<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Exploratory Study on R&amp;D Strategies in Industrial Technology Security</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Hangbae</forename><surname>Chang</surname></persName>
							<email>hbchang@daejin.ac.kr</email>
							<affiliation key="aff0">
								<orgName type="institution">Daejin University</orgName>
								<address>
									<addrLine>San 11-1, Sundan-Dong, Gyeonggi-Do</addrLine>
									<postCode>487-711</postCode>
									<country key="KR">Korea</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jonggu</forename><surname>Kang</surname></persName>
							<email>jaikang7@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Daejin University</orgName>
								<address>
									<addrLine>San 11-1, Sundan-Dong, Gyeonggi-Do</addrLine>
									<postCode>487-711</postCode>
									<country key="KR">Korea</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hyukjun</forename><surname>Kwon</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Yonsei University</orgName>
								<address>
									<addrLine>New Millenium Hall, 262 Seongsanno, Seodaemun-Gu</addrLine>
									<postCode>120-749</postCode>
									<settlement>Seoul</settlement>
									<country key="KR">Korea</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ilsun</forename><surname>You</surname></persName>
							<email>isyou@bible.ac.kr</email>
							<affiliation key="aff2">
								<orgName type="institution">Korean Bible University</orgName>
								<address>
									<addrLine>205, Sanggye-Dong, Nowon-Gu</addrLine>
									<postCode>139-791</postCode>
									<settlement>Seoul</settlement>
									<country key="KR">Korea</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Exploratory Study on R&amp;D Strategies in Industrial Technology Security</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">116D910FDA02026E9693FA16F5525652</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T23:30+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>To enhance international competitiveness through the protection of cutting-edge industrial technology, it is essential to establish the policy for strengthening ability to develop industrial security technology and raising international competitiveness. In this study we investigated and analyzed not only the ecumenic trend but also the present condition, then we executed the deduction of the industrial security technology development program in a aspect of government and analyzed the current status of the technical security technology for developing security technology and increasing leaks of the advanced industrial technology. D. Chadwick, I. You and H. Chang (Eds.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Present Status of Industrial Technology Leakage</head><p>According to the survey conducted by National Intelligence Service in 2008, the number of disclosure of domestic industrial technology leakage is 125 from 2000 to December of 2007. If these cases were not detected, it could have caused approximately 95 trillion won of property loss. If we have a look at the status of annual industrial technology leakage disclosure, the number of attempts to thieve technology which were less than 10, but it has recorded 26 in 2004, 29 in 2005, 31 in 2006, 32 in 2007. It indicates a constant increase and is urgent to prepare a strategy to prevent the technology leakage.</p><p>The main subject of industrial technology leakage is primarily divided into internal and external stakeholders <ref type="bibr" target="#b8">[9]</ref>. The industrial technology leakage by insider which targets important information or electronic documents occurs via personal computer, web based e-mail, and internet messenger <ref type="bibr" target="#b0">[1]</ref> <ref type="bibr" target="#b1">[2]</ref>. And in case of offline documents, it was reported as they are flowed out through Web, trespass by outsider committing system hacking with virus or warm, larceny by outsider flowing out offline documents produced by printer or photocopier. There exists an actual case that outsider for maintenance accessed database of business process system and flowed the large amount of information and offline documents out.</p><p>Likewise, to prevent an industrial technology leakage, domestic authority concerned put Technology Leak Prevention and Industrial Technology Protection and Support Act in operation to improve the competitiveness of domestic industrial and contribute to development of national economy by preventing illegal leakage of the industrial technology. Yet for a concrete application of this Act, it is essential that the current status of industrial technology security and further study of this field is needed. Thus in this study, we analyzed the current level of domestic industrial security technology and technical competitiveness. We expect to utilize analysis data as basic information for improving international competitiveness and ability to develop industrial security technology <ref type="bibr" target="#b5">[6]</ref>.</p><p>To execute this plan, we analyzed the needs for industrial technology protection and designed the technical framework to fulfill those needs which were deduced. Following designed framework, we analyzed a current level of technology and limitation then deduced further development subject <ref type="bibr" target="#b7">[8]</ref> <ref type="bibr" target="#b9">[10]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Investigation of Needs for Industrial Security Technology</head><p>In this study, to investigate actual needs for industrial security technology, we visited 15 providers of technology and 15 demander of technology then conducted in-depth interviews. The primary needs for industrial security technology are as followings <ref type="bibr" target="#b3">[4]</ref>[5]:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 2. Research Methodology</head><p>-As a result of the investigation, it appeared to be essential