for

08김현휘_ok.hwp

<31325FB1E8B0E6BCBA2E687770>


Journal of Educational Innovation Research 2018, Vol. 28, No. 1, pp DOI: * A Analysis of

<31362DB1E8C7FDBFF82DC0FABFB9BBEA20B5B6B8B3BFB5C8ADC0C720B1B8C0FC20B8B6C4C9C6C32E687770>

목 차 Ⅰ. 일반사항 1 Ⅱ. 특기사항 3 Ⅲ. 물품내역 및 세부규격 8 Ⅳ. 주의사항

2

1.장인석-ITIL 소개.ppt

45-51 ¹Ú¼ø¸¸

#유한표지F

< D28B9F8BFAA20BCF6C1A4BABB292E687770>

untitled

1. KT 올레스퀘어 미디어파사드 콘텐츠 개발.hwp

38이성식,안상락.hwp

-

취업지원(0222)_인쇄용.hwp

본 해설서는 정보통신망 이용촉진 및 정보보호 등에 관한 법률 (이하 법 이라 한다) 제28조제1항과 같은 법 시행령 제15조제6항에 근거한 개인정보의 기술적 관리적 보호조치 기준 이 개정 고시( )됨에 따라 - 동 기준의 각 조항별 주안점과 구체적인 사례를

요 약 문 1. 제목 : 개인정보 오남용 유출 2차 피해 최소화 방안 2. 연구의 배경 개인정보란 살아 있는 개인에 관한 정보로서 개인을 알아볼 수 있는 정보로 해당 정보만으로는 특정 개인을 알아볼 수 없더라도 다른 정보와 쉽게 결합하여 알아볼 수 있는 것을 포함한다.

スライド タイトルなし

Microsoft PowerPoint - SVPSVI for LGNSYS_ ppt

10(3)-09.fm

public key private key Encryption Algorithm Decryption Algorithm 1

DBPIA-NURIMEDIA

Microsoft PowerPoint - CoolMessenger_제안서_라이트_200508

Journal of Educational Innovation Research 2016, Vol. 26, No. 1, pp.1-19 DOI: *,..,,,.,.,,,,.,,,,, ( )

2014_ pdf

< B3E2BFF8BAB828C8AFB0E629312E687770>

14.531~539(08-037).fm

PCServerMgmt7

<5B D B3E220C1A634B1C720C1A632C8A320B3EDB9AEC1F628C3D6C1BE292E687770>


Intro to Servlet, EJB, JSP, WS

User's Guide

<C5EBC0CFB0FA20C6F2C8AD2E687770>

Abstract Background : Most hospitalized children will experience physical pain as well as psychological distress. Painful procedure can increase anxie

구로구민체육센터 여성전용 기구필라테스 강좌 신설 구로구시설관리공단은 신도림생활체육관에서 2014년도부터 시행하여 주민의 큰 호응을 얻고있는 기구필라 테스 강좌를 일자로 구로구민체육센터에 확대 시행하게 되었습니다. 구로구 관내 고객들의 니즈를 반영한 기

Á¦3ºÎ-6Àå

<4D F736F F D20B1E2C8B9BDC3B8AEC1EE2DB1E8B1A4BCAE>

DBPIA-NURIMEDIA

untitled

Journal of Educational Innovation Research 2017, Vol. 27, No. 2, pp DOI: * Review of Research

Journal of Educational Innovation Research 2016, Vol. 26, No. 3, pp.1-16 DOI: * A Study on Good School


<312EBFACB1B8C0DAB7E C1D6BFE4B1B9C0C75FB1B9C0AFB8B25FB0E6BFB5B5BFC7E2292DC3D6C1BEC6ED2E687770>

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Feb.; 29(2), IS


DBPIA-NURIMEDIA

63-69±è´ë¿µ

204

03¼ºÅ°æ_2

Transcription:

13 5 2009 10 사전검증을통한행정정보보호시스템도입방안 여상수 *, 이동범 **, 곽진 ** Sang-Soo Yeo *, Dong-Bum Lee ** and Jin Kwak ** 요약,...,. Abstract According as information-oriented society is propelled, development of various information security systems is achieved, and introduction of information security system is increasing for service offer securing from nation and public institution. In particular, government information system is increasing interest about security assessment service of government information system because verification about security is weighed first of all. Accordingly, study about various security assessment services is preceded in domestic and overseas. In this paper, analyze security assessment service of Britain and Canada, and we proposed about pre-qualification introduction plan of government information system that can offer user of nation and public institution reliability. Key words : Government Information Security System, Pre-qualification I. 서론,.. (CMVP : Cryptographic Module Validation Program), (CC : Common Criteria), * (Division of Computer Engineering, Mokwon University) ** (Department of Information Security Engineering, Soonchunhyang University) (Corresponding Auther) : : 2009 7 22 () : 2009 7 23 ( : 2009 10 23) : 2009 10 30

764 13 5 2009 10 (ISMS : Information Security Management System) IT., [1-3].,. [4-5].,.,.. 2, 3. 4, 5. Ⅱ. 관련연구 2-1 국내평가서비스 2-1-1.,., [6]. 1. 표 1. 정보보호제품평가 인증관련기관의역할 Table 1. Role of information security product assessment and certification relevant organization 2-1-2 ㆍ,, 27( )., IT.,,, /, / /.

,, ; 765..,, [7]. 1. 2-2-2 FTA FTA CESG fast track.,.. FTA 2001 CESG IA. 그림 1. 암호검증체계 Fig. 1. Korea Cryptographic Module Validation Program (KCMVP) 2-2-3 CHECK.,,,. CHECK. FTA CC. 2-2 영국평가서비스 2-2-1 SYS SYS IT (MOD) (CESG : Communications Electronics Security Group),. IT,. SYS 2002 IT (UK IT Security Evaluation Criteria (ITSEC) method) [8]. 2-2-4 CAPS CAPS CESG. CAPS, CAPS. CAPS. CAPS "Baseline", "Enhanced", "High Grade" 3. Baseline Restricted Private" FIPS 140-2 FIPS 140-2.

