• Title/Summary/Keyword: 시큐리티기법

Search Result 60, Processing Time 0.026 seconds

Delay Analysis on Secure Data Communications (안전한 데이터 통신에서의 지연 분석)

  • 신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.4
    • /
    • pp.24-36
    • /
    • 1997
  • 본 논문에서는 기밀 통신 시스템에서의 지연 분석을 위해 대기 이론ㅇ르 이용하여 시큐리티와 성능사이의 tradeoff를 정량화하고, 시큐리티 메커니즘과 프로토콜에 의해 야기된 지연을 줄이기 위한 최적화기법으로 전처리, 메시지의 분할과 압축, 압축과 암호의 통합, 사용자 인증과 접근 제어의 통합을 고려한다. 그리고, 시큐리티 서비스를 제공하기 위한 시큐리티 메커니즘으로 DES를 이용한 경우, RAS 의 디지털 서명, IDEA와 RSA의 결합을 고려하고, 각각에 대해 대개 이론의 M/M/1모델, M/E/1모델, M/H/1 모델을 적용하여 컴퓨터 시뮬레이션을 통해 평균 지연을 분석한다.

User Plane Security Services for ATM networks (ATM 망을 위한 사용자 평면 시큐리티 서비스)

  • 이재근;신상욱;이경현
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 1998.04a
    • /
    • pp.234-239
    • /
    • 1998
  • 본 논문에서는 ATM 네트워크 상에서의 발생 가능한 위협 요소들을 확인하고, 이러한 위협 요소들로부터 정보를 보호하기 위해 적용해야 할 시큐리티 서비스들을 기술하고 ATM 사용자 평면(User Plane)에서의 시큐리티 서비스 모델을 제안한 후, RSA, Rabin, ElGamal, IDEA 등 다양한 암호 알고리즘들의 컴퓨터 시뮬레이션을 통해 알고리즘간의 성능을 비교 분석한다. 또한 ATM 네트워크에서 기제안된 기법들보다 좀더 효율적인 세션 키 교환 기법을 제안한다.

  • PDF

The study of relationship of Security Service Company's Market Orientation and Business Performance (시큐리티기업의 시장지향성과 경영성과의 관계 연구)

  • Park, Ki-Beom
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.109-129
    • /
    • 2008
  • The purpose of this study is to analyze the relationship of market orientation, and business performance in the security firms. To achieve the goal of the study, it has used various methods to study. First of all, it has carried out documentary surveys through literatures review on market orientation and business performance of the security firms, and practical researches side by side. In the documentary surveys, it has developed the framework of study and questionnaires based on the domestic and foreign books, theses, materials of public institutions, and other materials. In the practical researches, basing on the selected study models and hypotheses, it has selected 15 security companies which are located in Seoul, Gyeonggi and Chungcheong Provinces with the stratified cluster random sampling method. It has polled the employees of the security companies for about 2 months from 5 August to 10 October 2006, distributing 20$\sim$50 pieces per company. It has distributed 600 pieces and used 565 pieces for analysis excepting unfaithful 35 pieces. The collected questionnaires were analyzed by SPSSWIN 14.0 program. and The methods to analyze the materials were factor analysis, reliability analysis, correlation analysis, multiple regression analysis, and path analysis through regression analysis. The results obtained from the study using analysis methods above are as follows. Finally, market orientation influences on business performance. In other words, the higher market orientation is, the better financial and non financial outcomes are.

  • PDF

Analysis of the Views on Leisure of Security Agents (시큐리티 요원의 여가관 분석)

  • Kim, Kyong-Sik;Kim, Chan-Sun;Lee, Kwang-Lyeol;Kim, Pyung-Su
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.388-399
    • /
    • 2009
  • This study is to analyze the views on leisure of security agents. As the subject of this study, the security agents holding office in the capital area in 2008 were selected and total 333 samples are drawn among them by using judgement sampling method. The validity of the questionnaire was verified through an expert group meeting. The statistical method is $x^2$ verification(Chi-Square Tests) using SPSSWIN 16.0. Following results are from the methods mentioned above. First, most of the security agents consider leisure as “rest" and they need it for “stress release". About the importance of work and leisure, the security agents mostly think “both work and leisure are important" and they regard leisure as a “very important" matter for an individual. Second, main leisure activities of the security agents are principally “social activities", while the frequency is “2 or 3 times a month", the time is “1-2 hours", and the period is “4-7 years" in general.

