earticle

논문검색

주요 정보통신기반시설의 평가컨설팅 방법론에 대한 연구

원문정보

A Study on the Evaluation Consulting Methodology of Important Information Communication Base Facility

이영로, 조재완

피인용수 : 0(자료제공 : 네이버학술정보)

초록

영어

It soaks but 2001 July information communication base step law enforcement and the Enforcement Ordinance are published to follow, in order to support the establishment of evaluation and protective measure in order the vulnerability analysis against the facility of the agency which manages an important information communication base hour opinion to designate information protection specialty enterprise. As information protection specialty enterprise being revealed evacuation laboratory back 12 enterprises from information communication department become designation as the consulting enterprise and they do an enterprise activity actively. It follows in diffusion of the IT and information reconciliation level the other side where our country belongs in the world-wide first group, the research against the disfunction plan of preparation comparison the fact that law it is come negligently all actuality. The network as it will give management coat fatal effect even at obstacle occurrence hour of instant for of case and IT facility of the cyber transactions which leads, in the future there to be to corporate management, there is a possibility the stable civil official of information Facilities for communications very seeing in the portion which is important. Present condition and important propulsion contents of information communication base step law enforcement after, against a vulnerability analysis of information protection relation field and evaluation consulting methodological application situation to sleep it researches from the dissertation which it sees consequently and it does.

목차

Abstract
 I. 서론
 II. 정보통신기반시설 취약점 분석 및 평가 기준 현황
  2.1 취약점 분석 및 평가 개요
  2.2 취약점 분석 및 평가범위와 평가항목
 III. 기반보호시설 지정 현황
  3.1 전자적 침해행위 사례의 증가
  3.2 지정시설
 IV. 방법론들에 대한 논의
  4.1 취약점 분석 및 평가의 개념
  4.2 국외의 분석 및 평가 참조 모델
  4.3 국내 전문업체의 방법론
 V. 방법론의 적용
  5.1 정보통신시스템에서의 추진방법론 설계
  5.2 각 단계별 수행 내용
  5.3 취약점 분석 및 위험평가
  5.4 대책수립
 VI. 결론 및 시사점
 참고문헌

저자정보

  • 이영로 Young Ro Lee. 한국정보사회진흥원 U-인프라구축단장
  • 조재완 Jae wan Cho. 경동대학교 사회복지경영학부 경영학과 교수

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 기관로그인 시 무료 이용이 가능합니다.

      • 4,600원

      0개의 논문이 장바구니에 담겼습니다.