• Title/Summary/Keyword: 보안 시설

Search Result 459, Processing Time 0.023 seconds

A Study on Tasks for the Legal Improvement for the Governance System in Cybersecurity (사이버안보 추진체계의 제도적 개선과제 연구)

  • Park, Sangdon;Kim, Injung
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.3-10
    • /
    • 2013
  • Cyber attacks are threats to national security. Today, cybersecurity threats have various types, the theft or spread of privacy and national secret, the realization of direct attacks to infrastructure and the hacktivism with political or social objectives. Furthermore, There are special situations in South Korea because of North Korea's threats. Thus, It is necessary to handle cybersecurity as a kind of national security problem. It is a time to identify problems of governance system in cybersecurity and to improve related Acts and subordinate statutes. There are several tasks for legal improvement for governance system in cybersecurity. They are improving legal bases for the roles of the relevant authorities in cybersecurity, consolidating national joint response to cyber accidents, establishing and vitalizing information sharing system, constructing foundation of cybersecurity through industry promotion and manpower development, and acquiring defensive tools by enhancement research an development. In order to address these challenges, it is necessary to pay much attention to enactment and to revision laws and to practice legislative procedure.

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

A model for preventing the spread of infectious diseases using beacons (비콘을 활용한 감염병 확산 방지 시스템에 관한 모델)

  • Kim, Ho-Yoon;Kim, Hyo-Jong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.14-22
    • /
    • 2021
  • As the Covid-19 outbreak spreads and prolongs around the world, visitor lists are prepared in various ways when entering the facility to prevent infection and identify confirmed people. In this study, we propose an access management system using beacons to solve the problems with the preparation and management of existing visitor lists. The research method searches the laws related to the collection of personal information and compares the current status of personal information collection and trends in the beacons. The proposed system compares and analyzes existing methods and security and efficiency, which confirm accurate and rapid access registration. By using Beacon access management system, it is effective in preventing and responding to the spread of new infectious diseases in the future.

China's Hegemony (중국의 패권주의)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.81-88
    • /
    • 2020
  • China, since the early days, according to their ideology, neighboring countries and their citizens were under their sphere of power. This means that only the Hanzu are real native Chinese and the other minor ethics groups are technically immigrants. The People's republic of china, part of the chinese communist party, has had rapid economic growth after Deng Xioping took over and implemented various expansionist policies and reforms, opening china to the world. Internally, the minority ethnic groups were forcibly relocated to specific regions, prohibited from using their native languages, and their culture was absorbed or incorporated into the Hanzu culture in an attempt to internally suppress or erase them. Externally, various projects such as the 'Xia-Shang-Zhou Chronology Project', 'Origins of Chinese Civilization Project', 'Northeast Project', 'Northwest Project', and the 'Southwest Project' were implemented to spread their culture and history to neighboring countries in an attempt to expand their territory. In addition, as capitalism spreads throughout china through reforms and its expansion, it has pioneered the one belt one road aiming to secure as safe transit and raw materials, expand their military facilities, and expand their export market. By doing so, China is infringing on other countries' politics, economy, and borders, and as a result there is a need for Korea to also reexamine its policies in all fields related to china such as politics, economy, history, and culture.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

A Study on the Improvement Measures for Training of Special Security Guard (특수경비원 교육훈련의 개선방안에 관한 연구)

  • Choi, Eun-Ha;Yoo, Young-Jae;Lee, Sang-Bin
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.357-371
    • /
    • 2008
  • Currently, the security operations in nation's key foundations in Korea are performed by private police and special security guard in accordance with the Private Police Act and Security Business Act, respectively. In 1960s, The Korean Government introduced the private police system in terms of the national security issues, but it was just a hurriedly-set plan on the basis of Japanese Sunsa system as by that time there was no such system revitalized. However, the special security guards could offer wider range of security services including those of the private police with the enactment and revision of the Security Business Act 1976 and April 2001, respectively. Moreover, the expectations and interests rose over the special security guards in nation's key foundations after 9.11Terror Event in the U. S. 2001. However, as we investigated the current education/training system for the special security guard, we found that such education/training which is not activating the specialty of special security guard will not respond to the social demands. Special security guard owns its own characteristics other than those of general security guard as they are in service in nation's key foundations. Thus, the effcient management and training for the special security guard is the most important matter for the safety and security of nation's key foundations. Therefore, the well-educated special security guard through the reorganized and specialized education/training for the protection of nation's key foundations is expected to offer qualitatively improved security services.

