• Title/Summary/Keyword: 상황인지 보안 구조

Search Result 126, Processing Time 0.022 seconds

The effects of the operation of an information security management system on the performance of information security (정보보호 관리체계의 지속적인 정보보호 관리과정(PDCA)이 정보보호 성과에 미치는 영향에 관한 실증 연구)

  • Jang, Sang-Soo;Lee, Sang-Joon;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1123-1132
    • /
    • 2012
  • Many domestic organizations are introducing and operating various information security management systems capable of coping with technical, administrative, and legal issues comprehensively and systematically, in order to prevent various infringement incidents such as personal information disclosure and hacking preemptively and actively. However, empirical analyses regarding the extent to which an information security management system contributes to information security performance have not been fully conducted, even though enterprises and organizations are actively introducing such systems in order to achieve their information security objectives as a part of their organizational management activities in line with their respective business, by investing considerable effort and resources in developing and operating these systems. This approach can be used to apply, develop, and operate the information management system actively within an organization. this study focused on analyzing how each specific phase of the information security management system affects information security performance, compared with previous studies, which generally focus on the information security control item in analyzing information security performance. The information security management system was analyzed empirically to determine how the Security PCDA cycling model affects information security performance.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Direction of Arms Control to Establish Foundation for Peaceful Reunification in Korean Peninsula (한반도 평화통일 기반구축을 위한 군비통제 추진방향)

  • Kim, Jae Chul
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.79-92
    • /
    • 2015
  • It is required to expand area of inter-Korean economic cooperation, being limited to non-military field, to military field and then, to positively promote arms control in order to establish foundation for peaceful reunification in Korean peninsula. Reasons why arms control has not been promoted between South and North Korea in the meantime were such original factors as follows; (1) limit of confidence building between the South and the North, (2) functional limit of arms control itself, (3) institutional structural limit between the South and the North, (4) environmental limit at home and abroad. It is necessary to get out from existing frame and to seek a new paradigm in order to overcome above factors and to realize arms control between the South and the North. First, it is required to have prior political dialog at the South-North high-level talks in order to promote arms control and to exercise 'strategic flexibility' during negotiation and promotion process. For this, 'flexible reciprocity' has to be adopted in compliance with situation and conditions. Second, it is necessary to get out from existing principle of 'confidence building in advance and arms reduction later' but to seek the 'simultaneous driving principle of confidence building and arms reduction' as an eclectic approach. Namely, based on reasonable sufficiency, it is required to promote military confidence building and limited arms reduction in parallel, which is a lower level of arms control. Third, as an advisory body of Prime Minister's Office, it is necessary to install an organization exclusively responsible for arms control and to positively handle arms control issue from the standpoint of national policy strategy. If the South-North high-level talks take place, it is necessary to organize and operate 'South-North Joint Arms Control Promotion Board (tentative name)'. Fourth, it is required to exercise more active diplomatic competence in order to create national consensus on necessity of arms control for peaceful reunification and to form more favorable international environment. Especially, it is necessary to think about how to solve nuclear issue of North Korea together in collaboration with international society and how to maintain balance between ROK-US alliance and Sino-Korean cooperation relations.

The Research of Storage Capacity & Sedimentation of Reservoirs in HONAM Province (호남지방에 저수지의 매몰상황과 저수량에 관한 조사연구(농학계))

  • 이창구
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.13 no.2
    • /
    • pp.2262-2275
    • /
    • 1971
  • Fourteenes rervoirs maintained by the local land improvement associations in the province of Chullabuk-Do and 20 reservoir maintained by thos in the province of Chullanam-Do, were surveyed in connection with a correction between storage capacity and sediment deposit. In addition to this survey, 3,347 of small reservoir, that lie scattered around in the above-mentioned two provinces were investigated by using existing two provinces were investigated by using existing records pertaining to storage capacity in the office of City and country, respectively. According to this investigation the following comclusions are derived. 1. A sediment deposition rate is high, being about $10.63m^3/ha$ of drainage area, and resulting in the average decreasc of storage capaity by 27.5%. This high rate of deposition coule be mainly attributed to the serve denudation of forests due to disorderly cuttings of trees. Easpecially, in small reservoir, an original average design storage depth of 197mm in irrigation water depth is decreased to about 140mm. 2. An average unit storage depth of 325.6mm as the time of initial construction is decreased to 226mm at present. This phenomena causes a greater shortage irrigation water, since it was assumed that original storage quantity was already in short. 3. Generally speaking, seepage rates through dam abutment intakepipe, etc, are high due to insufficient maintenance and management of reservoir. 4. It is recommended that sediment deposit should be dredged when a reservoir is dry in drought. 5. Farmers usually waste excessive irrigation water. 6. Water saving methods should be practiced by applying only necessary water for growing stage of rice. 7. In are as where water defficiency for irrigation is severe, a soil moisture content should be kept at about 70% by applying water once in several days. 8. Tube wells should be provided so as to exploit ground water and subsurface current below stream bed as much as possible. 9. If an intake weir was constructed, a water collection well should be built for the use in drought. 10. Water conservation should be forced by converting devastated forests contained in the drainage area of reservoir to protected forests so as to take priority of yrefor estation, gully control, the prohibition of disorderly cutting of trees, etc. 11. Collective rice nurseries should be adopted, and it should be recommended that irrigation water for rice nurseries is supplied by farmer themselves. 12. Sediment desposit in reservoir should be thoroughly dreged so as to secure a original design storage capacity. 13. The structure of overflow weir should be automatic so as to freely control flood level and not to increase dam height.

