• Title/Summary/Keyword: Comprehensive Security

Search Result 441, Processing Time 0.036 seconds

A Study on Logistics Security Recognition of Domestic Logistics Enterprises (국내물류기업의 물류보안 인식에 관한 연구)

  • Lee, Jea-Won;Ryu, Hyung-Geun;Yeon, Joung-Hum
    • Journal of Navigation and Port Research
    • /
    • v.34 no.1
    • /
    • pp.45-50
    • /
    • 2010
  • After September 11 attacks, as recently the range about security of physical distribution is rapidly spreading temporally & spatially, and it considers that the demand of understanding about logistics company is more than that of the past, now is the time that to establish policy for a comprehensive and systematic support policy that targets the entire supply chain considering the competitive of logistics beyond the responsibility for security of the field of import and export simply. In this respect, this study has identified recognition of domestic logistics company about global logistics security system that has recently been implemented in the country, and this level of recognition has really examined what is the impact of its logistics competitiveness and an intention to invest in related areas in the future. Based on this, this study has also proposed the supporting promotion and education for the expansion of logistics security of government & related agencies and effective way promoting to establish policies regarding this.

A Study on DB Security Problem Improvement of DB Masking by Security Grade (DB 보안의 문제점 개선을 위한 보안등급별 Masking 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.101-109
    • /
    • 2009
  • An encryption module is equipped basically at 8i version ideal of Oracle DBMS, encryption module, but a performance decrease is caused, and users are restrictive. We analyze problem of DB security by technology by circles at this paper whether or not there is an index search, object management disorder, a serious DB performance decrease by encryption, real-time data encryption beauty whether or not there is data approach control beauty circular-based IP. And presentation does the comprehensive security Frame Work which utilized the DB Masking technique that is an alternative means technical encryption in order to improve availability of DB security. We use a virtual account, and set up a DB Masking basis by security grades as alternatives, we check advance user authentication and SQL inquiry approvals and integrity after the fact through virtual accounts, utilize to method as collect by an auditing log that an officer was able to do safely DB.

Theoretical Review of Financial Service System for Households' Financial Problems (가계의 재정문제 해결을 위한 재무서비스 체계의 이론적 검토)

  • 김순미
    • Journal of the Korean Home Economics Association
    • /
    • v.31 no.3
    • /
    • pp.89-100
    • /
    • 1993
  • Recently, comprehensive financial service system based on individual, households' economic security and financial independence has emerged as a professional service system in America, while it has not been studied in our country. In order to develop conceptual model of Financial Service System, this paper reviewed ; 1) the concept of financial problem divided into tow dimension, such as financial resource and financial demand, 2) theories of financial service system, further this work also included the identification of relations between financial problem and financial service system.

  • PDF

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF

A Study on Increasing Security Following Mutual Interaction and Integration of Dualized Security Category between Information Security and Personal Information Protection (정보보안과 개인정보보호 간의 이원화 보안범주의 상호연계 및 통합에 따른 보안성 증대에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.601-608
    • /
    • 2018
  • While the legislation on the protection of personal information in public institutions was enacted and amended, the guidelines and laws on information security were focused, contracted and realized with focus on specific institutions. Mutual laws and guidelines have been applied and realized for the dual purpose of securing both the asset of macroscopic information and the asset of personally identification information, which are mutually different media information. However, in a bid to present the definition and direction of the fourth industrial revolution in 2017, a variety of products and solutions for security designed to ensure the best safety line of the 21st century, and the third technology with the comprehensive coverage for all these fields, a number of solutions and technologies, including IOT(: Internet of Things), ICT Internet of Things(: ICT), ICT Cloud, and AI (: Artificial Intelligence) are pouring into the security market as if plastic doll toys were manufactured in massive scale into the market. With the rising need for guaranteeing the interrelation for securities with dualistic physical, administrative, logical and psychological differences, that is, information security and personal information security that are classified into two main categories and for the enhanced security for integrated management and technical application, the study aims to acquire the optimal security by analyzing the interrelationship between the two cases and applying it to the study results.

Comprehensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database (암호화된 데이터베이스 검색 시스템의 보안 요구사항에 대한 통합적 관점에서의 연구)