to develop counter measures for emergence of various portable storage devices(secure digital card, compact flash card, memory stick) and communication methods(infrared data communications, wireless internet, blue tooth, etc) -Some security technologies for ordinary business documents(word, excel, power point files) have reached secure level, but security technologies for blueprints or program source documents have yet to be well developed -The access control method is mainly used for database security technology rather than encryption due to a performance problem and there exist needs for some technology enabling illegal SQL questions to be standardized. -Measure model for security level of remote computer is still on the way of development. And further researches about control method and resource utilization authority management for computers which reached some extent of security level. -Currently, there occurs some security vulnerable spot in the linked section because there isnt the integration between physical and technical security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Technical Industrial Security Technology Framework Design</head><p>In this study, according to disadvantage analysis result derived from risk analysis process, we applied industrial security technology design methodology based on risk analysis for solving vulnerability <ref type="bibr" target="#b2">[3]</ref>. Information security technology development methodology based on risk analysis listed vulnerability and threats for information asset through information asset identification and analysis. Then we designed technical industrial security technology framework by reflecting assessment result about influence and risk caused by certain attack to needs for security technology development.</p><p>Before anything else, the patterns of the security vulnerability of the personal computer are classified as the damage of internal information in personal com-puters caused by malicious external access(outflow of document file by hacking tool considering the vulnerability of operation system, virus, worm), unreliability(external penetration according to the absence of window password during booting, outflow of document file caused by the absence of screen saver) of personal computer(access control) management, and intentional internal documentation leakage by personal computer user(via e-mail, portable storage device).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 3. Patterns of security vulnerability of PC</head><p>The patterns of the vulnerability of electronic document are classified as unencryption(circulation of the unclassified confidential document) and ungraduation, inadequacy of access control in a way of reading, editing, conveyance, and printing of the documents(abuse of users' authority, illegal outflow via email and portable storage devices, theft and loss), and illegal use of destructed document(undestruction after using document, illegal outflow of document by restoring deleted document) The patterns of the vulnerability of database are classified as indiscreet access to database(read or outflow unrelated data file, abusing access authority) of server administrator(or usual user), outflow of data file peculating access authority), outflow of data file by peculating access authority of database(outflow of data file by peculating id and password of user or administrator), and information damage caused by the malicious penetration from outside of the organization to server or database.  Generally, there exist the technical measures for preventing outflow of information which are classified as cut off or restriction of access to information, encryption of data or files blocking the access made by unauthorized users, blocking file transmission or restriction to the channel of outflow, destruction of device where data or file is stored, and monitoring log in which the outflow of the data or file leaves traces. Based on vulnerability analysis about identified information asset, we executed Delphi method with professional group related to literature review and relevant field workers(3 university professor, 3 professionals working for security corporation), then we distinguished security objective from security technology and designed them as table <ref type="table">1</ref>. The Delphi method is that we collected opinions of professional group via survey and surveyed statistical analysis result from professional group again then repeat the collection of opinion and aggregate. This method provides a chance to modify each professionals opinion and it is positive of a chance to utilize others opinion. Currently more than 90% of technology foresight field use Delphi method and it is settled down as universal method. It has another advantage that it help get reliable assessment result via professional groups participation.</p><p>A mail and messenger securities that are to prevent a industrial technology leakage encrypt contents of e-mail and messenger via internet also filter them in observance of rules. A portable storage device security is that it implements authority control on portable storage devices(USB, mobile phone, memory card, etc) which can be connected with personal computer.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1. Industrial Security Framework</head><p>A document security aiming at controlling an approach to industrial technology block an attempt to access made by unauthorized or illegal person based on encryption of the existing file. The document security also applies security regulation to the all procedures which are made from a generation of the document to disposal of the document including distribution of them. And it makes it possible to grasp a channel of the important documents outflow so that it can prevent unauthorized outflow or thief of confidential documents and product blueprint. Database security technology consists of database activity monitoring and blocking technology. Both of technologies function as a means of protection which guards stored data in the database from unauthorized access, intentional modification and elimination of data, and contingency obstructing datas consistency. Database encryption technology not only encrypts data but also stores them. And when it is necessary, it restore the encrypted data and reads or modifies them then encrypts them again. Network access control technology protects internal network and user terminal through certain procedures that execute an isolation, cure, and permitting an access regarding terminal unmatched with security policy after inspecting a status of terminal from a stage of network access.