766 13 5 2009 10 CAPS CC [9]. 2-2-5 CCTM (CSIA : Central Sponsor for Information Assurance) / (CCTM : CSIA Claims Tested Mark) 2005 1. 2008 4 7 (CESG : Communication Electronics Security Group) (CCTM : CESG Claims Tested Mark). 표 2. 정보보증방식의요구사항 Table 2. Information Assurance Method Requirements CC SYS FTA CHECK CAPS CCTM / -- / / /. ISO/IEC 17025 (UKAS : United Kingdom Accreditation Service)., / - (claims testing)., / [10]. 2. 2-3 캐나다평가서비스 2-3-1 IPPP (IPPP : ITS Product Pre-qualification Program).. (IPPL : ITS Pre-qualification Product List). [11-12]. FIPS 140-1 FIPS 140-2

,, ; 767 IT.. FIPS 140-1 FIPS 140-2 CMVP,,,.,.,. 3. 표 3. 정보기술보안사전자격제품목록분류표 Table 3. ITS Pre-qualified Product List Categories Ⅲ. 사전검증을통한행정정보보호시스템 표 4. 공통평가기준의보안기능클래스 Table 4. Security function class of Common Criteria FAU 도입방안. 3-1 공통평가기준의보안기능클래스, 2. ISO/IEC 15408 2. TOE(Target of Evaluation), PP(Protection Profile) ST(Security Target)., TOE TOE. TOE,. 4,, [13-15].,,, FCO () FCS FDP FIA

768 13 5 2009 10 FMT FPR TSF(TOE),, FPT TSF TSF FRU TOE FTA TOE TOE FTP -TSF/TSF-TSF 3-2 행정정보보호시스템의제품목록표,,.,,,,,,. 5, 6 [16]. 표 5. 제품분류기준 Table 5. Standard of classification for product // VOIP SSO, EAM, IM/IAM DRM // /COS PKI DB SMIME/PGP PC PC USB 표 6. 제안하는제품목록표 Table 6. Proposing checklist o o, o (, ) o (, ), o : Triple DES, AES, ARIA, RSA o : RSA, DSA o : Diffie-Hellman, RSA o : SHA-1, SHA-256, SHA-384, SHA-512, o : 2009. 00. 00 o : 2009. 00. 00 o Windows XP Professional / 9X / ME / NT/ Server 2003 o HP-UX 11i v3, AIX v6.1, Solaris 9 / 10 o Fedora 9 / 10, Red Hat Enterprise Linux 4 / 5 o,

,, ; 769 그림 2. 행정정보보호시스템도입절차 Fig. 2. Introduction procedure of government information system 3-3 행정정보보호시스템도입절차.,,,. 3-3-1. 7 [17]. 표 7. 검증시험평가항목 Table 7. Evaluation items of verification test,,,,,, IT,

770 13 5 2009 10 3-3-2,,,., [18]. 3-3-3, /.,.,.. 3-3-4,,.,,.. 3-3-5.,.,.,,. 3-3-6,,,. [19].,.,,

,, ; 771.,.,.,, 3-3-7.,. Ⅳ. 분석 4-1 인증기관.. 4-2 평가기관. 4-3 개발업체.. 4-4 국가및공공기관,.. Ⅴ. 결론.,.,. 참고문헌 [1] http://csrc.nist.gov/ [2] http://www.commoncriteriaportal.org/ [3] http://www.kisa.or.kr/

772 13 5 2009 10 [4] http://www.cse-cst.gc.ca/ [5] http://www.cesg.gov.uk/ [6] IT, " ", 2008. [7] http://www.kecs.go.kr [8] http://www.stsc.hill.af.mil [9] http://www.cesg.gov.uk [10] CESG, "Government Quality Mark-Directory of CESG Claims Tested Mark(CCTM) Awards for Products and Services", March 2009. [11] NIST, "FIPS Publication 140-3(Draft) : Security Requirements for Cryptographic Modules", July 2007. [12] CSEC, Canadian Common Criteria Evaluation and Certification Scheme(CCS) Scheme Description, May 2000. [13] ISO/IEC 15408, "Common Criteria for Information Technology Security Evaluation", version 3.1, Parts 1, 2007. [14] ISO/IEC 15408, "Common Criteria for Information Technology Security Evaluation", version 3.1, Parts 2, 2007. [15] ISO/IEC 15408, "Common Criteria for Information Technology Security Evaluation", version 3.1, Parts 3, 2007. [16] NIST, "Special Publication 800-70 : Security Configuration Checklists Program for IT products - Guidance for Checklists Users and Developers", May 2005. [17] CESG, "CESG CLAIMS TESTED MARK SCHEME : VENDOR GUIDE", March 2009. [18] CESG, "CESG CLAIMS TESTED MARK SCHEME : TEST LABORATORY GUIDE", March 2009. [19] CESG, "CESG CLAIMS TESTED MARK SCHEME : DECISION AUTHORITY GUIDE", February 2009. 여상수 ( 呂相壽 ) 200 8 : 2006 3~2007 2 : 2007 2~2008 1 : 2008 2~2009 2 : () 2009 3~ : 관심분야 :,, 이동범 ( 李東範 ) 곽진 ( 郭鎭 ) 2008 2 : () 2008 3~ : 관심분야 :,, 1994~2006 : (,, ) 2006 4 2006 11 : 2006 8 2006 11 : 2006 2007 2 : 2007 2~ : 관심분야 :, RFID,,, u-city