• Title/Summary/Keyword: 시큐리티시스템

Search Result 160, Processing Time 0.023 seconds

State of the Japanese Security Industry and Its Implications for Korea (일본 시큐리티산업 현황과 한국의 시사점)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.75-84
    • /
    • 2013
  • In Japan, the Security Equipment Association takes the initiative in standardization, the preparation of installation standards and the management of the qualification system. This association is joined by electronic security companies, manufacturers and installers and makes research in security equipment, security alarm system and information security system. But, the Korea Security Association takes the initiative in the security industry in accordance with the security business act, but few electronic security companies that are the hub of the security market have joined the association yet. Currently, there is no organization in which electronic security companies, security equipment manufacturers and installers can participate together, and it's not possible for all the parties concerned to make a concerted effort for the development of security equipment under the circumstances.

Analysis of Jini 2.0 Security for Home Network (홈네트워크를 위한 Jini 2.0 Security 분석)

  • 이윤경;한종욱;김도우;주홍일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.717-720
    • /
    • 2004
  • Jini is a middle ware supposed in Sun Microsystems. The goal of lil is the establishment of dynamic distributed system, which can share information and control of other Jini technology-enabled services or devices in the same Jini system. Jini is one of the best middleware together UPnP and HAVi. Hone network security, soch as privacy protection, crime prevention, and etc, is very important. So Jini 2.0 adds security mechanism in 11. 2003. This paper describes the analysis of Jini 2.0 security mechanism, and home network security.

  • PDF

프린팅 월드 - 일본 인쇄산업의 방향성과 사례연구

  • Kim, Sang-Ho
    • 프린팅코리아
    • /
    • v.13 no.10
    • /
    • pp.132-135
    • /
    • 2014
  • 성숙기에 접어든 인쇄산업은 인쇄기술 향상으로 생산설비의 성능차이가 거의 없어진 가운데 가격과 빠른 납기만이 차별의 수단이 되고 있다. 이런 가운데 가격경쟁은 인쇄사의 수익성 악화로 이어지고 있다. 이를 타개하기 위해 인쇄사들이 전문분야를 중심으로 분업화하거나 품질 보증을 비롯한 시큐리티 시스템을 구축해야 한다는 목소리가 커지고 있다.

  • PDF

A Study on Security Threat Elements Analysis and Security Architecture in Satellite Communication Network (위성 통신망 보안 위협요소 분석 및 보안망 구조에 관한 연구)

  • 손태식;최홍민;채송화;서정택;유승화;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.15-31
    • /
    • 2001
  • In this paper we classify security threat elements of satellite communication into four parts; Level-0(satellite propagation signal), Level-1(satellite control data), Level-2(satellite application data) and ground network security level according to the personality and data of the satellite communication network. And we analyze each security levels. Using analyzed security threat elements, we divide security requirements into signal security level and information security level separately. And then above the existent signal security level countermeasure, we establish the countermeasure on the basis of information security policy such as satellite network security policy, satellite system security policy and satellite data security policy in information security level. In this paper we propose secure satellite communication network through the countermeasure based on information security policy.

The Study on the Measure to Improve the Event Place Guarding Operation System (행사장경호 운용시스템 개선방안에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.203-226
    • /
    • 2006
  • A highly sophisticated expertise and systematic and integrated management of security operation are essential for a crowded stadium. a special object of security guarding. Nonetheless, the recent incident in a singing concert hall reveals the overall problem like the lacking safety management system. lacking deployment of professional security personnel, absence of safety manuals and safety measures, as well as the lack of professionalism of private sector security companies. In this study, we presented three categories that needed improvement, like the legal and institutional improvement, improvement of policy and improvement of operation which are required to set up the model to operate the optimal private sector security duties. For the revision of law and institution for a better and more desirable method, we discussed the revision of related laws and regulations pursuant to the security operation at places where events are held, including the revision of law on security guarding work, regulation on common housing management, uniformity of security guarding, and law on performance. For the improvement of policies, we discussed the introduction of security consultants, strengthening the security instructor system, expansion of relevant organizations, establishment of mutual cooperation, privatization of profitable events, improvement of awareness about the security activities provided by private sector, policy for the professionalism of private security operation, expansion of security exhibition and seminar. For the improvement of operation. we discussed professional security techniques. such as the technique of security consulting, the application of CPTED technique, the technique for the integration of system, the method of operation, the establishment of a system to support public security operations and volunteers, establishment of a manual for security guarding performance, modernization and high tech-oriented equipment, organization of security guarding entity in which the industry, academic society and government participates together.

