Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

제어 네트워크 경계에 대한 OT-IT 책임 역할 연구

Full metadata record
DC Field Value Language
dc.contributor.author우영한-
dc.contributor.author권헌영-
dc.date.accessioned2021-08-31T17:07:50Z-
dc.date.available2021-08-31T17:07:50Z-
dc.date.created2021-06-17-
dc.date.issued2020-
dc.identifier.issn1975-4256-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/59539-
dc.description.abstractIn recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.-
dc.languageKorean-
dc.language.isoko-
dc.publisher한국IT서비스학회-
dc.title제어 네트워크 경계에 대한 OT-IT 책임 역할 연구-
dc.title.alternativeStudy on the Security R&R of OT-IT for Control System Network Boundaries-
dc.typeArticle-
dc.contributor.affiliatedAuthor권헌영-
dc.identifier.doi10.9716/KITS.2020.19.5.033-
dc.identifier.bibliographicCitation한국IT서비스학회지, v.19, no.5, pp.33 - 47-
dc.relation.isPartOf한국IT서비스학회지-
dc.citation.title한국IT서비스학회지-
dc.citation.volume19-
dc.citation.number5-
dc.citation.startPage33-
dc.citation.endPage47-
dc.type.rimsART-
dc.identifier.kciidART002642739-
dc.description.journalClass2-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorCPS-
dc.subject.keywordAuthorNetwork Security-
dc.subject.keywordAuthorBoundary Protection-
dc.subject.keywordAuthorRule Set-
dc.subject.keywordAuthorIIoT Security-
dc.subject.keywordAuthorOT-IT-
dc.subject.keywordAuthorSecurity and Safety-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE