• 제목/요약/키워드: Comprehensive Security

검색결과 441건 처리시간 0.024초

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • 제15권4호
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

국가대테러체제의 구축 및 발전방안 (Establishment of Korea National Counter-terrorism System and Development Plan)

  • 박준석
    • 시큐리티연구
    • /
    • 제42호
    • /
    • pp.229-249
    • /
    • 2015
  • 탈냉전과 세계화의 추세로 테러리즘, 범죄, 환경재난, 인종갈등, 경제위기, 사이버테러, 질병, 에너지 등의 비안보적인 안보의 문제들이 인류와 국가를 위협하며 변화를 요구하고 있다. 또한 이 시대에 맞춰서 국가의 역할이 점차적으로 확대되면서 최대의 국가론이 부상하였다. 이처럼 현대사회는 복지국가의 실현이라는 목표 구현을 위하여 모든 국가가 '작은 정부론'에서 '큰 정부론'의 국가관으로 변화하게 된 것이다. 이와 같이 각종 범죄와 치안 유지 및 신종재난과 테러의 위협, 인간안보의 개념 등 외부의 침입뿐만 아니라 포괄적인 국민의 안전과 보호를 위해 안보의 개념을 종합적으로 넓게 해석해야 할 것 같다. 이러한 시대에 맞추어 국내적으로는 천안함, 연평도, 구제역, DDos 테러, 해적 피랍, 광우병, 조류독감 등과 남북관계의 인도적 지원과 남북 정상회담의 추진이 답보상태에 빠져 있다. 그에 따른 국가위기 대응체제와 종합적인 위기관리센터, 컨트롤 타워, 안보조직체계, 일반 국민들과의 협력기반, 법률적, 제도적 체제의 구축이 종합적으로 이루어져야 한다. 그에 따라 한국의 국가안보 및 테러, 위기관리 체계와 선진국인 미국 안보, 위기관리의 체제를 비교하여 앞으로 한국의 발전적인 국가안보 위기관리체제를 재정립하고 새로운 방향모색을 하고자 하는데 본 연구의 의의가 있다고 할 수 있다. 또한 각 정부부처의 다양한 법령과 행정조직이 제각각 분산되어 있어 통합적으로 효율적 기능을 발휘할 수 있는 상위법 제정, 가칭 테러방지법의 입법 제정이 필요하다고 사료된다.

  • PDF

말기환자의 전인적 돌봄에 있어서 포괄적 평가개념의 중요성

  • 윤욱희;이귀한;유선희;곽원영;진선경
    • 호스피스학술지
    • /
    • 제3권1호
    • /
    • pp.12-30
    • /
    • 2003
  • We all human beings, should be reached the terminal of life in the world. There is the only difference between that comes suddenly or slowly. Persons who should be come the terminal stage suddenly due to disease, especially, malignancy, are Hospice patients. Hospice work is the work of all of us because anyone, anywhere, whenever can be suffered in terminal stage. The characters of Hospice-care are total care of wholistic human beings, comprehensive total assessment of the life and the team work composed of diverse team-members, for example, doctors, nurses, social workers, physical therapists, psychologists, ministers & volunteers. The care manager of the total care(the coordinator of Hospice care), should be worked systemically and, rationally. The comprehensive assessment concept should be entered to the infra-consultant of terminal care-program. The care manager should be have the ability of comprehensive assessment for terminal patients. It will also help standardization of Hospice, and application of medical insurance and social security.

  • PDF

Security in Network Virtualization: A Survey

  • Jee, Seung Hun;Park, Ji Su;Shon, Jin Gon
    • Journal of Information Processing Systems
    • /
    • 제17권4호
    • /
    • pp.801-817
    • /
    • 2021
  • Network virtualization technologies have played efficient roles in deploying cloud, Internet of Things (IoT), big data, and 5G network. We have conducted a survey on network virtualization technologies, such as software-defined networking (SDN), network functions virtualization (NFV), and network virtualization overlay (NVO). For each of technologies, we have explained the comprehensive architectures, applied technologies, and the advantages and disadvantages. Furthermore, this paper has provided a summarized view of the latest research works on challenges and solutions of security issues mainly focused on DDoS attack and encryption.

사회안전관리에 대한 전문인력 양성실태와 발전방안 (Fact and plan on specialist training for social security)

  • 공배완;김창호
    • 시큐리티연구
    • /
    • 제5호
    • /
    • pp.5-18
    • /
    • 2002
  • The private security has been one of the fastest growing parts of the law enforcement industry, confronted with mutual coincidence or complementarity. Therefore, the primary factor in order to straighten it up should be bringing op a person, because he or she arranges the private security, based on the society in the end. In addition, it is suggested that further study of technical learning and its practice should be arranged. Because the education for agents undertaking the social security is comprehensive in space and limited in time, it may accompany hardship in arranging its content and curriculum Although this article leaves much to be desired, it has been analyzed end observed if a greater emphasis is placed on ample human resources supply for increased demand on social security in private law enforcement industry through institutional education system. A scientific advancement is expected to be attained in the majors related to the private security, with validity that the continuous studies should be implemented, and a social role of colleges as a specialized institute should be erected.

  • PDF

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • 제5권3호
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

Social Media Security and Attacks

  • Almalki, Sarah;Alghamdi, Reham;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.174-183
    • /
    • 2021
  • The advent of social media has revolutionized the speed of communication between millions of people around the world in various cultures and disciplines. Social media is the best platform for exchanging opinions and ideas, interacting with other users of similar interests and sharing different types of media and files. With the phenomenal increase in the use of social media platforms, the need to pay attention to protection and security from attacks and misuse has also increased. The present study conducts a comprehensive survey of the latest and most important research studies published from 2018-20 on security and privacy on social media and types of threats and attacks that affect the users. We have also reviewed the recent challenges that affect security features in social media. Furthermore, this research pursuit also presents effective and feasible solutions that address these threats and attacks and cites recommendations to increase security and privacy for the users of social media.

한-EU 해상운송보안 제도 대응전략 비교연구 (South Korea and EU Practices for Maritime Transport and Port Security: A comparative Study on Attitude to respond)

  • 김시현;신건훈
    • 무역상무연구
    • /
    • 제68권
    • /
    • pp.23-42
    • /
    • 2015
  • According to the increasing attention to safety and security in maritime shipping, there are diverse security systems in international logistics activities. Although prior studies on maritime transport and port security reviewed security policy and practices in order to provide useful insights for strategic agenda, a few focused on attitude to respond it. Moreover, there are no prior study on a comparative study between continents. To tackle this, this paper compared confrontation attitude to maritime transport and port security between South Korea and European Union. Results identified that maritime shipping security incorporates container cargo security management, logistics security management, logistics security certificate system, and environmental impacts management caused by maritime shipping. Further, the comparison between two countries suggests that South Korea need to take more positive attitude to respond, such as investment in equipment and technologies for maritime shipping security, construction of comprehensive management system, political supports for logistics security, and training and education for safety and security. The results provide useful insights for strategic review of security systems in South Korea, and to help strategic agenda for future improvement.

  • PDF

국방조직의 정보보호 평가 방법론 개발 (Development of the Information Security Methodology for Defense Organization)

  • 조성림;최인수;박지훈;신우창
    • 한국IT서비스학회지
    • /
    • 제12권4호
    • /
    • pp.77-90
    • /
    • 2013
  • As Cyber threats are rising, the scope of information Security (IS) is extending from technical protection of a single information system to organizational comprehensive IS capability. The ministry of National Defense (MND) has established the IS evaluation for defense organization in 'the Directive for Defense Informatization Affairs.' However, no information about an evaluation method, process and organization is provided. We surveyed information security management system (ISMS) and related best practices in public sector and other countries, and analysed the military information security affairs. Thus, this paper recommends the IS evaluation method and process. The trial IS evaluation is in progress this year and the MND will expand this IS evaluation to the entire organization.

경호비서에게 요구되는 자질 (A Study on the Qualities of the Security and Secretary)

  • 박옥철
    • 한국재난정보학회 논문집
    • /
    • 제5권2호
    • /
    • pp.24-37
    • /
    • 2009
  • In the political and economic circles of our society, the security and secretary is always accompanying the society leaders, like shadows. The job of the security and secretary is a very difficult one that requires comprehensive and extensive capability and talent. From results of the prior studies, qualities of the security and secretary are divided into three groups. i.e. personal qualities, mental qualities and physical qualities. Each quality can be summarized as follows. Firstly, personal qualities mean honesty, responsibility, initiative, work ethic, sense of duty, modest attitude, kindness and loyalty. Secondly, mental qualities represent agility & composure, judgement, adaptability, memory, prediction, accuracy & reliability, observation and secret. Finally, physical qualities such as health, cleanliness, decent appearance, good feeling voice, physical strength and Martial arts for Protection. The security and secretary equipped with the above three requisites can be said to be the most ideal the security and secretary whom this age want and need.

  • PDF