• 제목/요약/키워드: Comprehensive Security

검색결과 454건 처리시간 0.025초

국방조직의 정보보호 평가 방법론 개발 (Development of the Information Security Methodology for Defense Organization)

  • 조성림;최인수;박지훈;신우창
    • 한국IT서비스학회지
    • /
    • 제12권4호
    • /
    • pp.77-90
    • /
    • 2013
  • As Cyber threats are rising, the scope of information Security (IS) is extending from technical protection of a single information system to organizational comprehensive IS capability. The ministry of National Defense (MND) has established the IS evaluation for defense organization in 'the Directive for Defense Informatization Affairs.' However, no information about an evaluation method, process and organization is provided. We surveyed information security management system (ISMS) and related best practices in public sector and other countries, and analysed the military information security affairs. Thus, this paper recommends the IS evaluation method and process. The trial IS evaluation is in progress this year and the MND will expand this IS evaluation to the entire organization.

경호비서에게 요구되는 자질 (A Study on the Qualities of the Security and Secretary)

  • 박옥철
    • 한국재난정보학회 논문집
    • /
    • 제5권2호
    • /
    • pp.24-37
    • /
    • 2009
  • In the political and economic circles of our society, the security and secretary is always accompanying the society leaders, like shadows. The job of the security and secretary is a very difficult one that requires comprehensive and extensive capability and talent. From results of the prior studies, qualities of the security and secretary are divided into three groups. i.e. personal qualities, mental qualities and physical qualities. Each quality can be summarized as follows. Firstly, personal qualities mean honesty, responsibility, initiative, work ethic, sense of duty, modest attitude, kindness and loyalty. Secondly, mental qualities represent agility & composure, judgement, adaptability, memory, prediction, accuracy & reliability, observation and secret. Finally, physical qualities such as health, cleanliness, decent appearance, good feeling voice, physical strength and Martial arts for Protection. The security and secretary equipped with the above three requisites can be said to be the most ideal the security and secretary whom this age want and need.

  • PDF

Healthcare Security based on Blockchain

  • Almalki, Taghreed;Alzahrani, Shahad;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.149-160
    • /
    • 2021
  • One of the most important inventions and developments in the digital world today is the healthcare system based on blockchain technology. Healthcare is an important field that requires the application of security mechanisms due to the sensitivity of patient data. The association of blockchain with healthcare contributed to achieving better security mechanisms than the traditional approach. The new approach operates in a decentralized system, which in turn, improves security in the healthcare environment. Consequently, blockchain technology has emerged as one of the most crucial solutions to security violations and challenges in the healthcare industry. This paper provides a comprehensive review of several experts' recent protection and detection approaches in this domain. It is also imperative to note that the paper focuses only on the recent techniques that have been published during 2017-2020. The sophisticated procedures have been investigated and discussed in terms of similarities and differences to highlight the significance of the protection needed to secure the healthcare environment.

An Exhaustive Review on Security Issues in Cloud Computing

  • Fatima, Shahin;Ahmad, Shish
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3219-3237
    • /
    • 2019
  • The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. Various "Cloud Service Provider" such as Microsoft Azure, Google Web Services etc. enables the users to access the cloud in cost effective manner. However, security, privacy and integrity of data is a major concern. In this paper various security challenges have been identified and the survey briefs the comprehensive overview of various security issues in cloud computing. The classification of security issues in cloud computing have been studied. In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

경찰공무원의 대테러리즘 인식에 관한 연구 - Comprehensive Emergency Management Model을 중심으로- (A Study on Police Officers' Awareness Of Counter-Terrorism - Focused on the Comprehensive Emergency Management Model -)

  • 주성빈
    • 융합보안논문지
    • /
    • 제17권3호
    • /
    • pp.103-114
    • /
    • 2017
  • 테러리즘은 개인적 법익에서부터 국가적 법익에 이르기까지 포괄적인 법익의 침해가 가능하다는 점에 있어 그 심각성이 크다. 그리고 이러한 법적 가치가 훼손될 경우에는 원상회복될 가능성이 매우 희박하므로 제도적 개선 및 대안적 정책을 제시하는 것 못지 않게 사전 예방적 활동의 중요성을 인식하는 것이 선행되어야 한다. 사전 예방적 작용과 절차적 합법성을 담보하기 위해서는 형사사법기관의 역할이 무엇보다 중요한데 구체적 절차 및 법적 접근이 이루어지기 전에 이들의 테러리즘 본질에 대한 인식은 어떠한지 살펴보는 것은 의미가 있을 것이다. 이 연구에서는 이러한 문제 인식을 바탕으로, 대테러리즘 인식을 살펴보기 위한 다양한 기준 중 포괄적 위기관리 모형(Comprehensive Emergency Management Model)에서 제시하고 있는 위기발생의 시차별 진행과정을 기준으로 예방과 완화, 준비, 대응, 복구 등 4단계로 분류하여 인식의 차이를 분석해 보고자 하였다.

