ÇѱÛÁ¦¸ñ(Korean Title) |
Á¤º¸º¸¾È ´Ü°è¿¡¼ ºÐ¼®´Ü°è º¸¾È |
¿µ¹®Á¦¸ñ(English Title) |
Analysis Phase Security in Information Security |
ÀúÀÚ(Author) |
½Å¼ºÀ±
½Å±¤¼º
ÀÌÇöâ
Seong-YoonShin
Kwang-SeongShin
Hyun-ChangLee
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 23 NO. 02 PP. 0697 ~ 0698 (2019. 10) |
Çѱ۳»¿ë (Korean Abstract) |
º» ³í¹®¿¡¼´Â S/W °³¹ß ¼ö¸íÁֱ⿡ µû¶ó °³¹ß ´Ü°è ±¸¼º¿¡ ´ëÇÑ 4 °¡Áö ¼öÁØÀÇ ºÐ¼®, ¼³°è, ±¸Çö ¹× Å×½ºÆ®¸¦ Á¤ÀÇÇÑ´Ù. ƯÈ÷ ÁýÁßÀûÀ¸·Î °³¹ß µÈ Á¤º¸ ½Ã½ºÅÛÀ» ÁغñÇϱâ À§ÇØ ºÐ¼® ´Ü°è¸¦ ´Ù·ç¾ú´Ù. Á¤º¸ º¸¾È ¿ä±¸ »çÇ× µµÃâ¿¡ ´ëÇÑ ¼¼ºÎ »çÇ×Àº ±â¹Ð¼º, ¹«°á¼º,°¡¿ë¼º ¹× Ã¥ÀÓ¼º µîÀÇ °üÁ¡¿¡¼ º¼ ¼ö ÀÖ´Ù. |
¿µ¹®³»¿ë (English Abstract) |
In this paper, we define four levels of analysis, design, implementation, and testing of the configuration of the development phase by S/W development life cycle. In particular, it dealt with the stage of the analysis phase to prepare an information system developed intensively. Details of the derivation of the information security requirements, it can be seen that comes from the perspective of confidentiality, integrity, availability and accountability, etc. |
Å°¿öµå(Keyword) |
S/W development cycle
analysis phase
implementation
information security
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|