Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

제어 네트워크 경계에 대한 OT-IT 책임 역할 연구Study on the Security R&R of OT-IT for Control System Network Boundaries

Other Titles
Study on the Security R&R of OT-IT for Control System Network Boundaries
Authors
우영한권헌영
Issue Date
2020
Publisher
한국IT서비스학회
Keywords
CPS; Network Security; Boundary Protection; Rule Set; IIoT Security; OT-IT; Security and Safety
Citation
한국IT서비스학회지, v.19, no.5, pp.33 - 47
Indexed
KCI
Journal Title
한국IT서비스학회지
Volume
19
Number
5
Start Page
33
End Page
47
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/59539
DOI
10.9716/KITS.2020.19.5.033
ISSN
1975-4256
Abstract
In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE