초록 close

현재 산업보안의 패러다임은 단순한 보안장비 설치에서 효율적인 운영·관리로 바뀌어 가고 있 다. 물리적 보안시스템(출입통제시스템, 영상보안시스템 등)과 IT 통합보안관제시스템이 융합하 면 기업의 위험관리 및 보안관리를 통하여 내부자의 정보유출을 획기적으로 예방, 차단하고, 사 후 추적등을 가능케 해준다. 즉, 기존의 물리적 보안과 IT 보안인력의 추가적인 확충이 없어도 단시간 내에 체계적인 융합보안관리 프로세스 확립이 가능해져 전문 조직 체제를 상시 운영하 는 효과를 기대할 수 있게 된다. 이제 개별 기술로 IT보안 및 물리보안 영역의 보안이벤트 수집 및 통합관리, 보안사고 발생시 사후 연계 추적 관리, 정보유출․보안위반 사항에 대한 패턴 정 의 및 실시간 감시, 보안위반․정보유출 시도에 대한 신속한 판단 및 대응/조치, 단계적·체계적 보안정책 수립 및 융합보안의 통합보안관리체계 확립이 필요하다.


Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider’s information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.


Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider’s information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.