• Title/Summary/Keyword: 첨단 보안

Search Result 147, Processing Time 0.023 seconds

A Study on Development of National Examination Security Service (국가시험 보안업무의 발전적 방안연구)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.75-95
    • /
    • 2018
  • The purpose of this study is to find the development of the examination security business plan based on the problem that guards are now aware of examination security service. To achieve the purpose of this study, the interview was conducted by interviewing interviews with five field related graduates and seven field specialists who are currently engaged in the examination for more than six years. The guard who perform national examination security service proposed a development plan of national examination security services as follows. First, the security guards at the national examination must complete an education program suitable for the nature of the workplace. Second, disaster and emergency response training should be added. Third, national examination security guards should be provided with mental training, search equipment and advanced equipment. Fourth, The National Examination Security Service should be specified in the Security Law so that laws and regulations can actively respond. Fifth, the related organization (contracting party) must raise the cost of service according to reality after realizing the property. Sixth, The national security service should ensure that security guards who have completed the security guards' training will be recruited.

A Study on Extension of OSM (Open Source MANO) Architecture for Providing Virtualization Service in KREONET (첨단연구망(KREONET)에서 가상화 서비스 제공을 위한 OSM(Open Source MANO) 확장방안 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.3-9
    • /
    • 2017
  • NFV is a technology that allows network services to be controlled and managed in software by separating various net work functions (NFs) from hardware devices in dedicated network equipment and implementing them in a high-performance general-purpose server. Therefore, standardized virtualization of network functions is one of the most important factors. However, until the introduction of NFV to provide commercial services, there are many technical issues to be solved such as guaranteeing performance, stability, support for multi-vendor environment, ensuring perfect interoperability, and linking existing virtual and non-virtual resources. In this paper, we propose a method to provide an end-to-end network virtualization service based on OSM R2 in KREONET.

A Design of Risk-Based Security Threat Assessment Process for Fighter-Aircraft Airworthiness Security Certification (전투기 감항 보안 인증을 위한 위험기반 보안위협 평가 프로세스 설계)

  • Kim, Hyunju;Kang, Dongsu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.223-234
    • /
    • 2019
  • Cyber attacks are an important factor that determines the victory and defeat of Network-centric wars in which advanced weapon systems are highly interlinked. In addition the increasing dependability on software as its develop as the latest fighter is demanding enhanced security measures for fighter software to Cyber attacks. In this paper, we apply the DO-326A, which is an airworthiness security certification standard, to design a risk-based security threat assessment process by reflecting characteristics and operational environment of fighter aircraft. To do this, we add the following steps in security threat assessment stage of DO-326A's airworthiness security certification process. First, we derive security threats of fighter. And then, we scored the security threat in terms of possibility and impact on the fighter. Finally, we determine the security risk severity.

A Study on the USN Security Using Dynamic Signature Verification (동적 서명인증을 이용한 USN 보안에 관한 연구)

  • Kim, Jin-Whan;Cho, Jae-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.45-48
    • /
    • 2009
  • USN(Ubiquitous Sensor Network)은 우리가 관심이 있는 모든 사물에 통신기능이 있는 무선센서(전자태그)를 부착하고 이를 통해 사물 인식정보와 주변 환경정보(온도나 습도, 압력, 충격, 오염 등)를 탐지해 이를 실시간 네트워크를 통해 센싱 데이터들을 전송, 취합, 저장, 분석하여 사용자의 현재 상황에 정보(가정, 병원, 사무실, 유통, 군사, 교통 등)를 적절히 제공해 줄 수 있는 기술 및 첨단 지능형 서비스를 통칭한다. 향후 USN 서비스는 광범위한 영역에서 활용될 전망이며, 그에 따른 사용자 인증 보안의 중요성도 크게 부각될 것이다. 이를 위해 본 논문에서는 자필 서명을 이용한 보안기술의 USN 연동 방안을 제안하고자 한다.

  • PDF

Grid Single Sign­On Security Mechanism Using SAML (SAML을 이용한 그리드 단일 인증 보안 기법)

  • Kim, Yong-Chul;Huh, Eui-Nam;Hwang, Jun;Kim, Young-Chan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.364-366
    • /
    • 2003
  • 그리드는 고성능 컴퓨터, 대용량 데이터베이스. 각종 정보통신 첨단장비 등을 초고속 네트워크로 연동해 상호 공유하는 핵심기술과 운영체제를 말하며, 이를 효율적으로 활용하기 위해서는 자원의 특성과 사용자의 신원에 의해 제한적으로 액세스가 가능한 메커니즘과 신원이 확인된 사용자의 권한 유무를 검증할 수 있어야 한다. 따라서 사용자와 관리자 양방의 편리성과 안전성을 위해 그리드의 보안은 단일 인증 기능을 제공해야 하는데, 기존의 방식은 공개키 인증서 방식의 복잡한 알고리즘을 사용하므로 인증 시간이 오래 소요되며. 전체적으로 그리드 성능을 저하시키는 요인이 된다. 따라서 본 논문에서는 이를 해결하기 위하여 SAML을 이용한 그리드 단일 인증 보안 기법을 제안하고자 한다.

