• Title/Summary/Keyword: 보안업

Search Result 291, Processing Time 0.023 seconds

The Introduction and the Application of PMSCs System on Counter-terrorism (대테러활동에 있어서 민간군사보안업(PMSCs) 제도의 도입과 활용방안)

  • Kim, Sang-Jin;Kim, Jong-Kul
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.89-98
    • /
    • 2011
  • The counter-terrorism in Korea should be approached practically divided both internally and externally. However, in reality it is impossible for the military and the police to control all the counter-terrorism. So there is a need of precaution using the partnership with private companies. But the military and the police have stressed the conservative and closed operation. Furthermore, the focus of counter-terrorism in Korea is more on expose facto treatment than prevention, so they are almost the defenseless. In order to solve this problem, we should form the private subcontractors of the counter-terrorism experts. That is the introduction and the application of PMSCs system. First, the military and the police need to change its mind set for the partnership with private companies to prepare appropriateness. Second, it should be built up infrastructure to let the hands-up workers on counter-terrorism out place. Third, it should be set up the institutions of learning to train regularly to applicate PMSCs system and to specialize. Fourth, the training of counter-terrorism should be made it mandatory about exit passengers to danger zone. Fifth, the selection of PMSCs suitable for counter-terrorism should be strict.

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.235-244
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated. the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread. and design a logic engine module. Three engines judge attack grades (Attack Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.165-174
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated, the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread, and design a logic engine module. Three engines judge attack grades (Attack, Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

Objective Research about Effective Outplacement Education for Discharged Soldiers (제대군인의 효과적인 전직지원 교육을 위한 실증적 연구)

  • Koo, Young Hui;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.65-73
    • /
    • 2014
  • For many years, there have been many researches and guidelines to improve the employment rate of discharged soldiers. However, there have not been enough effective analysis conducted about the outplacement service and improvement guidelines. That is the reason why the satisfaction level of governmental supporting programs for the discharged soldiers stays at low level. Therefore, a methodical approach is needed for the discharged soldiers who have dedicated their services for many years for the sake of the country's security. For this reason, tools which can support build an effective outplacement service for the discharged soldiers are required. In this study, psychological, structural and environmental aspect of discharged soldiers were surveyed at the cognitive level based on the soldiers waiting for the discharge from military service. As a result, it became clear that psychological advice or support and job training for the discharged soldiers who executed long-term service are urgent. In addition, an efficient system can control and maintain the system mentioned above.

A Study on Model fostering for Cloud Service Brokerage (클라우드서비스 브로커리지 성공모델 육성 연구)

  • Choi, Sung
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.1-11
    • /
    • 2015
  • The growing company that provides high quality service to every customer by introducing a cloud-system organization. However, the information needs of diverse and different, so every cloud system, and acts as a barrier to entry for cloud services provide appropriate. Cloud services are becoming complicated and diversified depending on concerns about cloud security continues, the growing need of professionalism held by the cloud service(Cloud Service Brokerage) CSB companies. Thus, to analyze the various services, find my support legislation, security and compatibility issues, the services of the best new business through service offerings tailored to the environment, and will implement the necessary management services which brokerage (CSB) is. This study presents a brokerage(CSB) development model, and suggested policy measures that apply to the co-op that I am having difficulties in cloud services business models.

Robot Development Trend and Prospect (신 성장동력의 로봇개발 동향과 전망)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.153-158
    • /
    • 2017
  • The robot imitates humans and recognizes the external environment and judges the situation. The robot is a machine that operates autonomously. Robots are divided into manufacturing robots and service robots. Service robots are classified as professional service robots and personal service robots. Because of the intensified competition of productivity in manufacturing industries, rising safety issues, low birth rate and aging, the robots industry is emerging. Recently, the robot industry is a complex of advanced technology fields, and it is attracting attention as a new industry where innovation potential and growth potential are promising. IT, BT, and NT related elements are fused and implemented, and the ripple effect is very large. Due to changes in social structure and life patterns, social interest in life extension and health is increasing. There is much interest in the medical field. Now the artificial intelligence (AI) industry is growing rapidly. It is necessary to secure global competitiveness through strengthening cooperation between large and small companies. We must combine R&D investment capability and marketing capability, which are advantages of large corporations, and robotic technology. We need to establish a cooperative model and secure global competitiveness through M&A.

Secure Key Management Framework in USN Environment using Certificateless Public Keys (USN 환경에서 비인증서 공개키를 사용하는 보안키 관리 프레임워크)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.545-551
    • /
    • 2009
  • In this paper, we propose the secure key management framework to connect USN with different network. Although connected USN with different network has no CA (Certificate Authority), it is important to use public key based cryptography system because this network consists of numerous devices. The proposed mechanisms focus on device authentication and public/private key management without existing PKI system of IP network. To solve no CA and certificate problems, the IDC (Identity Based Cryptography) concept is adopted in our proposed mechanism. To verify the possibility of realization, we make an effort to implement the proposed mechanisms to real system. In the test bed, both USN and PLC network are connected to IP network; and proposed mechanisms are implemented to PLC and sensor devices. Through this test using the proposed mechanism, we met the similar performance with symmetric algorithms on key generation and update process. Also, we confirmed possibility of connection between different network and device authentication.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

Analysis of Key Performance Index for Advanced Logistics (물류산업의 선진화를 위한 성과지표 분석: IT서비스를 중심으로)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.25-30
    • /
    • 2013
  • In this paper, the key performance index for advanced logistics is analyzed, and the specific requirements for the material flow IT services are proposed to improve the world competitiveness of the material flow industries and to implement the advanced logistics in Korea by survey research. The key performance index is classified into three types of efficiency, sustainability and economics, and two classes of enterprise and public for IT services are proposed. In addition to, for case studies, the survey analysis for the Pyeongtaek Port is performed to diagnose the material flow enterprise and to analyze the priorities of the IT services for Port's employee, trade enterprise, public service personnel, and local resident. From the results, to improve the productivity and efficiency of the enterprise, the secure the professional man-power and standardization are needed, and the automation, u-Port, green technology and material flow security for the IT services are required.

SEAndroid Policy Protection Architecture Design and Implementation in Android (안드로이드 시스템 하에서의 SEAndroid 정책 보호 기법 설계 및 구현)

  • Yoo, Seok-man;Park, Jin-Hyung;Lee, Dong-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1105-1119
    • /
    • 2016
  • Android includes SEAndroid as a core security feature. SELinux is applied to Android OS as a SEAndroid, because there exists structural differences between Linux and Android. Since the security of SEAndroid depends on the reliable policy if the policy is tampered by the attacker, the serious security problems can be occurred. So we must protect policies which are the most important thing in SEAndoroid. In this paper, we analyze the process of SEAndroid policy updating to find out vulnerabilities and study the attack points on policy tampering. And we propose the SPPA to detect whether the policy is modified by an attacker. Moreover, we prove the performance and the effect of our proposed method on mobile device.