The Study on the Information Security Audit Guideline for SCADA System

被引:0
|
作者
Lee, ChulSoo [2 ]
Hong, Seng-phil [1 ]
Kang, Sungmin [3 ]
Kim, Jaehyoun [4 ]
机构
[1] SungShin Womens Univ, Sch Media & Informat, Seoul, South Korea
[2] Kyungwon Univ, Coll Software & Informat Technol, Seoul, South Korea
[3] Chung Ang Univ, Coll Business Adm, Seoul 156756, South Korea
[4] Sungkyunkwan Univ, Dept Comp Educ, Seoul, South Korea
关键词
Industry Control System; Information Security Architecture; Information Security Audit Framework; Audit Guideline; Access Control;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The advancement of information technology has brought many changes in the business environment, including the automation of large industrial facilities. Electric power, water resources, energy, transportation, telecommunication, etc. compose the key infra structure of a nation which is a founding ground for economic development, stable lives of citizens, and national security, and the factors are manipulated by industry control system. Furthermore, changes in business environment integrate all the systems in organizations and it enables the integration of business information systems and industry control system. Therefore, standardization of industry control system and transition to open system are being pursued and security is becoming more important. Researchers are conducting studies about control system security in various areas such as technology, management, environment, etc. Nevertheless, there still are not many researches on the topics of control system audit. Many nations are enhancing information system audit of government and key public system and are considering security audit system for control systems such as key information telecommunication infra, which affect national security. This research provided the basis of quality audit by suggesting information security architecture and information security audit framework & audit guideline for control system audit.
引用
收藏
页码:147 / 162
页数:16
相关论文
共 50 条
  • [1] Study on Business-oriented Information Security Audit System
    Zheng, Tianxiang
    Zhou, Yiming
    [J]. 2012 2ND INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE (ICASS 2012), VOL 3, 2012, : 264 - +
  • [2] A Security Audit Framework to Manage Information System Security
    Pereira, Teresa
    Santos, Henrique
    [J]. GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 9 - +
  • [3] The Fourth Dimension of Information System Audit and Security
    Aggarwal, Akshai
    Kanhere, Sujata
    Kanhere, Vishnu
    Kanhere, Shankar
    [J]. SEPADS'09: PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SOFTWARE ENGINEERING, PARALLEL AND DISTRIBUTED SYSTEMS, 2009, : 162 - +
  • [4] AUDIT AND INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION
    Drastich, Martin
    [J]. SBORNIK Z MEZINARODNI VEDECKE KONFERENCE ZNALOSTI PRO TRZNI PRAXI 2012: VYZNAM ZNALOSTI V AKTUALNI FAZI EKONOMICKEHO CYKLU, 2012, : 49 - 52
  • [5] Open Source Security Information Management System Supporting IT Security Audit
    Hermanowski, Damian
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2015, : 336 - 341
  • [6] Information System Audit for Mobile Device Security Assessment
    Abu Othman, Noor Ashitah
    Norman, Azah Anir
    Kiah, Miss Laiha Mat
    [J]. 2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 50 - 55
  • [7] Security Audit of a University Information System: A Functional Model
    Kan, Andrei
    Albatsha, Ahmad
    [J]. SOFTWARE ENGINEERING PERSPECTIVES IN SYSTEMS, VOL. 1, 2022, 501 : 557 - 564
  • [8] Methodology and Ontology of Expert System for Information Security Audit
    Atymtayeva, Lyazzat B.
    Bortsova, Gerda K.
    Inoue, Atsushi
    Kozhakhmet, Kanat T.
    [J]. 6TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS, AND THE 13TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS, 2012, : 238 - 243
  • [9] An audit framework to support information system security management
    Pereira, Teresa
    Santos, Henrique M. Dinis
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2010, 3 (03) : 265 - 277
  • [10] The Research on Security Audit for Information System Classified Protection
    Lu, Hui
    Cu, Xiang
    Wang, Le
    Jiang, Yu
    Cui, Meng
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 300 - 308