  • PDF

A Study on the Selection Interview for Army Officers (육군 간부선발 면접에 관한 고찰)

  • JaeKeak Jung
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.45-51
    • /
    • 2022
  • The interview for the selection of army officers had a lot of interview questions and topical content, so it was difficult to prepare for military officers applicants. Applicants who pass the written evaluation will be selected after passing the final interview. However, as the number of applicants is relatively decreasing due to the improvement of the treatment of the soldiers, it is expected that there will be a shortage of executives to operate advanced equipment in the future. To ensure that excellent applicants do not drop out of the final interview, we intend to provide interview-related data and suggest a unique interview direction for applicants.

Research on Secure IoT Lightweight Protocols (사물인터넷용 경량 프로토콜 비교 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • The use of Internet of Things(IoT) in smart cities and smart homes is essential. The security of the sensor nodes, which are the core of the IoT, is weak and hacking attacks are severe enough to have a fatal impact on real life. This research is conducted to improve the security of the Internet of Things by developing a lightweight secure communication protocol for the Internet of Things, and to build a safe Internet of Things environment suitable for the era of the 4th Industrial Revolution. It contributes to building a safe and convenient smart city and smart home by proposing key management and identifier development to increase the confidentiality of communication and the establishment of an Internet authentication system.

Research on Cybersecurity Risk Management System in Smart Factory Environment (스마트팩토리 환경의 사이버보안 리스크 관리 체계 연구)

  • YoungSun Shin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.4
    • /
    • pp.43-54
    • /
    • 2024
  • This study presented a cybersecurity risk management system in a smart factory environment. A smart factory refers to a factory that optimizes the production system and increases efficiency. However, this digitized environment is vulnerable to cyber attacks, and manufacturing companies can suffer serious damage from disruptions in production systems or information leaks. Therefore, a systematic approach to effectively managing cyber security risks is essential in smart factories. In this study, a continuous security risk management system for each stage of the smart factory was proposed along with business process-based security risk assessment. These studies will help to further improve cybersecurity risk management in smart factories. It will also play an important role in ensuring that smart factories operate safely and efficiently.

A Redesign of the Military Education Structure of General Universities based on Defense Innovation 4.0 -Focused on Capabilities of Tech-Intensive Junior Officers based on Advanced S&T- (국방혁신4.0 기반의 일반대학의 군사학 교육체계 재설계 방안 -첨단과학기술 기반의 기술집약형 초급 간부 역량 중심으로-)

  • Jung-Ho Eom;Keun-Seog Park;Sang-Pil Chun
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.35-44
    • /
    • 2022
  • Among the five promotion strategies of Defense Innovation 4.0(DI 4.0), the military structure/operation optimization strategy aims to innovate the military structure based on advanced science&technology(S&T), and to integrate advanced S&T in the field of defense operation such as education&training and human resource development. As the future battlefield expands to AI-based unmanned/robot combat systems, space, cyberspace, and electromagnetic fields, it is necessary to train officers with the capabilities required in these battlefields. It is necessary to develop capabilities from junior officers who will lead the future battlefield to operating core advanced power based on the 4th industrial revolution S&T. We review the education system of the military in universities and propose a method of redesigning the education system that is compatible with DI 4.0 and can develop technology-intensive capabilities based on advanced S&T. We propose a operation plan of major and extra-programs that can develop the capabilities of junior officers required for the future battlefield, and also suggest ways to support the army's practical training.

Ground Security Activities for Prevention of Aviation Terrorism -Centered on San Francisco International Airport of the U.S.A.- (항공테러방지를 위한 지상 보안활동 -미국 샌프란시스코국제공항을 중심으로-)

  • Kang, Maeng-Jin;Kang, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.2
    • /
    • pp.195-204
    • /
    • 2008
  • With the growth of airline management, as well as computer and IT security, the international trade in this modern society has been rapidly increasing, Along with the advancing, airplanes have become a universal means of communication. However, the complications associated with airplane safety have also been brought up as a result, the most concerning of which is terrorism. One of the main counterplans for preventing terrorism is Ground security activities the core of Ground security activities is absolute safety for passengers in both passenger terminal and freight terminal. Subastral security refers to physical protection, proximity control and 100% security search and freight guarding of the passengers' possessions, and the personnel's duties to perform such jobs are be! coming more crucial. On the other hand, Airport security check has bee n gradually developing since the 1960's, when hijacking began to take place. Although the airports have been providing more safe and comfortable services to their customers, terrorism is still happening today. When Ground security activities is minute, the users feel displeasure and discomfort, yet considering solely their convenience can brings problems in achieving safety. Since the 9.11 terror in 2001, the idea of improving and strengthening airport security was reinforced and a considerable amount of estate is being spent today for invention and application of new technology. Various nations, including the United States, have been improving their systems of security through public services; public police department is actively carrying out their duties in airports as well. In San Francisco International Airport, private police department is in charge of collection of data, national events, VIP protection, law enforcement, cooperation within facilities, daily-based patrol and traffic control. Under guidance and supervision of national organizations, such as TSA, general police department interprets X-Rays, operates metal detectors, checks passports or IDs and observes reactions to explosives. Under these circumstances, studies about advancement of cooperation and duties of general police department and private police department necessitated: especially about private police department and their training for searching equipments, decrease in number of turn over rate, invention of technology and prior settlement in estate for security. The privacy of the public, who make up the major population of airport passengers, must also be minimized. In the following research, the activities of police departments in San Francisco International Airport will be analyzed in order to understand recent actions of the United States on airport security.