• Title/Summary/Keyword: Border Security

Search Result 121, Processing Time 0.024 seconds

A Comparative Study on ACH and Fedwire as a Cross-Border Payment System (국제전자결제시스템으로서 ACH와 Fedwire의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.139-154
    • /
    • 2008
  • This research want to discuss some issues about payment system of America. This research focuses on comparing ACH with Fedwire. Firstly Fedwire is the payment system for only large-dollar transfer(Large-Value Transfer System; LVTS), while ACH(Automated Clearing House)payment mainly applies a consumer account. Secondly ACH transaction is either credit or debit transfer, while Fedwire is only credit transfer. Thirdly the communication system of Fedwire has twoway method, telephonelike communication network, but ACH is oneway store and forward electronic mail. At present LVTS divides into RTGS(Real-Time Gross Settlement) and DNS(Deferred Net Settlement). However Fedwire uses either RTGS(instantaneous for every transaction) or DNS(net net transaction) but ACH uses only DNS(net net transaction). Fourthly ACH is substantially cheaper than the Fedwire payment. lastly security is important in both Fedwire and ACH, it is even more crucial in Fedwire In addition, for each transaction, Fedwire may entail individual instantaneous confirmation to the originator and notification to the receiver, whereas ACH do not.

  • PDF

Global Trade Management Strategies for Export Companies from the Supply Chain Management Perspective (공급사슬관점에서 수출기업의 글로벌 무역관리 전략)

  • Yang, Jung-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.35
    • /
    • pp.179-219
    • /
    • 2007
  • Cross-border supply chains undergone complexity in the global trade process, unpredictability and continually evolving regulations and information requirements. Under these circumstances, longer lead time inhibiting quick response to market demands, unanticipated supply chain costs eroding product cost savings, compliance and documentation errors causing delays and fines are challenging global trade companies when they execute global business. These problems are mainly caused by unautomated, unintegrated process which lead to longer and more unpredictable lead times, slower cash flow, cost overruns, and ultimately lower profits and less satisfied customers. Complex and unpredictable global trade environment requires global trade companies of global trade management functions to automate and control this complex environment for driving out cost, time and risk from their business. Global trade management allows cost savings, supply chain efficiencies and improved compliance through improving global supply chain visibility, facilitating cash flow by supply chain financing, enhancing supply chain security and risk management.

  • PDF

Colombia Border Area Refugees: Centered on Venezuela, Panama, and Ecuador Border Areas (콜롬비아 국경지역 난민증가 원인: 베네수엘라, 파나마 그리고 에콰도르 접경지역 강제실향민을 중심으로)

  • Cha, Kyung-Mi
    • Journal of International Area Studies (JIAS)
    • /
    • v.15 no.1
    • /
    • pp.109-134
    • /
    • 2011
  • Drug-related crime has increased in spite of visible results of Uribe government's hard-line policies on drug eradication and illegally armed organizations which were pursued under U.S. support, without the accompaniment of quantity change in drug cultivation and trade. Military disputes of left-right illegally armed communities surrounding illegal crop cultivation rights were rather intensified, and the number of refugees was increased through enforced displaced people. The 2005 refugee registration committee RUPD reports that 3,316,862 people, 7.3% of total population, were refugees. In particular, the number of refugees presented a large increase rate of 624% when compared to the past year due to enforced displaced people. Main discharge areas of enforced displaced people are connected with drug crime and activities of illegally armed organizations, and are places of increased armed disputes in the process of occupied territory expansion of illegally armed communities and militia. Undiscriminated attacks were executed on farmers in the process of occupation of illegal crop cultivation sites by illegally armed organization and militia to emit enforced displaced people, who moved to border areas by crossing national borders. Enforced displaced people were restricted to certain areas before the appearance of Uribe administration. However, enforced displaced people not only presented quantitative expansion, but also showed tendency of nationwide expansion after national security policy was pursued. With the closing of the Amazon area, previously the main route of drug trade, activity base of illegally armed organizations was moved to the Pacific region, and Panama border area experienced refugee increase due to the new policy of enforced displaced people. This study aims to understand the actual condition and cause for the increase in refugees in Colombia based on border areas of Venezuela, which is the nation of highest dispersion of Columbian refugees, Panama, which has appeared as a new destination for refugees after the 90s, and Ecuador, which has experienced sudden refugee increase in 2000.