The Relationship between Security Industry, Crime Occurrence and Arrest (시큐리티산업과 범죄 발생 및 검거의 관계)

  • Joo, Il-Yeob;Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.487-505
    • /
    • 2007
  • This study is to examine relations between the number of occurrence of big five critical crimes that consist of homicide, robbery, rape, theft, violence and the number of the security companies and the security guards, and between the number of the security companies, the security guards and the number of arrests from the big five critical crimes. To achieve this objective, this research selects a subject of study, the number of the security companies and security guards, and the number of occurrences of the big five critical crimes and arrests of the big five crimes from 1990 to 2005. The selected data are then analyzed according to the variables using SPSS 12.0. Each hypothesis is verified with the level of significance ${\alpha}$=.05 using the statistical techniques such as Correlation Analysis, Regression Analysis, etc. The following is the result of the study: First, the number of occurrences of the big five critical crimes affects the number of the security companies at a significant level. Second, the number of the security companies affects the number of arrests of the big five crime at a significant level.

  • PDF

The Effects of Customer Aggression on the Job Stress and Emotional Burnout of Security Guards in Casino (카지노 고객의 공격성이 시큐리티 종사자의 직무스트레스 및 소진에 미치는 영향)

  • Chun, Yong-Tae
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.87-107
    • /
    • 2010
  • The purpose of this study is to examine the effects of customer aggression on the job stress and emotional burnout of security guards in casino. Investigating tools used questionnaire, the sampling was drawn from security guards at 6 casinos which had more than 30 security guards. To this study, the partisans of the study were 269 people. Data for creation for questionnaire is completely computed processing and using SPSS 15.0 Windows that is social studies scholastic mantle command program after imputed encoding according to each purpose. Analyzing techniques to use for analysis of data enforced technology figure analysis, factor analysis, reliability analysis, t-test, one-way ANOVA, multiple regression analysis. Through data analysis by such method and procedure, conclusion that gets in this research is as following. First, exposure that is difference that keep in mind partially as result that verify difference of aggression according to demographical features, job stress and emotional burnout that is security guard's in casino. Second, exposure that is difference that keep in mind as statistical as result that verify effect that customer aggression gets in job stress of security guards in casino. Third, exposure that is difference that keep in mind as statistical as result that verify effect that customer aggression gets in emotional burnout of security guards in casino.

  • PDF

A study on intrusion detection performance improvement through imbalanced data processing (불균형 데이터 처리를 통한 침입탐지 성능향상에 관한 연구)

  • Jung, Il Ok;Ji, Jae-Won;Lee, Gyu-Hwan;Kim, Myo-Jeong
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.57-66
    • /
    • 2021
  • As the detection performance using deep learning and machine learning of the intrusion detection field has been verified, the cases of using it are increasing day by day. However, it is difficult to collect the data required for learning, and it is difficult to apply the machine learning performance to reality due to the imbalance of the collected data. Therefore, in this paper, A mixed sampling technique using t-SNE visualization for imbalanced data processing is proposed as a solution to this problem. To do this, separate fields according to characteristics for intrusion detection events, including payload. Extracts TF-IDF-based features for separated fields. After applying the mixed sampling technique based on the extracted features, a data set optimized for intrusion detection with imbalanced data is obtained through data visualization using t-SNE. Nine sampling techniques were applied through the open intrusion detection dataset CSIC2012, and it was verified that the proposed sampling technique improves detection performance through F-score and G-mean evaluation indicators.

