• Title/Summary/Keyword: 정보보호 지원 정책

Search Result 141, Processing Time 0.027 seconds

The Research on Security Cognition and Management Status of Technology Outflow about Small-medium Companies in New IT Environment (신정보화 환경에서 중소기업 기술유출에 대한 인식과 관리 실태에 관한 연구)

  • Kim, Ki Ho;Ha, Kyu Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.305-312
    • /
    • 2013
  • This research suggests the security countermeasures for solving technology outflow of small-medium companies in New IT Environment through level comparison of security cognition and security management between small-medium companies and major big companies. According to analysis results, it is poor for small-medium companies' level of security cognition and security management compared with major big companies. Small-medium companies need to manage technology outflow to major big companies' level in New IT Environment. Small-medium companies has started to build New IT Environment recently and it must build the appropriate security system for small-medium companies at the same time. Small-medium company has more problem with budget and proffessionals to maintain the security of technology outflow. Therefore government has to support systematic management for the security of technology outflow to Small-medium companies

Perception differences between users and policy-makers on technology protection support system for small and medium-sized businesses (중소기업 기술보호지원제도에 대한 이용자와 정책담당자의 인식차이 분석)

  • Park, Sanghoon;Cho, Namwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.37-48
    • /
    • 2017
  • As the risk of technical leakage is increasing, technology protection support systems for small and medium-sized businesses have gained attention. This paper analyzed the perception gap of the user and policy-maker regarding technology protection support systems. First, to identify key elements of technology protection support systems and construct measurement factors, interviews with experts are conducted. Then, surveys are conducted to analyze the perception differences between the users and policy-makers. Factor analysis and ANOVA have been utilized to analyze survey results. The result shows that the perception gaps exist in the following areas: management system, cost reduction, copyright protection, customer satisfaction, leakage prevention, and awareness. To enhance the effectiveness of technology protection support systems, this paper suggests technology protection support systems should be customized in terms of the company's size and type of busines.

중소기업제품의 공공구매 종합 정보제공 DB구축

  • 한국골판지포장공업협동조합
    • Corrugated packaging logistics
    • /
    • no.62
    • /
    • pp.33-34
    • /
    • 2005
  • 정부에서는 단체수의계약제도 폐지에 따른 대책으로 중소기업제품 판로지원제도 개편과 관련하여 중소기업제품 공공구매정보망 구축에 필요한 중소기업 생산정보 등에 대한 조사를 지난 6월에 우리조합에서 실시하였다. 중소기업제품 공공구매제도란? 중소기업의 안정적인 판로 확보를 위하여 중소기업이 생산$\cdot$제공하는 물품$\cdot$용역$\cdot$공사에 대하여 정부 및 자치단체,정부투자기관 등 공공기관이 우선구매 할 수 있도록 하는 제도로써 중소기업정책 기조가 보호위주에서 경쟁중심으로 전환함에 따라 단체수의계약제도를 2006년 12월31일 폐지하고, 중소기업자간 경쟁전환시 과당경쟁에 의한 영세기업 경영애로 발생을 방지하고 중소기업자의 수주기회 확대방안 마련, 연간 80조원대의 공공기관 구매력을 중소기업 경쟁력 강화 시책에 활용하기 위하여 중소기업기술개발 제품의 우선구매 확대방안 마련키 위한 제도이다.

  • PDF

The Design and Implementation of Module supporting Trusted Channel in Secure Operating System Environment (보안운영체제 환경에서의 신뢰채널 지원을 위한 모듈의 설계 및 구현)

  • 유준석;임재덕;나재훈;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.3-12
    • /
    • 2004
  • Secure operating system is a special operating system that integrates some security functions(i.e. access control, user authentication, audit-trail and etc.) with normal operating system in order to protect system from various attacks. But it doesn't consider my security of network traffic. To guarantee the security of the whole system, network traffic must be protected by a certain way and IPsec is a representative technology for network security. However, it requires administrator's carefulness in managing security policies and the key management mechanism is very heavy as well as complicated. Moreover, it doesn't have a suitable framework for delivery of security information for access control mechanism. So we propose a simple trusted channel mechanism for secure communication between secure operating systems. It provides confidentiality md authentication for network traffic and ability to deliver security information. It is implemented at the kernellevel of IP layer and the simplicity of the mechanism can minimize the overhead of trusted channel processing.