  • Park, Hyun-A;Lee, Dong-Hoon;Chung, Taik-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.621-635
    • /
    • 2012
  • Although most proposed security schemes have scrutinized their own security models for protecting different types of threats and attacks, this naturally causes a problem as follows-- if a security analysis tool would fit a certain scheme, it may not be proper to other schemes. In order to address this problem, this paper analyzes how security requirements of each paper could be different by comparing with two schemes: Agrawal et al.'s scheme OPES (Order Preserving Encryption Scheme) and Zdonik et al.'s FCE (Fast Comparison Encryption). Zdonik et al. have formally disproved the security of Agrawal et al.'s scheme OPES. Thereafter, some scholars have wondered whether the OPES can guarantee its applicability in a real world for its insecurity or not. However, the analysis by Zdonik et al. does not have valid objectivity because they used the security model INFO-CPA-DB for their scheme FCE to analyze Agrawal et al.'s scheme OPES, in spite of the differences between two schemes. In order to analyze any scheme correctly and apply it to a real world properly, the analysis tool should be comprehensively standardized. We re-analyze Zdonik et al.'s analysis for OPES and then propose general formalizations of security and privacy for all of the encrypted retrieval systems. Finally, we recommend the minimum level of security requirements under our formal definitions. Additional considerations should be also supplemented in accordance with the conditions of each system.

Legal Issues in Application of the ISPS Code under Marine Cargo Insurance (해상적하보험에서 국제선박 및 항만시설 보안규칙의 적용상 법률적 쟁점)

  • Lee, Won-Jeong;Yoo, Byung-Ryong
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.3
    • /
    • pp.307-316
    • /
    • 2014
  • In view of the increased threat arising terrorism, the International Maritime Organization(IMO) adopted the International Ship and Port Facility Security Code (ISPS Code) which attached to the SOLAS Convention. The ISPS Code requires a comprehensive set of measures to enhance the security of ships and port facilities. For example, a shipowner must obtain the International Ship Security Certificate(ISSC). If the carrying vessel has not ISSC, the ship may be detained by the contracting governments. The Joint Cargo Committee(JCC) in London adopted the Cargo ISPS Endorsement, in which the assured who knowingly ships the cargoes on a non-ISPS Code compliant vessel will have no cover. However, where there is no the Cargo ISPS Endorsement in a Marine Cargo Insurance Policy and the cargo is carried by a non-ISPS Code certified vessel, the legal problem is whether or not it would constitute a breach of an implied warranty of seaworthiness and/or an implied warranty of legality. The purpose of this article is to analyze the potential legal issue on the relations between non-ISPS Code compliant vessel and two implied warranties under Marine Insurance Act(1906) in U.K.

Lightweight and adaptable solution for security agility

  • Vasic, Valter;Mikuc, Miljenko;Vukovic, Marin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1212-1228
    • /
    • 2016
  • Secure communication is an important aspect of today's interconnected environments and it can be achieved by the use of cryptographic algorithms and protocols. However, many existing cryptographic mechanisms are tightly integrated into communication protocols. Issues emerge when security vulnerabilities are discovered in cryptographic mechanisms because their replacement would eventually require replacing deployed protocols. The concept of cryptographic agility is the solution to these issues because it allows dynamic switching of cryptographic algorithms and keys prior to and during the communication. Most of today's secure protocols implement cryptographic agility (IPsec, SSL/TLS, SSH), but cryptographic agility mechanisms cannot be used in a standalone manner. In order to deal with the aforementioned limitations, we propose a lightweight cryptographically agile agreement model, which is formally verified. We also present a solution in the Agile Cryptographic Agreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. The proposed solution is able to provide existing and new communication protocols with secure communication prerequisites in a straightforward way without adding substantial communication overhead. Furthermore, it can be used between previously unknown parties in an opportunistic environment. The proposed model is formally verified, followed by a comprehensive discussion about security considerations. A prototype implementation of the proposed model is demonstrated and evaluated.

Factors contributing to participation in food assistance programs in the elderly population

  • Hong, Seo Ah;Kim, Kirang
    • Nutrition Research and Practice
    • /
    • v.8 no.4
    • /
    • pp.425-431
    • /
    • 2014
  • BACKGROUND/OBJECTIVES: The study objectives were to examine the participation rate in food assistance programs and explore the factors that contribute to such participation among the Korean elderly population. SUBJECTS/METHODS: The study sample comprised 3,932 respondents aged 65 years or older who were selected from a secondary data set, the fourth Korean Welfare Panel Study (KoWePS). The factors, related to participation in programs were examined based on the predisposing, enabling and need factors of the help-seeking behavior model. Multiple logistic regression analysis was used to select the best contributors among the factors related to program participation. RESULTS: The predisposing rate in food assistance programs was 8.5% (7.1% for men and 10.4% for women). When all variables were included in the model, living without spouse, no formal education, low income, having social security benefits and food insecurity in elderly men, and age, low income, having social security benefits and feeling poor in elderly women were significantly related to a higher tendency to program participation. CONCLUSIONS: The predisposing and need factors, such as living without spouse, low education level, food insecurity and feeling poor were important for program participation, as well as enabling factors, such as household income and social security benefits. A comprehensive approach considering these factors to identify the target population for food assistance programs is needed to increase the effectiveness and target population penetration of these programs.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.