• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 5 / 6

ÇѱÛÁ¦¸ñ(Korean Title) ´Ü°èº° ÇÁ·ÎÁ§Æ® º¸¾È ¹æ¾È¿¡ ´ëÇÑ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Study on Security Measure of Step-Wise Project
ÀúÀÚ(Author) ½Å¼ºÀ±   Àå´ëÇö   ±èÇüÁø   Seong-Yoon Shin   Dai-Hyun Jang   Hyeong-Jin Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 16 NO. 11 PP. 2459 ~ 2464 (2012. 11)
Çѱ۳»¿ë
(Korean Abstract)
À¯¼öÀÇ ±â¾÷ü°¡ »çÀ̹ö°ø°ÝÀ» ¹Þ¾Æ °³ÀÎÁ¤º¸¸¦ À¯Ãâ´çÇÏ´Â ÇÇÇØ »ç·Ê°¡ ¼ÓÃâÇÏ°í ÀÖ´Ù. ¶ÇÇÑ ±ÝÀüÀ̵æÀÇ È¹µæÀ̳ª »çȸÀû È¥¶õ À¯¹ß µîÀ» ¸ñÀûÀ¸·Î °èȹµÈ ÇØÅ·»ç·Ê°¡ Áö¼ÓÀûÀ¸·Î Áõ°¡ÇÏ°í ÀÖ´Ù. À¥»çÀÌÆ® °ø°ÝÀÇ ¾à 75%°¡ ÀÀ¿ë ÇÁ·Î±×·¥ÀÇ Ãë¾àÁ¡À» ¾Ç¿ëÇÏ°í ÀÖ´Ù. ÁÖ¿ä º¸¾È À̽´·Î´Â ¹ýÀû ±Ù°Å¿¡ µû¸¥ SW °³¹ß º¸¾È¼ºÀÌ °­È­µÇ´Â Ãß¼¼ÀÌ´Ù. ÇÁ·ÎÁ§Æ® ÆÀ¿øÀÇ Application °³¹ß º¸¾È ÀÎ½Ä ºÎÁ·ÇÑ °ÍÀ» »ç½ÇÀÌ´Ù. ¶ÇÇÑ ¼öµ¿Àû ´ëÀÀ°ú °³¹ß Àü´Ü°è(SDLC) Àüü ¿µ¿ª¿¡ °ÉÄ£ º¸¾È¼º °ËÁõ/Å×½ºÆ® µîÀÌ ¹ÌÈíÇÏ´Ù. µû¶ó¼­ µÚ´ÊÀº °áÇԹ߰ßÀ¸·Î ÀÎÇÑ Rework°¡ ¹ß»ýµÇ°í ÀÖ´Ù. ÀÌ¿¡ º» ³í¹®¿¡¼­´Â IT¼­ºñ½º ±â¾÷µéÀÌ ¼öÇàÇÏ´Â ÇÁ·ÎÁ§Æ® ´Ü°èº° ÁÖ¿ä º¸¾È È°µ¿ »ç·Ê¸¦ »ìÆ캻´Ù. ±×¸®°í À̸¦ ÅëÇÏ¿© ½ÇÁ¦ ÇÁ·ÎÁ§Æ® ´Ü°èº°·Î Àû¿ëÇÒ ¼ö ÀÖ´Â º¸¾È ¹æ¾ÈÀ» Á¦½ÃÇÏ°íÀÚ ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Many companies has led to the damage case being leaked to personal information by taking cyber attack. Also, planned hacking cases continues to increase for the purpose of acquiring monetary gain or causing social disruption induction, etc. Approximately 75% of the Web site attacks exploit the vulnerability of the application. Major security issue is to strengthen the S/W development security according to the legal basis. The members of the project team is the fact that the lack of recognition of application development security. In addition, passive response and security validation/testing, etc. throughout the SDLC to the entire area is insufficient. Therefore, rework due to the belated discovery of a defect has occurs. In this paper, we examine the case of the project step-by-step security activities by performing IT services companies. And, through this, we present security measures that can be applied to the step-wise real-world projects.
Å°¿öµå(Keyword) »çÀ̹ö °ø°Ý   ÇØÅ·   º¸¾È ¹æ¾È   ÇÁ·ÎÁ§Æ® ´Ü°è   º¸¾È¼º °ËÁõ/Å×½ºÆ®   Cyber Attack   Hacking   Security Measure   Step-Wise Project   Security Validation/Testing  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå