ISCS (Information Security Check Service) for the Safety and Reliability of Communications
Recent widespread use of information and
communication technology has greatly changed information security
risks that businesses and institutions encounter. Along with this
situation, in order to ensure security and have confidence in electronic
trading, it has become important for organizations to take competent
information security measures to provide international confidence that
sensitive information is secure. Against this backdrop, the approach to
information security checking has come to an important issue, which
is believed to be common to all countries. The purpose of this paper is
to introduce the new system of information security checking program
in Korea and to propose synthetic information security
countermeasures under domestic circumstances in order to protect
physical equipment, security management and technology, and the
operation of security check for securing services on ISP(Internet
Service Provider), IDC(Internet Data Center), and
e-commerce(shopping malls, etc.)
[1] Korea Information Security Agency, CERTCC-KR (KOREA Computer
Emergency Response Team Coordination Center), http://www.kisa.or.kr ,
http://www.krcert.or.kr .
[2] MIC, revised plan for the law regarding the information communications
network usage promotion, information protection, etc., 2003.
[3] MIC, data on the ISCS hearing, 2003.
[4] IT Health Check, 2005 http://www.cesg.gov.uk/
[5] IT Baseline Protection Certification process, 2005
http://www.bsi.bund.de/english/gshb/zert/index.html .
[6] Information Technology Infrastructure Security and Protection Services
(ITISPS), 2005
http://www.cse-cst.gc.ca/en/services/industrial_services/itisps_program .
[1] Korea Information Security Agency, CERTCC-KR (KOREA Computer
Emergency Response Team Coordination Center), http://www.kisa.or.kr ,
http://www.krcert.or.kr .
[2] MIC, revised plan for the law regarding the information communications
network usage promotion, information protection, etc., 2003.
[3] MIC, data on the ISCS hearing, 2003.
[4] IT Health Check, 2005 http://www.cesg.gov.uk/
[5] IT Baseline Protection Certification process, 2005
http://www.bsi.bund.de/english/gshb/zert/index.html .
[6] Information Technology Infrastructure Security and Protection Services
(ITISPS), 2005
http://www.cse-cst.gc.ca/en/services/industrial_services/itisps_program .
@article{"International Journal of Information, Control and Computer Sciences:59648", author = "Jong-Whoi Shin and Jin-Tae Lee and Sang-Soo Jang and Jae-II Lee", title = "ISCS (Information Security Check Service) for the Safety and Reliability of Communications", abstract = "Recent widespread use of information and
communication technology has greatly changed information security
risks that businesses and institutions encounter. Along with this
situation, in order to ensure security and have confidence in electronic
trading, it has become important for organizations to take competent
information security measures to provide international confidence that
sensitive information is secure. Against this backdrop, the approach to
information security checking has come to an important issue, which
is believed to be common to all countries. The purpose of this paper is
to introduce the new system of information security checking program
in Korea and to propose synthetic information security
countermeasures under domestic circumstances in order to protect
physical equipment, security management and technology, and the
operation of security check for securing services on ISP(Internet
Service Provider), IDC(Internet Data Center), and
e-commerce(shopping malls, etc.)", keywords = "Information Security Check Service, safety criteria,
object enterpriser.", volume = "1", number = "6", pages = "1741-4", }