The Relationship Between Resilience and Job Burnout of Life Support Workers Performing Care Services for the Elderly - Focusing on the Mediating Effect of Job Enthusiasm -

  • Kim, Kyung-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.137-143
    • /
    • 2022
  • Single The purpose of this study was to present theoretical and policy discussions and their implications for the relationship between the variables by reviewing the results of previous studies related to resilience, job burnout, and job enthusiasm so far, reflecting the lack of previous studies on life support workers. For this purpose, the level of perception of life support workers performing care services for the elderly was analyzed. As a result of the analysis, it was found that the resilience of life support workers affects job burnout and job enthusiasm, and job enthusiasm affects job burnout. In addition, job enthusiasm was found to have a mediating effect in the relationship between resilience and job burnout. Reflecting the results of this analysis, the necessity of management for resilience, job enthusiasm, and job burnout of life support workers was emphasized, and the limitations of the study and future research tasks were also presented.

Current status analysis for the protection of emotional workers in Pyeongtaek area (평택지역 감정노동자 보호를 위한 현황분석)

  • Jung, Hye Jung;Jung, Su Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.55-60
    • /
    • 2021
  • In order to prepare basic data for research on the protection of emotional workers in Pyeongtaek with the support of Pyeongtaek City, this study conducted a survey centered on 104 counselors classified as emotional laborers. Based on the results of the survey centered on 104 emotional workers, basic research data on the difficulties of emotional workers can be prepared, and protection methods for emotional workers who are currently interested in each local government can be found. As a result of selecting a sample centering on counselors in Pyeongtaek City for a survey on the actual condition of emotional workers, and conducting a survey based on the selected samples, it was found that emotional workers did not find their rights to human rights and were not protected even in the workplace. Currently, a bill to protect emotional workers is being announced, but it is not protected, so it is confirmed that system improvement is necessary. This study focused on 104 items that were significant through pre-processing among the recovered questionnaires. It was analyzed using SPSS, R, and it was confirmed that there is a need for a regulation that can provide an institutional device in Pyeongtaek City. In this study, it is judged that it is necessary to prepare a protective device for emotional workers by selecting more samples corresponding to the occupational group of emotional workers.

Effective Evaluation of Quality of Protection(QoP) in Wireless Network Environments (무선 네트워크 환경에서의 효과적인 Quality of Protection(QoP) 평가)

  • Kim, Hyeon-Seung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.97-106
    • /
    • 2008
  • Quality of Protection(QoP) provides a standard that can evaluate networks offering protection. Also, QoP estimates stability of the system by quantifying intensity of the security. Security should be established based on the circumstance which applied to appropriate level, and this should chose a security policy which fit to propose of network because it is not always proportioned that between stability of security mechanism which is used at network and performance which has to be supported by system. With evolving wireless networks, a variety of security services are defined for providing secure wireless network services. In this paper, we propose a new QoP model which makes up for weak points of existing QoP model to choose an appropriate security policy for wireless network. Proposed new QoP model use objectively organized HVM by Flow-based Abnormal Traffic Detection Algorithm for constructing Utility function and relative weight for constructing Total reward function.

An Extended SAML Delegation Model Based on Multi-Agent for Secure Web Services (안전한 웹서비스를 위한 멀티 에이전트 기반의 확장된 SAML 위임 모델)

  • Kim, Kyu-Il;Won, Dong-Ho;Kim, Ung-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.111-122
    • /
    • 2008
  • Web service is defined to support interoperable machine to machine interaction over a network and defined as distributed technologies. Recently in web service environment, security has become one of the most critical issues. An attacker may expose user privacy and service information without authentication. Furthermore, the users of web services must temporarily delegate some or all of their behalf. This results in the exposure of user privacy information by agents. We propose a delegation model for providing safety of web service and user privacy in ubiquitous computing environments. In order to provide safety of web service and user privacy, XML-based encryption and a digital signature mechanism need to be efficiently integrated. In this paper, we propose web service management server based on XACML, in order to manage services and policies of web service providers. For this purpose, we extend SAML to declare delegation assertions transferred to web service providers by delegation among agents.