  • PDF

A Case Study - IT Outsourcing of the Korea Development Bank (산업은행: 금융 IT 아웃소싱 - 공동협력으로 안전한 문을 연다)

  • Kang, Ju-Young;Lee, Jae-Kyu
    • Information Systems Review
    • /
    • v.7 no.2
    • /
    • pp.229-255
    • /
    • 2005
  • The Korea Development Bank promoted a total outsourcing for IT operation in 1999 for the first time in the banking industry. The Korea Development Bank became the center of public attention because the most banks were unwilling to take an outsourcing with external sources for the reason of financial operation accidents, securities, and threats of strikes. After the introduction of the total IT outsourcing, the Korea Development Bank has continuously diagnosed the problems of the IT outsourcing and adopted various proper complements for the enhancement of the IT outsourcing. As the result of the enhancement, the IT outsourcing of the Korea Development Bank marched into the joint liability operation period after going through the outsourcing operation period and the co-operation period. The joint liability operation which is the most leading outsourcing system which is adopted by the Korea Development Bank for the first time in the banking industry. Through the joint liability operation, the Korea Development Bank could accept the most up-to-date IT, concentrate internal manpower on the core capability, and secure flexibility of manpower. Also, the bank changed the relationship between the bank and the external sources from the one-sided relationship between a producers and a consumer to the joint liability relationship on which both sides are responsible for the operation, and could integrate the internal capacity with the professional know-how of the external IT outsourcing company. In this paper, we testified the soundness and validity for the worries of banks about the total IT outsourcing with external sources. And, we arranged the advantages and outcomes of the total IT outsourcing with external sources compared to the IT outsourcing with internal sources. Moreover, we expect that we can improve the closed financial IT outsourcing industry structure and raise the world competitive power of domestic IT outsourcing companies by correcting wrong ideas on the IT outsourcing with external sources.

A Study on Reorganization of System of Assistant Police Officer (치안보조인력 제도의 개편에 관한 연구)

  • Kim, Moon-Kwi
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.255-276
    • /
    • 2020
  • The mandatory police system, which plays a pivotal role in securing security and securing social safety as a security assistant, is expected to face difficulties in supplying the mandatory police manpower and securing absolute police manpower in the future according to the Ministry of Defense's abolition of the conversion service system. In this situation, this study intends to provide a concrete plan to replace the mandatory police officers as security assistants, recruiting contractors from civilians who are not military service resources or regular police officers, and using them for security assistance. More ultimately, this study goes beyond securing obligatory police to reduce or abolish mandatory police, which has been dealt with in previous studies. It aims to present the rescue and operation directions so that the police can provide quality public security services. In order to achieve the purpose of this study, this study 1) analyzes the current situation of police personnel, derives the necessity and justification of securing the police personnel or increasing the number of police personnel due to changes in security demand and security environment, and 2) After discussing the necessity and direction of reorganization, 3) deriving policy implications through analysis of foreign cases operating similar systems to derive specific plans for the introduction of security contractors for private contract workers in Korea. This study reviewed the specific operation plan and legal and institutional maintenance plan of private contract workers. In order to achieve these research objectives, this study 1) analyzes the current status of the police manpower and derives the necessity and justification of securing an absolute police manpower or increasing the manpower of the police in response to changes in security demand and security environment, and the current security aid system. 2) After discussing the necessity and orientation of reorganization of exinsting system of assistant police officer, 3) derive policy implications through analysis of foreign cases utilizing security aids similar to Korea, and 4) The specific operation plan and legal and institutional maintenance plan were presented. including security aids for private contract workers in Korea, from recruitment procedures to activities.