제어 네트워크 경계에 대한 OT-IT 책임 역할 연구Study on the Security R&R of OT-IT for Control System Network Boundaries
- Other Titles
- Study on the Security R&R of OT-IT for Control System Network Boundaries
- Authors
- 우영한; 권헌영
- Issue Date
- 2020
- Publisher
- 한국IT서비스학회
- Keywords
- CPS; Network Security; Boundary Protection; Rule Set; IIoT Security; OT-IT; Security and Safety
- Citation
- 한국IT서비스학회지, v.19, no.5, pp.33 - 47
- Indexed
- KCI
- Journal Title
- 한국IT서비스학회지
- Volume
- 19
- Number
- 5
- Start Page
- 33
- End Page
- 47
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/59539
- DOI
- 10.9716/KITS.2020.19.5.033
- ISSN
- 1975-4256
- Abstract
- In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.