Automated Signature Sharing to Enhance the Coverage of Zero-day Attacks (제로데이 공격 대응력 향상을 위한 시그니처 자동 공유 방안)

  • Kim, Sung-Ki;Jang, Jong-Soo;Min, Byoung-Joon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.4
    • /
    • pp.255-262
    • /
    • 2010
  • Recently, automated signature generation systems(ASGSs) have been developed in order to cope with zero-day attacks with malicious codes exploiting vulnerabilities which are not yet publically noticed. To enhance the usefulness of the signatures generated by (ASGSs) it is essential to identify signatures only with the high accuracy of intrusion detection among a number of generated signatures and to provide them to target security systems in a timely manner. This automated signature exchange, distribution, and update operations have to be performed in a secure and universal manner beyond the border of network administrations, and also should be able to eliminate the noise in a signature set which causes performance degradation of the security systems. In this paper, we present a system architecture to support the identification of high quality signatures and to share them among security systems through a scheme which can evaluate the detection accuracy of individual signatures, and also propose a set of algorithms dealing with exchanging, distributing and updating signatures. Though the experiment on a test-bed, we have confirmed that the high quality signatures are automatically saved at the level that the noise rate of a signature set is reduced. The system architecture and the algorithm proposed in the paper can be adopted to a automated signature sharing framework.

Current Status and Challenges of BGP Hijacking Security Threat (BGP 하이재킹 보안 위협 대응 현황 및 과제)

  • Han, Wooyoung;Hong, Yunseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1525-1530
    • /
    • 2022
  • BGP(Border Gateway Protocol) is a routing protocol that is actively used in inter-AS routing on the Internet. However, BGP routing protocol is vulnerable to BGP hijacking attacks that hijack the network by impersonating normal BGP sessions. BGP Hijacking attacks can lead to causing intercept IP traffic or interference with the normal service operation. Recently, BGP hijacking attacks, which have often occurred overseas, have also occurred in Korea. It means threatening the security of the Internet. In this paper, we analyze the overall process of attack through representative attack cases and virtual scenarios of BGP hijacking and based on the results of analyzing the application status of security technology to prevent BGP hijacking attacks by Korea and global major ISPs. It covers the technical proposal of ISPs and autonomous system operators should take to defend against BGP hijacking attacks.

Location Information Hiding Way Of HD Black Box Recording process (HD 블랙박스 녹화과정에서의 위치정보 은익방법)

  • Seok, Jin-Hwan;Yoon, Jong-Chul;Hong, Jong-Sung;Han, Chan-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.10-17
    • /
    • 2016
  • GPS location information storage included in the HD black box is using a unique manner for each manufacturer does not have a specific standard. In this paper, in order to overcome the limitations of the storage space and thereby the image quality according to store GPS position information deteriorate to solve the problems that cause, we propose the location information concealment method included in the HDTV video content using a essential hidden region. HDTV video content is a Border Extender of 8 lines in the frame to the bottom of the compression will be required. This was inserted into the image of a gray scale used in block form in order to space the current position information is concealed to prevent image degradation. The proposed method was confirmed using real HD black box, there are more difficult to interpret the format of the ASCII code re-edit the location information when the compression effect disappears with the existing security zones added. Therefore, the proposed method is suitable for location-based services, such as Facebook or Youtube videos.

A Study for strategic cooperaton of enterprise security and business (기업보안과 비즈니스의 전략적 협력에 관한 연구)

  • Ryu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.103-130
    • /
    • 2011
  • This study is the research of enterprise security for raising the profitability and stability of Korean companies in global business environment and strategic cooperation of business. As the scientific technology gets complicated as day goes by and new competitors appear regardless the border in the modern business environment, the situation happens frequently which the huge company hands over their market to the new one armed with the innovative thinking overnight. To survive such new environment, the answer is the change of paradigm regarding business management method at the new point of view. With the low level of security risk management of Korean companies which stick to old habit, the security management which helps the companies secure profits is not affordable. The global village where the population of 7 billions live in 21st century is facing up to the rapid ecological adaptation. The rapid change of climatic environment creates the hundreds of thousands of sufferers in a moment, and we have been watching the millions of livestock are buried alive due to new contagious disease everyday. Such change encourages the humans in global village to change the basic way of living. The business ecosystem which is the basic root for economic life cannot be an exception. To survive the business environment of 21st century, the security risk management at management level is required and the reporting line of companies should be established newly for raising business competing power through security risk management. The companies should bear in mind that they can be disappeared into our old memories overnight if they are not sensitive to the changing environment. Out of new risks for the modern companies, the field especially Korean companies are dealing easily is the security risk. Not like past, the security risk which's size is much more massive and its propagation velocity is very fast is the one of important business risks which the management should take care. Out of security risks which influence on the modern companies significantly, the brand of companies, protection of their reputation, continuity of production and operation and keeping customer's trust are prior to the others. This study offered the suggestion regarding enterprise security and the strategic cooperation of business to deal with such security risk effectively.