An Evaluation of the Private Security Industry Regulations in Queensland : A Critique (호주 민간시큐리티 산업의 비판적 고찰 : 퀸즐랜드주를 중심으로)

  • Kim, Dae-Woon;Jung, Yook-Sang
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.7-35
    • /
    • 2015
  • The objective of this article is to inform and document the contemporary development of the private security industry in Queensland Australia, a premier holiday destination that provide entertainment for the larger region. The purpose of this review is to examine the comtemporary development of mandated licensing regimes regulating the industry, and the necessary reform agenda. The overall aim is threefold: first, to chart the main outcomes of the two-wave of reforms since the mid-'90s; second, to examine the effectiveness of changes in modes of regulation; and third, to identify the criteria that can be considered a best practice based on Button(2012) and Prenzler and Sarre's(2014) criteria. The survey of the Queensland regulatory regime has demonstrated that, despite the federal-guided reforms, there remain key areas where further initiatives remain pending, markedly case-by-case utilisation of more proactive strategies such as on-site alcohol/drug testing, psychological evaluations, and checks on close associates; lack of binding training arrangement for technical services providers; and targeted auditing of licensed premises and the vicinity of venues by the Office of Fair Trading, a licensing authority. The study has highlighted the need for more determined responses and active engagements in these priority areas. This study of the development of the licensing regimes in Queensland Australia provides useful insights for other jurisdictions including South Korea on how to better manage licensing system, including the measures required to assure an adequate level of professional competence in the industry. It should be noted that implementing a consistency in delivery mode and assessment in training was the strategic imperative for the Australian authority to intervene in the industry as part of stimulating police-private partnerships. Of particular note, competency elements have conventionally been given a low priority in South Korea, as exemplified through the lack of government-sponsored certificate; this is an area South Korean policymakers must assume an active role in implementing accredited scheme, via consulting transnational templates, including Australian qualifications framework.

  • PDF

Study on the Efficient Operation of Private Security Guarding System (한국 민간경호시스템의 효율적 운영방안)

  • Kim, Tae-Min;Kim, Dong-Je
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.117-147
    • /
    • 2006
  • This study aims to propose efficient way to operate the security guarding system from the perspective of administration, policy, law, institution and operation as to the private security guarding system as the Korean security guarding system needs multifaced analysis and measure to ensure efficient operation. The growth strategy has to be restructured and segmentation market needs to be driven in order to cope with the changing conditions of company from the perspective of administration. And private security guarding service companies must refrain from excessive competition while improving the contracting method such as minimum price bidding, etc. From the perspective of policy, the functions of relevant organizations such as the National Police Agency, security association, etc, and mutual cooperation must expand. Also, the profit generation event needs to be privatized and the more positive perception toward the private security guarding service is necessary. In addition, security exhibition and seminar can be expanded to lay the groundwork for the advancement of private security system. From the legal and institutional perspective, the security guarding service related law must be revised and the certification system must b introduced to cope with the changing requirement. The security guarding instructor system must be strengthened to ensure a faithful and earnest implementation of duty to instruct, supervise and educate security guarding personnel. From the perspective of security guarding system's operation, professional security technique must be introduced and applied, and the volunteer application system must be established. In addition, standard 'security guarding manual' must be crafted, and the equipment for security guarding must be modernized to ensure an efficient operation of private security guarding services.

  • PDF

시큐어 소프트웨어 개발을 위한 위협 모델링 기법의 기술 동향

  • Lee, Jeanho;Lee, Hyuk;Kang, Inhye
    • Review of KIISC
    • /
    • v.25 no.1
    • /
    • pp.32-38
    • /
    • 2015
  • 소프트웨어의 보안속성이 중요해짐에 따라 소프트웨어의 개발 단계에서 설계상의 보안약점이나 구현 단계에서의 보안약점을 제거하는 작업이 강조되고 있다. 시큐어 소프트웨어를 개발하기 위해 제안된 마이크로소프트사의 위협 모델링 기법은 마이크로소프트사가 자체적으로 개발한 시큐리티 소프트웨어 개발 생명 주기(MS SDL, Security Software Development Lifecycle) 전반에 걸쳐 하나의 방법론으로 적용되고 있으며, 다른 유사한 위협 모델 기법들도 연구되고 있다. 본 논문에서는 위협 모델링 기법들에 대해 살펴보고, MS 위협 모델링 기법을 기반으로 인터넷 웹사이트 개발에 적용하여 MS 위협 모델링 기법의 분석 결과를 살펴본다.