</p><p>Consequently, contents monitoring and filtering technologies observe the distribution of industrial technology founded on a business regulation related to certain application programs. This technology also detects an inappropriate transfer of the sensible information in network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Analysis of the Current Status and Limitation of Industrial Security Technology</head><p>As a result of in-depth interview research, a technology of portable storage device security is developed when various portable storage devices (secure digital card, compact flash card, memory stick, etc.) appear and new means of communication are developed. Yet there appear a problem caused by collision with controlling existing devices in interoperability. Document security technology has restriction on program source file and a blueprint due to the big size of file, interoperability between various kinds of form of file and applications, and the needs for multi-level collaboration. And there is lack of steady state of security technology development (currently it is not possible to collect and integrate the usage history of files or the usage history of read and write. It is also impossible to control downloads and authority to use after download).</p><p>Database activity monitoring and blocking technology cannot control an access made by each user unit but can control an access made by application unit because database security technology cannot recognize which client access the database in case of access conducted through application server. When database encryption technology encrypts database, it encrypts index at the same time so that the speed of data search become slower. Also it takes long time to encrypt or decrypt large amount of data table. Unfortunately, this disadvantage may cause service halt.</p><p>Network access control technology blocks an ill-intentioned program or attempt that both of them are executed by computer users qualified for proper security level according to organizations regulation. It has emerged to develop an integrated security technology which can manage change in security policy or health condition of computer.</p><p>Currently, contents monitoring and filtering technology for ordinary corporation and public office occupy 1GB of server for 1 hour-long log of operation history and after 1 month the operation history would produce approximately 300 500GB of log. That makes it difficult to trace log after all.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Establishing a Strategy for Industrial Security Technology Development</head><p>As previously explained, many security technologies are being developed with various perspectives to protect industrial technology. But there is much work related to managing technologies aimed at controlling outflow and those technologies only provide protection to arranged file format. Also technologies for monitoring have a potential to commit a detection error and cannot provide real-time interception. Inconsequence, future industrial security technology is needed to be developed as policy-oriented based on organizations business process. Accordingly in this study, we deduced further technology development task as followings with professional group by Delphi method. First, control system for different types of portable storage device conduct access control regardless of producer or operational environment and when doing data transferring to external, it still maintains access control on data from a remote computer. In detail, this control system consists of advancement of portable storage device and channel control technology, external transmission security file which supports confidentiality, integrity, and tenacity. The external transmission security file conducts encryption of document and convey decryption key to external authorized user so that user who receives security file can read relevant document without installing a certain program into terminal. The mere execution of security file let user read document under permissible range.</p><p>Industrial technology document integrated security system fulfills security and compatibility among technologies which process security related to electronic document. And it guards program source file and blueprint that possess unique feature for business process. Considering relevant work environment, security technology of program source file and blueprint should solve following security needs.</p><p>Particularly, collaboration possible industrial technology electronic document security technology should conduct an access control for user and application program at the same time. It also needs to develop integrated electronic security technology, being linked with the existing office document security technology. The current compatibility and expansion possible document security integrated technology cannot provide interoperability, when a document transmission occurs between two different organizations. So this technology prevents a document transmission in which security technology is not applied. Accordingly, API(Application Program Interface) which can control information leakage made from document distribution in the organizations should be developed.