정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로 (The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness)

  • 김종기;전진환;임호섭
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제15권1호
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

박근혜 정부의 사회안전 정책추진 발전방안 (Improvement Plan on Park Geun-Hye Government's Policy Implementation for Social Security)

  • 조광래
    • 시큐리티연구
    • /
    • 제35호
    • /
    • pp.87-124
    • /
    • 2013
  • 본 연구는 과거 이명박 정부 기간 중 국민의 사회안전 인식 변화를 고찰하고 이를 토대로 박근혜 정부 출범에 따른 사회안전 관련 국정운영 발전방안을 제시하는데 그 목적이 있다. 이와 같은 목적을 달성하기 위하여 2008년부터 2012년까지 국민의 사회안전 인식 변화를 분석하고 이에 근거한 박근혜 정부의 사회안전 정책추진 발전방안을 도출하였다. 이와 같은 연구목적과 연구방법을 통하여 도출한 연구결과는 다음과 같다. 첫째, 포괄적인 사회안전 관련정책의 지속 추진이 필요하다. 사회안전이 국민의 생명과 직결되고 실생활에 밀접한 관계가 있다는 점에서 사회안전 주요요인에 대해 어느 하나 소홀히 하거나 간과할 수 없는 실정이다. 따라서 사회안전 주요요인에 대한 포괄적인 국정운영 및 정책추진이 필요하다. 둘째, 국민이 체감할 수 있는 사회안전정책 강화가 요구된다. 범죄 발생의 경우는 국민의 57.1%가 사회불안요인으로 지적할 만큼 그 비중이 높으므로 이에 대한 국가적 관심을 집중함으로써 대(對)국민 신뢰도 제고를 도모하고, 안보에 있어서도 철저한 국방대비태세로 이에 대한 우려를 불식시킬 수 있어야 할 것이다. 셋째, 사회안전 관련부처의 체계적인 조직 운영 및 상호 협력이 필요하다. 제반 사회안전을 체계적으로 관리하기 위해서는 안전행정부, 국방부, 검찰청, 경찰청 등 대표적인 공안기관뿐만 아니라, 정부기구 대부분이 참여하는 체계적인 국정운영이 필요하다. 넷째, 일관성 있는 사회안전 정책 추진이 요구된다. 박근혜 정부가 '안전과 통합의 사회', '행복한 통일시대의 기반 구축' 등을 국정목표로 설정하고 있으나 이는 역대 정부의 사회안전 정책과 유사하므로 과거 정부와 차별화를 기하기보다는 일관성 있는 사회안전 관련정책 추진이 더욱 중요하다.

  • PDF

연구개발무기체계 시험평가 발전방안에 관한 연구 (A Study on The Improvement of Weapon System Test and Evaluation - Focusing on the weapon system in the research development stage -)

  • 이강언;부준효
    • 안보군사학연구
    • /
    • 통권8호
    • /
    • pp.383-420
    • /
    • 2010
  • This article is focusing on the improvement of weapon system test & evaluation, aimed at the weapon system in the research development stage. This article suggests improvement directions in three aspects(organization and system, skilled manpower and technology, test facilities of weapon system test & evaluation) as follows. 1) Weapon system test & evaluation organization and system a. Establishment of comprehensive test & evaluation system b. Making regulation for comprehensive test infrastructure management. c. Standardization of test & evaluation process, which can be used in special subject to army, navy and air force. 2) Skilled manpower and technology of weapon system test & evaluation a. Training & education, management of test & evaluation experts. b. Establishment of skill management system of test & evaluation. 3) Test facilities of weapon system test & evaluation a. Establishment of comprehensive improvement direction of test & evaluation installation and equipment. b. Consideration of counter measures to prevent overlapping investment, and to use the test & evaluation resources efficiently. c. Establishment of organic network for the effective use of test & evaluation installation and equipment. d. Establishment of detailed cooperation plan for the commonage of test & evaluation facility and equipment.

  • PDF

Decision Tree Analysis for Prediction Model of Poverty of The Older Population in South Korea

  • Lee, Soochang;Kim, Daechan
    • International Journal of Advanced Culture Technology
    • /
    • 제10권2호
    • /
    • pp.28-33
    • /
    • 2022
  • This study aims to investigate factors that affect elderly poverty based on a comprehensive and universal perspective, suggesting some alternatives for improving the poverty rate of the elderly. The comprehensive and universal approach to the poverty of the aged that this study attempts can give a better understanding of the elderly poverty beyond the contribution of the existing literature, with the research model including individual, family, labor, and income factors as the causes of old-age poverty from the comprehensive and universal perspective on the causes of poverty of the elderly. In addition, the study attempts to input variants of variables into the equation for the causes of elderly poverty by using panel data from the 8th Korean Retirement and Income Study. This study employs decision tree analysis to determine the cause of the poverty of the elderly using CHAID. The decision tree analysis shows that the most vital variable affecting elderly poverty is making income. For the poor elderly without earned income, public pensions, educational careers, and residential areas influence elderly poverty, but for the poor elderly with earned income, wage earners and gender are variables that affect poverty. This study suggests some alternatives to improve the poverty rate of the aged. The government should create a better working environment such as senior re-employment for old people to be able to participate in economic activities, improve public pension or social security for workers with unfavorable conditions for public security of old age, and give companies that create employment of the aged diverse incentives.