제어 네트워크 경계에 대한 OT-IT 책임 역할 연구
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 우영한 | - |
dc.contributor.author | 권헌영 | - |
dc.date.accessioned | 2021-08-31T17:07:50Z | - |
dc.date.available | 2021-08-31T17:07:50Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 1975-4256 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/59539 | - |
dc.description.abstract | In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future. | - |
dc.language | Korean | - |
dc.language.iso | ko | - |
dc.publisher | 한국IT서비스학회 | - |
dc.title | 제어 네트워크 경계에 대한 OT-IT 책임 역할 연구 | - |
dc.title.alternative | Study on the Security R&R of OT-IT for Control System Network Boundaries | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | 권헌영 | - |
dc.identifier.doi | 10.9716/KITS.2020.19.5.033 | - |
dc.identifier.bibliographicCitation | 한국IT서비스학회지, v.19, no.5, pp.33 - 47 | - |
dc.relation.isPartOf | 한국IT서비스학회지 | - |
dc.citation.title | 한국IT서비스학회지 | - |
dc.citation.volume | 19 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 33 | - |
dc.citation.endPage | 47 | - |
dc.type.rims | ART | - |
dc.identifier.kciid | ART002642739 | - |
dc.description.journalClass | 2 | - |
dc.description.journalRegisteredClass | kci | - |
dc.subject.keywordAuthor | CPS | - |
dc.subject.keywordAuthor | Network Security | - |
dc.subject.keywordAuthor | Boundary Protection | - |
dc.subject.keywordAuthor | Rule Set | - |
dc.subject.keywordAuthor | IIoT Security | - |
dc.subject.keywordAuthor | OT-IT | - |
dc.subject.keywordAuthor | Security and Safety | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.