메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학위논문
저자정보

허승원 (고려대학교, 고려대학교 정보보호대학원)

지도교수
최진영
발행연도
2020
저작권
고려대학교 논문은 저작권에 의해 보호받습니다.

이용수10

표지
AI에게 요청하기
추천
검색

이 논문의 연구 히스토리 (3)

초록· 키워드

오류제보하기
요 약


현재 신종 코로나바이러스 감염증(코로나19) 전세계 확진자가 2020년 5월 2일 기준 320만명을 돌파했고, 사망자도 23만명을 넘어섰다. 이처럼 코로나19가 전 세계로 빠르게 확산하면서 우리나라뿐만 아니라 해외에서도 ''원격의료''가 재조명 받고 있다.
코로나19 사태뿐만 아니라, 인구의 고령화, 만성질환의 환자수가 증가하면서 의료기관이 아닌 환경에서 환자나 일반인을 대상으로 의료기기에 정보통신 기술을 활용하여 질병을 진단하거나 관리하는 홈 헬스케어 의료서비스가 점차적으로 발전해 가고 있다. 하지만 홈 헬스케어 의료기기는 그 특성상 훨씬 더 보안에 취약하기 때문에 충분한 보안 대책이 마련되어야 하고, 의료정보 기술 표준화 기구들은 설계단계에서부터 보안 방안을 적용하고 있다. 본 논문에서는 홈 헬스케어 의료기기의 한 예인 원격 약복용 모니터링 시스템을 대상으로 DFD (Data Flow Diagram), STRIDE, LINDDUN 위협 모델링 기법을 이용하여 위협을 식별하였다. 그리고 Attack/Threat Tree를 이용하여 위협과 공격자의 공격 목표 달성을 위한 방법과의 연관성을 파악하고 체계화 한다.

* 이 논문은 2019년 한국정보과학회 “2019 한국컴퓨터종합학술대회 우수발표논문상”을 수상한 “원격 약복용 모니터링 시스템의 보안 위협 모델링”이라는 제목의 논문을 수정 및 보완하여 작성한 논문임을 밝힙니다.

목차

목 차
제 1장 서론 ················································································ 1
1.1 연구의 배경 ······································································· 1
1.2 문제 정의 ········································································· 3
제 2장 관련 연구 ·········································································· 4
2.1 위협 모델링 연구 동향 ·························································· 4
2.2 STRIDE 위협 모델링 ··························································· 4
2.3 LINDDUN 위협 모델링 ························································· 5
2.4 의료정보 기술 표준 ······························································ 7
2.4.1 ISO/IEEE 11073 PHD(Personal Health Data) Standards ············ 7
2.4.2 HL7 (Health Level 7) ··················································· 9
제 3장 원격 약복용 모니터링 시스템 보안 위협 모델링····························· 12
3.1 원격 약복용 모니터링 시스템 ·················································· 12
3.2 데이터 흐름도 도출 (Data Flow Diagram) ·································· 13
3.3 STRIDE 위협분석 ······························································· 16
3.3.1 Attack Tree ······························································· 18
3.3.2 보안 위협 ·································································· 20
3.4 LINDDUN 위협분석 ···························································· 20
3.4.1 MUC (Mis-use Case) 작성 ············································ 24
제 4장 결론 ················································································ 25
참고문헌 ···················································································· 26

최근 본 자료

전체보기

댓글(0)

0