  • PDF

Improving Personal Data Protection in IoT Environments (사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안)

  • Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.995-1012
    • /
    • 2016
  • In Internet of Things (IoT) environments, devices or sensors everywhere can automatically collect data without the individual awareness, further combine and share data using ubiquitous network, and thus the development of IoT raises new challenges in respect of personal data protection and privacy. This study aims to identify main issues related to data protection in the IoT and propose adequate measures. We analyzed the types of personal data controllers and processors in IoT and figured out the issues regarding the processing of personal data and the rights to privacy of data subject. Accordingly, we suggested the institutional ways (e.g., establishment of user-friendly notice and flexible consent system, re-identification risk monitoring system, data protection in cross-border transfer, and user education) to improve the situation of personal data protection in IoT and finally proposed the improvement tasks to carry out first based on the degree of urgency and importance.

New Trends in Private International Law and Our Response (국제상거래(國際商去來)의 사법통일(私法統一)노력과 우리의 대응(對應))

  • Park, Whon-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.12
    • /
    • pp.65-84
    • /
    • 1999
  • During the past few decades, we have witnessed three approaches to overcome the legal disparities between trading countries: - determining the individual governing law in accordance with the conflict of laws principle; - unifying and harmonizing private international law into uniform rules and substantive laws under the auspices of ICC, UNCITRAL, UNIDROIT and various NGOs ; and - drafting model laws like the UNCITRAL Model Law on Electronic Commerce and promoting member countries to enact them. Against this backdrop, the United Nations Convention on Contracts for the International Sale of Goods (CISG) and the process by which it was adopted, established the benchmark for the unification of commercial law. The CISG, completed in 1980, merged civil and common law concepts and came into force in 1988 after a certain number of countries endorsed the treaty. Besides the CISG, the U.N. Limitations Convention and the UNIDROIT Principles of International Commercial Law, to name a few, have attempted to set cross-border legal norms and standards in the international business transactions. However, since the advent of computer-based commerce, there have emerged all-out efforts to establish uniform rules before national legal systems have been developed. As a consequence, the Model Law on Electronic Commerce has become a specimen legislation covering functional equivalents of paper-based writing and signature. For the credit enhancement exemplified by the Uniform Rules for Demand Guarantees (ICC Publication No.458), the UNCITRAL prepared the U.N. Convention on Independent Guarantees and Stand-by Letters of Credit, which was adopted by the U.N. General Assembly in 1995 but remains still not effective as only two countries have ratified this treaty so far. In this connection, two draft conventions underway at UNIDROIT and UNCITRAL deserve our attention as the probability of unification in the Korean Peninsula is mounting. They are to create security interests for commercial finance in moveable equipment and accounts receivable. The UCC-type security rights are regarded to be useful to enable the North Koreans with limited properties to borrow from the banks.

  • PDF

Forwarding Protocol Along with Angle Priority in Vehicular Networks (차량 통신망에서 Angle 우선순위를 가진 Forwarding 프로토콜)

  • Yu, Suk-Dea;Lee, Dong-Chun
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.41-48
    • /
    • 2010
  • Greedy protocols show good performance in Vehicular Ad-hoc Networks (VANETs) environment in general. But they make longer routes causing by surroundings or turn out routing failures in some cases when there are many traffic signals which generate empty streets temporary, or there is no merge roads after a road divide into two roads. When a node selects the next node simply using the distance to the destination node, the longer route is made by traditional greedy protocols in some cases and sometimes the route ends up routing failure. Most of traditional greedy protocols just take into account the distance to the destination to select a next node. Each node needs to consider not only the distance to the destination node but also the direction to the destination while routing a packet because of geographical environment. The proposed routing scheme considers both of the distance and the direction for forwarding packets to make a stable route. And the protocol can configure as the surrounding environment. We evaluate the performance of the protocol using two mobility models and network simulations. Most of network performances are improved rather than in compared with traditional greedy protocols.