• Title/Summary/Keyword: 정보보호산업

Search Result 1,293, Processing Time 0.033 seconds

해외 정보 - 상존하는 원전 사이버 공격 가능성

  • 한국원자력산업회의
    • Nuclear industry
    • /
    • v.36 no.11
    • /
    • pp.45-52
    • /
    • 2016
  • 사이버 공격으로부터 원자력 시설을 보호하기 위해 동원되는 갖가지 안전 대책을 다루고 있는 문건은 상당히 많다. 스파이 소설에 나오는 것 같은 사이버 보안상의 공격과 그 방어 전략에 대한 관련 기관들의 검토도 끊임없이 지속되고 있다. 그러나 이제는 원전사업체들도 발생이 가능한 모든 복합적인 위협은 물론 직접적인 사이버 공격을 고려해서 자체적인 대비책을 강구할 필요가 있다.

  • PDF

The Application for the Protection System of Location-based Information on a Smart-phone Environment (스마트폰 환경에서 개인위치정보 보호시스템 응용방안)

  • Kim, In-Jai;Choi, Jae-Won;Kim, Woon-Yoeng
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.3
    • /
    • pp.129-147
    • /
    • 2012
  • In this paper, we research on the personal information protection system in smart-phone based on mobile environment. This paper proposes the enhanced personal location privacy mechanism in location-based service environment of a smart phone operating system(iOS, Android) for the relevant regulations on location-based protection and utilization. Also, the result verified that possibility on a self-control mechanism of the personal information protection system's subject in the window platform throughout the experiment. Therefore, this study have drew a method that user positively can cope with a protection of personal location information by having a user's self-control method in the system under development or done by illegal location-based service providers and illegal application developer.

Privacy Protection and Non-repudiation Mechanisms for Parcel Service (프라이버시 보호 및 부인방지를 제공하는 택배 시스템 제안)

  • Choi, Min Seok;Cho, Kwantae;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1283-1292
    • /
    • 2012
  • As delivery services market has grown the damage cases are also continuously increased. When using delivery services, Customers would not be compensated in any way. Perhaps worse, losing a cargo would create a great deal of trouble. Because the lack of evidence, they takes a lot of time to clarify who is responsible. To prevent these things, we must create, collect, maintain and confirm. In this paper, we introduce new delivery system with a trusted third party for non-repudiation services. Moreover, in damage case, we show that the proposed system is efficient and provide non-repudiation. Using sending and receiving codes, the proposed system identifies a responsible subject with quickness and clearness.

Information security auditing Framework in Industrial control system (산업제어시스템 정보보안 감리 프레임워크 연구)

  • Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.139-148
    • /
    • 2008
  • Information technology have led to change the automation of large industrial control system as well as business system and environments. Industrial control system(ICS) is vital components of most nation's critical infrastructures such as electricity, natural gas, water, waste treatment, transportation and communication that are based of national security, safety of citizen and development of national economy According to the change of business environment, organizational management pushed integration all of the system include MIS and ICS. This situation led to use standard information technologies for ICS, this transition has been to expose ICS to the same vulnerabilities and threats that plague business system. Recently government obliged owners of the public information system to audit for safety, efficiency and effectiveness, and also obliged the owners of national infrastructure to improve their system security as a result of vulnerability analysis. But there doesn't prepare a security architecture and information security auditing framework of ICS fur auditing. In this paper, I suggested the security architecture and information security auditing framework for ICS in order to prepare the base of industrial system security auditing.

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.

Research on the Cyber Security Cluster (사이버보안 클러스터 구축 연구)

  • Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.355-357
    • /
    • 2016
  • Korea Information Security Industry growth rate (7.1%) declined compared to the previous three years growth (15%). The government has announced a 2020 K-ICT security. According to the policy of promoting the competitiveness of industry consolidation and data protection enable entrepreneurship, job creation, there is a need for the ICT industry in conjunction with cyber security cluster composition. In this paper, I research for cybersecurity cluster. Investigate a successful cyber clusters of foreign and analyzed. In addition, I analysis of existing cluster in the domestic and identify the problem. Consequently, building a cyber-research cluster and the expected effects of cyber-research and on how to operate the cluster.

  • PDF

Development Strategy of Biometrics Industry (생체인식산업 발전전략)

  • 박성욱;김현종;이현우;고성혁
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.754-757
    • /
    • 2002
  • We live in a world of the internet industrial revolution. In this revolutionary period individual identification is a major problem. This Paper observes present conditions and it presents a development strategy.

  • PDF

A Study on Applications of Healthcare & Medicine Information Protection for Cloud-Based Precision Medicine (클라우드 기반 안전한 정밀의료 실현을 위한 보건의료정보 보호 적용 방안에 관한 연구)

  • Dong-Won Kim
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.69-77
    • /
    • 2022
  • Globally, the medical field is growing very fast with technology development and convergence with ICT technology, and Precision Medicine using personal health information, genetic information, and clinical information is growing into a next-generation medical industry. Since Precision Medicine deals with individual health and life, the issues of personal information protection and health and medical information protection are emerging.Accordingly, this paper presents security improvements by domestic and foreign standards, laws, and systems in the cloud and medical field, and proposes a plan to protect healthcare and medicine information protection for safe Precision Medicine.

The Effects of Infection Prevention Education Program on Infection Prevention Knowledge and Attitude to Nursing Caregiver Students (감염예방 교육프로그램이 요양보호사 교육생의 감염예방지식 및 태도에 미치는 효과)

  • Ryu, Bog-Mi;Ryu, Seong-Mi
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.167-177
    • /
    • 2010
  • It is really important that trained professional care givers service pursuer for long tenn care insurance in Korea. This study was done to evaluate the infection prevention knowledge and attitude on nursing caregiver students with one group pre test-post test to compare on the education program. The data was collected by standardized self-administered questionnaire with a total of 128 nursing caregiver students in G city. The data was analyzed using the SPSS WIN 10.0 program such as t-test. The knowledge of infection prevention was significantly increased on pre-education and post-education of Infection Prevention Education Program. It is necessary for continuous education to maintain quality of nursing and improve the knowledge of infection prevention and program development on nursing caregiver.

Priority of the Government Policy to support Industrial Security - Focus on a companies' demand and efficiency of policy - (산업보안 지원 정책 결정의 우선 순위 - 기업 수요와 효율성을 중심으로 -)

  • Kim, Chang-Ho;Yu, Jai-Hwan
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.155-178
    • /
    • 2015
  • This study surveyed the subject of companies' industrial security on priorities of the government policy for the confidentiality of corporate and the necessity of expanding the government support for the industrial security. In determining the priority, we should consider all opinions of companies, individuals, societies, and governments that associated with the confidentiality. Especially in industrial security, companies are the most significant beneficiaries and consumers of security policy and it would be the basis for supporting on policy-making. As a result, we analyzed the 50 valid questionnaires collected from security personnel of Korean corporations and 'Enhance support for education and promotion of human resource (On/Off-Line)', 'Establish Security management and Security measures', and 'Enhance Security professionals status via qualifications/certifications' are shown as 1st, 2nd, 3rd priority of government policy to protect Corporate confidential information including its customer information. All respondents of the study says that the Government support for Industrial Security should be enlarged.

  • PDF