  • PDF

Improve utilization of Drone for Private Security (Drone의 민간 시큐리티 활용성 제고)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.25-32
    • /
    • 2016
  • Drone refers to an unmanned flying system according to the remote control. That is a remote control systems on the ground or a system that automatically or semi auto-piloted system without pilot on board. Drones have been used and developed before for military purposes. However there are currently utilized in a variety of areas such as logistics and distribution of relief supplies disaster areas, wireless Internet connection, TV, video shooting and disaster observation, tracking criminals etc. Especially it can be actively used in activities such as search or the structure of the disaster site, and may be able to detect the movement of people and an attacker using an infrared camera at night. Drones are very effective for private security.

A Proposal of Mobile Agent System Implementation Stack (이동 에이전트 시스템 구현 스택의 제안)

  • Shin, Jung-Hwa;Shin, Won;Lee, Kyung-Hyun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.56-59
    • /
    • 2001
  • 본 논문에서는 이동 에이전트 시스템의 특징을 살펴보고, 현재 다양한 네트워크 기술에 응용되고 있는 Java 기술을 적용한 이동 에이전트 시스템을 비교·분석하였다. 이를 기반으로 안전한 이동 에이전트 시스템 구현을 위한 이동 에이전트 시스템 구현 스택(MASIS)을 제안하고 각 계층별 시큐리티 요구사항에 대하여 논의한다.

  • PDF

The Brainwave Analyzer of Server System Applied Security Functions (보안기능을 강화한 뇌파 분석 서버시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon;Kim, Gui-jung
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.343-349
    • /
    • 2018
  • Electroencephalograph(EEG) information, which is an important data of brain science, reflects various levels of information from the molecular level to the behavior and cognitive stages, and the explosively amplified information is provided at each stage. Therefore, EEG information is an intrinsic privacy area of an individual, which is important information to be protected. In this paper, we apply spring security to web based system of spring MVC (Model, View, Control) framework to build independent and lightweight server system with powerful security system. Through the proposal of the platform type EEG analysis system which enhances the security function, the web service security of the EEG information is enhanced and the privacy of the EEG information can be protected.

A Basic Study on the Development of Network Security Equipment to Support MASS Operation in Digital Maritime-Communication System Environment (디지털 해상통신시스템 환경에서 자율운항선박 운용 지원을 위한 네트워크 보안장비 개발 기초연구)

  • Yunja Yoo;Sang-Won Park;Jin-Hyuk Jung;David Kwak
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2021.11a
    • /
    • pp.72-73
    • /
    • 2021
  • As discussions of the International Maritime Organization for the introduction of the Marine Autonomous Surface Ship (MASS) began in earnest, discussions were conducted to prioritize cybersecurity (Cyber Risk Management) when developing a system to support MASS operation at the 27th ENAV Committee Working Group (WG2). Korea launched a technology development project for autonomous ships in 2020, and has been promoting detailed tasks for cybersecurity technology development since 2021. MASS operation in a digital maritime communication system environment requires network security of various digital equipment that was not considered in the existing maritime communication environment. This study introduces the basic concept of network security equipment to support MASS operation in the detailed task of cybersecurity technology development, and defines the network security equipment interface for MASS ship application in the basic stage.

  • PDF

Security System to use Bluetooth Communication for Home Automation (Bluetooth 통신을 이용한 홈 오토메이션 보안 시스템)

  • Jung, Yun-Hwa;Yoon, Joo-Dae;Ahn, Gwang-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.889-891
    • /
    • 2005
  • 본 논문에서는 주거생활의 안전을 위해 암호화 코드를 포함한 홈 서버를 설계하고, 블루투스 통신을 이용하여 암호화 코드를 송수신하는 시스템을 구현하였다. 제안한 홈 시큐리티 시스템은 적외선 통신이나 무선랜 등 다양한 인터페이스를 활용할 수 있다는 종점을 가진다. 이와 더불어 제안된 보안 시스템은 건물이나 공장, 자동차 등에서도 적용가능하다. 본 논문에서는 홈 오토메이션을 위한 DES 암호화 알고리즘 기반의 디지털 도어 락 시스템을 제안한다. 암호화 코드를 이용하는 보안 시스템을 구성하면 높은 수준의 보안성을 얻을 수 있고, 키의 분배가 용이하다. 제안하는 보안 시스템은 스마트 폰을 키로 이용함으로써 사용자 편이성을 증대시켰다.

  • PDF