  • PDF

A Study on Value Evaluation of Smart Intermodal-Transfer Service (복합환승센터 스마트환승정보서비스에 대한 이용자 가치 추정 연구)

  • Lim, Jung-Sil;Kim, Sung-Eun;Lee, Chunl-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.4
    • /
    • pp.19-33
    • /
    • 2012
  • Ministry of Land, Transport and Maritime Affairs prepared the method to update traffic connection system by amending "National Transport System Efficiency Act(hereinafter Act)". The key is a development of Intermodal Transfer Center. The law and guideline related with Intermodal Transfer Center requires the installation and operation of transfer information guide facility to improve user's convenience. However, there are no sufficient studies that can be used as references for the method to construct transfer support information system related with user's preference. The study performed the research about user's service satisfaction in relation with transfer support information service, which was embodied in model operation process, on the basis of transfer support information system of Intermodal Transfer Center applied to Gimpo Airport. The analysis result about service preference, importance of each supplied information, service satisfaction and consideration for service embodiment can be used as a guideline to embody the user information service of Intermodal Transfer Center. In addition, through CVM, the study estimated and proposed the service valuation of smart intermodal transfer service that provides customized information to cope with user's situation and traffic means operation status among transfer support information service. It is determined that the study will measure the benefit of Intermodal Transfer Center user by using monetary value when smart intermodal transfer service is supplied and provide the ground to expand high-tech transfer information service with high usefulness and convenience.

Burglary Prevention Effect of Target Hardening through Certified Security Products by WDQ Analysis (WDQ분석을 통한 타겟하드닝 CPTED의 침입범죄 예방효과 검증: 안산시 사례 중심으로)

  • Park, Hyeonho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.9-30
    • /
    • 2018
  • Crime prevention strategies are introduced to reduce the loss caused by crimes, and Target hardening against domestic burglary attacks is broadly accepted as one of such physical security strategies. In terms of business and home security, target hardening is one of the suite of protective measures that are included in crime prevention through environmental design(CPTED). This can include ensuring all doors and windows are sourced and fitted in such a way that they can resist forcible and surreptitious from the attack of intruder. Target hardening with certified security doors, security windows and secure locks are revealed to be much more effective to deter burglary attacks than other security devices, such as CCTV, lightings and alarms which have largely psychological and indirect impact. A pilot program of target hardening utilizing certified security window and locks was carried out in Ansan city, South Korea in 2016. This study is based on the quasi-experimental design of this program for a residential area. The researchers tried to verify the crime displacement effect of the target hardening program and the diffusion effects of crime prevention benefits by analysing the crime statistics. The evaluation utilized WDQ(Weighted Displacement Quotient) technique to analyze whether the crime displacement occurred, compared the crime statistics of the experimental area with that of buffer zone and controlled areas. The result showed that the target hardening program was significantly effective in crime prevention. The number of burglary in the experimental site with target hardening intervention reduced by 100%, although the areas without the intervention showed reduction in the burglary. The crime displacement was not found at all, and the number of burlary at the buffer zone also reduced significantly.

The Influence of Festival Service Quality on the Satisfaction and the Revisit Intention: Focused on Visitors of The Buan Masil Festival (지역축제의 서비스품질이 만족과 재방문의도에 미치는 영향 연구: 부안 마실축제를 중심으로)

  • Yoo, Hana HyunKyung;Kim, Ki Hyun;Kim, Mi Seong;Yoon, Yoo Shik
    • Korea Science and Art Forum
    • /
    • v.26
    • /
    • pp.221-230
    • /
    • 2016
  • This paper is focused on the service quality of Buan Masil Festival. The objectives of the research were to explore whether or not the service quality of local festival affects overall satisfaction and revisit intention Data were collected using self-administered questionnaires at the 4th Buan Masil Festival on May 6-8, 2015. A total of 373 valid samples were used for the analysis. The results of the study indicate that service quality of program, souvenir, and facility lead to visitors' satisfaction, and visitors' satisfaction influenced revisit intention. The results concludes with a discussion of implication for future research.

Comparative Analysis of Methodology for Improving Information Security Consulting for SMEs in Korea (중소기업 정보보호 컨설팅 개선을 위한 방법론 비교 분석)

  • Jang, Sang-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.1-6
    • /
    • 2020
  • The government is carrying out information security consulting support projects to solve the difficulties of SME information protection activities. Since the information security consulting methodology applied to SMEs does not apply the proven methodology such as the critical information and communication infrastructure(CIIP), ISMS, ISO27001, etc. It applies various methods for each consulting provider. It is difficult to respond appropriately depending on the organizational situation such as the type and size of SMEs. In order to improve such problems of SME information security consulting and to improve more effective, effective and standard methodology, the information security consulting methodology applied in the current system was compared and analyzed. Through the improvement plan for SME information security consulting method suggested in this study, it is possible to provide information security consulting suitable for all enterprises regardless of SME size or business type.