http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
IT Security Governance for e-Business
Rosslin John Robles,Na-Yun Kim,Tai-hoon Kim 보안공학연구지원센터 2008 International Journal of Software Engineering and Vol.2 No.3
Information Security is very important in e-Business. Previous IT governance frameworks have not given the connection between IT governance and e-business security sufficient attention. This paper identifies various levels of governance followed by a focus in the roles of information technology (IT) governance with reference to information security for today’s electronic business (e-business) environment. The emergence of and dependence on new technologies, like the Internet, have increased exposure of businesses to technology-originated threats and have created new requirements for security management and governance. We proposed a model achieves the necessary integration through risk management in which the tensions between threat reduction and value generation activities have to be balanced.
Communication Security solution for internet SCADA
Rosslin John Robles,Kum-Taek Seo,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
Traditional SCADA is connected only in a limited private network because SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect SCADA systems through the internet. Because of this, many issues regarding security surfaced. To answer the security issues, a web SCADA security solution using crossed-crypto-scheme is proposed.
Reverse DNS lookup in MIPv6 Environment
Rosslin John Robles,Eun-suk Cho,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections. MIPv6 allows a mobile node to transparently maintain connections while moving from one subnet to another. Each device is identified by its home address although it may be connecting to through another network. When connecting through a foreign network, a mobile device sends its location information to a home agent. which intercepts packets, intended for the device and tunnels them to the current location. If a node is a web server, and another node will try to access it, it is very easy if it knows the IP address of the web server. As practiced, we use the domain name when searching for websites other than the IP address. This paper suggests an IP lookup in Mobile IPv6 environment. This method utilizes the DNS lookup.
A Guide to Software Engineering for Security
Rosslin John Robles,Min Kyu Choi,Sang-soo Yeo,Tai-hoon Kim 한국멀티미디어학회 2008 한국멀티미디어학회 학술발표논문집 Vol.2008 No.1
There is no such software system that doesn’ t need to be secure. Most software systems are faces threats from potential adversaries, from simple client application system to complex telecommunication and power systems, to commodity software with copy protection mechanisms. Software Engineers must be aware of these threats. They should also engineer systems that are capable of defending against these threats while still delivering value to customers. We present in this paper our view on the research issues concerning the interactions between security and software engineering.
Importance of Supervisory Control and Data Acquisition Security in Critical Infrastructure
Rosslin John Robles,Min-kyu Choi,Tai-hoon Kim 한국정보기술학회 2009 한국정보기술학회논문지 Vol.7 No.4
Critical Infrastructures are so crucial to the society and community that a disruption of it can cause great damage. Many of these identified Critical Infrastructures are controlled by control systems like SCADA or Supervisory Control and Data Acquisition. Because of this, SCADA becomes a target of terrorists and other threats. In this paper, we discuss the relationship of Critical Infrastructure and SCADA, the threats and vulnerabilities and provides steps to minimize these threats and vulnerabilities. We also discuss the security function of SCADA systems and other control systems to sectors which were considered Critical Infrastructure. This paper is the modified and extended version of the paper, the function of SCADA in critical infrastructure, presented at KIIT(Korean Institute of Information Technology) summer conference in 2009 and selected as a best paper.
The Taxonomy of SCADA Communication Protocols
Rosslin John Robles,Min-kyu Choi,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Communication is very important in SCADA systems. In communication, protocols are needed to be implemented to avoid some problems. In the current state of SCADA communication, two protocols are widely used, the T101 or IEC 60870-5-101 (IEC101) and the DNP3 (Distributed Network Protocol) . In this paper, we present each protocol and discuss the specifications of T101 and DNP3. This can help SCADA operators to select which protocol is suited for the operations of their SCADA system.