</p><p>The high-performance database security system solves vulnerability that a detour of database access through web application has and minimizes user pro-  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Exploratory Study Result regarding Industrial Security Technology</head><p>To enhance the international competitiveness by protecting up-to-date industrial technology, we have to analyze the current level of domestic industrial security technology and technical competitiveness <ref type="bibr" target="#b6">[7]</ref>. Furthermore it is vital to establish the policy for improving the competitiveness of domestic industrial by devise a policy to support development task. In this study, we analyzed the all-pervading trend and present status of industrial security technology. Then, we conducted the deduction of national development task and analyzed current level of domestic industrial security technology for prevention of industrial technology leakage and improvement of technology.</p><p>In detail, we analyzed the status of industrial technology leakage, and grasped the main subject of leakage, channel, and method. We then designed industrial security framework with identification of industrial technology asset, research of literature, and visiting provider and demander of industrial security technology On the next stage, we applied Delphi Method to the professional group and deduced the segmented development task. As a result, we designed the control system for different types of portable storage devices, integrated security system for industrial technology documents, high-performance database security system, and role-oriented network end point access control system.</p><p>The result of this study may be utilized to enhance an international competitive power and devise the policy for industrial security technology development ability as basic contents. Industrial security framework based on researches and practitioners is also anticipated to provide an approach method regarding industrial technology leakage prevention, detection and countermeasure. Hereafter, it is needed to develop information security management system for industrial security specialized in industrial technology protection which can carry out integrated management. There also exists necessity for further research concerning physical and managerial security system for industrial technology protection.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Status of Industrial Information Leakage</figDesc><graphic coords="2,165.96,65.94,283.40,178.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Patterns of inadequacy of access control for document</figDesc><graphic coords="4,165.96,469.27,283.56,120.95" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Patterns of vulnerability of database</figDesc><graphic coords="5,165.96,169.13,283.65,111.73" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Patterns of vulnerability of network</figDesc><graphic coords="5,165.96,384.50,283.40,162.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. Improved e Document Security</figDesc><graphic coords="9,165.96,65.84,283.40,119.86" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 8 .</head><label>8</label><figDesc>Fig. 8. Improved Database Security</figDesc><graphic coords="9,165.96,381.91,283.40,114.83" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<idno>ISO/IEC: ISO/IEC TR 13335-4: 2000</idno>
		<title level="m">Information Technology -Guidelines for the Management of IT Security Part 4</title>
				<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m">BS7799 Information Security SME Guide</title>
				<imprint>
			<publisher>XiSEC/AEXIS Consultants</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">Dario</forename><surname>Forte</surname></persName>
		</author>
		<title level="m">Information Security Assessment: Procedures and Methodology</title>
				<imprint>
			<publisher>Computer Fraud &amp; Security</publisher>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><surname>Gartner</surname></persName>
		</author>
		<title level="m">Hype Cycle for Governance</title>
				<imprint>
			<publisher>Risk and Compliance Technologies</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><surname>Gartner</surname></persName>
		</author>
		<title level="m">Understanding Data Leakage</title>
				<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">Karin</forename><surname>Hone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jhp</forename><surname>Eloff</surname></persName>
		</author>
		<title level="m">What makes an effective information security policy?</title>
				<imprint>
			<publisher>Network security</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Information Security Management -A New Paradigm</title>
		<author>
			<persName><forename type="first">Jan</forename><surname>Eloff</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mariki</forename><surname>Eloff</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of SAICSIT</title>
				<meeting>SAICSIT</meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Information Security Management: An Approach to combine Process Certification And Product Evaluation</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Eloff</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">H</forename><surname>Solms</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Computers &amp; Security</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Information Incident Management</title>
		<author>
			<persName><forename type="first">Rob</forename><surname>Dodson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
	<note type="report_type">Information Security Technical Report</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">What IT Infrastructure Capabilities are needed to Implement e-Business Models?</title>
		<author>
			<persName><forename type="first">P</forename><surname>Weill</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Vitale MIS Quarterly Executive</title>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
