DOI QR코드

DOI QR Code

Development of Managing Security Services System Protection Profile

보안관제시스템 보호프로파일 개발

  • Received : 2015.03.13
  • Accepted : 2015.04.30
  • Published : 2015.04.30

Abstract

Security Management System is a system which operates in the security control center for security control. All living things across the Internet in recent years, with the rapid increase in the subscriber base has increased the need for network security dramatically depending on yirueojim through web services, thus cyber security sheriff, I have a big issue to build a security management system, each agency and perform control tasks. But the security functional requirements for security management system would not specified exactly, in developing a security management system to build and design a situation that PP's needs require a lot of trouble. In this paper, we develop a Managed Security System Protection Profile for the security functional requirements specification of the security management system.

보안관제시스템은 보안관제를 위해 보안관제센터에서 운영하고 있는 시스템이다. 최근 인터넷 가입자의 급격한 증가와 더불어 생활 전반의 모든 일들이 웹 서비스를 통하여 이루어짐에 따라 네트워크 보안에 대한 필요성이 급격히 증가하였고, 이에 따라 사이버 보안관제가 큰 이슈가 되어 각 기관에서는 보안관제시스템을 구축하여 보안관제 업무를 수행하고 있다. 하지만 보안관제시스템에 대한 보안 기능 요구사항이 정확히 명시되지 않아, 보안관제시스템을 구축 및 설계 개발 하는데 있어 많은 어려움이 있어 보호프로파일이 필요성이 요구된 실정이다. 본 논문에서는 보안관제시스템의 보안 기능 요구사항 명세를 위한 보안관제시스템 보호프로파일을 개발 하였다.

Keywords

References

  1. Y. J. Kim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services", Journal of the Korea Institute of Information Security and Cryptology, Vol.19, No.1, February 2009.
  2. S. J. Ann, "Security Monitering & Control", Lee hanmedia, April 2014.
  3. Korea Information Security Agency, "Guide for theproduction of Protection profiles and Security targets", July 2007.
  4. CC, "Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model Version 3.1 Revision 4", September 2012.
  5. H. J. Lee, "Reuse way of Protection Profile to draw Security Functional Requirements Based on Common Criteria", Sogang University Graduate School of Information and Communication, December 2012.
  6. K. S. Han, "Design of instrumentation and control system nuclear protection profile(NPP-ICS) basedon nuclear cyber security guideline", Hannam University, February 2013.
  7. Korea Information Security Agency, "Enterprise Security Management System Protection Profile V 2.0", September 2008.
  8. Korea Information Security Agency, "Intrusion Detection System Protection Profile V2.0", April 2008.
  9. Korea Information Security Agency, "Network Intrusion Prevention System Protection Profile V2.1", June 2010.
  10. Korea Information Security Agency, "Role Based Access Control System Protection Profile V2.0", July 2008.
  11. H. S. Jo, "A Study on Development to Be Protection Profile for Interoperability of Heterogeneous DRM Systems", information processing society journal C, Vol.16, No., February 2009.
  12. Y. J. Jo, "Analysis of Security Requirements on DCU and Development Protection Profile based on Common Criteria Version 3.1", Journal of the Korea Institute of Information Security and Cryptology, Vol.24,No.5, October 10.
  13. CC, "Common Criteria for Information TechnologySecurity Evaluation Part 2: Security functional components Version 3.1 Revision 4", September 2012.
  14. NIST, "System Protection Profile-Industrial Control Systems Version 1.0", October 2004.
  15. H. Jung, "A Study on the Security Requirements for Developing Protection Profiles", Journal of the Korea Institute of Information Security and Cryptology, Vol.17, No.1, February 2007.
  16. G. S. Ko, "Support tool for cloud system security functional requirement specification", Hannam University, February 2011.
  17. Y. S. Kim, "Development of Security Functional Requirement Specification Tool of Information Security Operational System Level", Journal of Security Engineering, Vol.07, No.1, February 2007.