e-Navigation 국제동향 및 대응방안 마련 연구

  • Guk, Seung-Gi;Kim, Jeong-Rok;Park, Hye-Ri;Park, Su-Hyeon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.10a
    • /
    • pp.388-390
    • /
    • 2012
  • e-navigation은 해양 환경의 보호를 증진하고 바다에서의 안전과 보안을 위한 항해 및 관련서비스를 선박의 이안에서 접안에 이르기까지 향상시키기 위해 전자적인 수단으로 선박과 해상의 해양 정보에 대해 조화로운 방법으로 수집, 통합, 교환, 표현 및 분석하는 것을 말한다. 기존 안전 확보를 위한 규제의 방식을 탈피하기 위해 사고의 원인의 많은 부분을 차지하는 인간-사용자의 실수를 사전에 방지하고 또한 사용자의 편의를 증진할 수 있는 방식을 채택하고자 사용자의 요구사항을 정리하고 그에 따른 종합적인 아키텍처를 수립하여 정책, 기술 및 이를 통한 서비스를 제공하겠다는 것이 e-navigation의 근본 목적이다. 선박의 안전 운항을 위해 현재까지 제공된 선상의 시스템이나 해상에서의 서비스를 받고 있는 많은 사용자들은 보다 효율적이고 체계적인 안전 운항과 이를 지원하는 의사결정 지원을 위해 보다 향상된 기술과 성능을 갖는 새로운 도구를 갖기를 지속적으로 원하고 있으며 관련국제기구인 국제해사기구(IMO), 국제항로표지협회(IALA), IEE, ITU 등 다양한 분야의 국제기구에서 지속적으로 논의되고 있다. 이러한 국제기구의 e-Navigation에 관한 논의에 대하여 적절한 대응, 일관성을 가진 대응을 위한 방안 마련을 제시하였다.

  • PDF

A Study on Improvement of Women's Safety in Public Places (공공장소에서의 여성 안전 개선방안 연구)

  • Kwon, Seung-Yeon
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.222-223
    • /
    • 2023
  • 본 연구는 여성 안전에 대한 다양한 정책이 시행되었지만, 공공장소에서의 여성의 안전을 위협하는 사건과 사고는 지속해서 발생하고 있다. 최근 여성 대상 범죄, 특히 성폭력 범죄가 매우 높아지면서 공공장소에서의 여성 안전에 대한 문제가 대두되고 있다. 이러한 문제를 해결하기 위해서는 여성 안전사고 발생 원인을 분석하여 그 원인을 해결할 수 있는 전략과 방안들을 개발하는 연구가 필요하며, 이를 통해 여성들이 공공장소에서 안전하게 생활할 수 있는 환경을 조성할 수 있다. 따라서 공공장소에서의 여성 안전 개선방안 연구는 매우 중요하다. 그러기 위해서는 첫째 범죄율을 분석, 공공장소에서 여성 범죄의 유형 및 발생 경로에 대해 분석하여 언제, 어디서, 어떤 유형의 범죄가 발생하는지 파악한다. 둘째 교육 및 정보 제공, 여성들에게 주변 위험 요소와 대처 방법, 보호시설 위치 등을 교육하고 정보를 제공하여 위험 상황으로부터 탈출하거나 대처할 수 있도록 한다. 셋째 시설 개선, 공공장소의 설계나 조명, 치안 등을 개선하여 여성들이 안전하게 사용할 수 있는 환경을 조성한다. 넷째 적극적인 관리, 공공장소에서 범죄가 발생하거나 이에 대한 우려가 있을 때, 적극적으로 주변 상황을 관찰하고 대처한다. 다섯 번째 커뮤니티 참여, 지역사회와 함께 여성 안전에 대한 캠페인을 전개하고, 지역주민들의 적극적인 참여와 지원을 유도하여 여성 안전의식을 확산시킨다. 이러한 방법들을 적극적으로 활용하여 여성들이 더욱 안전하고 편안한 환경에서 일상생활을 영위할 수 있는 사회적으로 안전한 여성 안전 문제에 대한 개선방안을 제시한다.

  • PDF