• Title/Summary/Keyword: Economic Security of the Enterprise

Search Result 34, Processing Time 0.027 seconds

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Study On Integrating Internet and Intranet based on IPSec and IMA Technology (IPSec과 IMA를 이용한 인터넷과 내부 망 통합에 관한 연구)

  • Cho, Yong-Gun
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.71-78
    • /
    • 2008
  • This research is on the study of integrating internet and intranet that was built for their own enterprise into one network system that promises a more economic and secure use. Compared to this system, the traditional network conversion device not only has its mechanical limits, but also requires a separate network set up. This raises both interoperability and security problems and results in a higher cost. Therefore, I propose dual defence system based on the inverse multiplexing of ATM Forum and IPSec to improve network ability and deliver enhanced system reliability while reducing cost. Furthermore, I also addressed some of the weaknesses of the Scanning Attacking Method, SNMP and Spooler Port and proposed counter measures that will deal with these weakness at the dual defence system.

  • PDF

A study of Effect of Information Security Management System [ISMS] Certification on Organization Performance (정보보호관리체계[ISMS] 인증이 조직성과에 미치는 영향에 관한 연구)

  • Bae, Young-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4224-4233
    • /
    • 2012
  • As Internet usage is rapidly spreading, tasks that were only possible offline are now available in cyber space but at the same time, new security threats such as hacking and viruses have also increased. For that reason, Comprehensive and methodical information security systems are therefore required in enterprises and organizations. Consequently, the Information Security Management System certification system has been in effect in Korea since July 2001. As of December 2012, 130 enterprises have been certified, and more than 120 ISO27001 certifications have been issued. As such, since the introduction of the ISMS certification system in Korea, the demand for the certification has been steadily increasing, and it is now recognized as an integral part of maintaining the competitiveness in an enterprise. However, the qualitative aspects of certification regarding the effectiveness of ISMS have been continuously questioned by actual customers. In order to clarify the situation and remove such doubts, this study will substantiate the fact that development and certification of ISMS positively affect the business performance of enterprises so that they will recognize the effect of obtaining ISMS certification and eventually prevent security accidents and improve their business performance by developing ISMS.

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.

Comparative Analysis of Multi-functional Public Values of Paddy Fields in Korea and Japan (한일간(韓日間) 논의 공익적(公益的) 기능별(機能別) 가치평가(價値評價) 비교분석(比較分析))

  • Lim, Jae Hwan
    • Korean Journal of Agricultural Science
    • /
    • v.26 no.2
    • /
    • pp.70-76
    • /
    • 1999
  • Rice farming is not only the most important income resources of Korean farmers but also the roots of Korean traditional culture. Paddy fields have acted as an food supply base but also have contributed to the public multi-functions such as flood control, water conservation, controlling soil erosion, providing recreational and resting spaces, water purification, air cleaning, oxygen supply and air cooling and so on. The public multi-functions of paddy except rice production have not been evaluated before UR negotiation and starting WTO system. Under the drastic changes of rice economic settings as price decrease of rice and downward decrease of farm income, Korean and Japanese farmers might have lost their intention to grow rice in paddy fields without the direct payment system to compensate rice income decrease. To adapt the direct payment system, the total public value of multi-function of paddy should be identified in terms of money. According to the research results, the total value of multi-functional value of paddy in Korea were estimated 21,596thousand won which is higher than rice production value by 2.1 times. On the other hand the total value of Japanese paddy were amounted to 21,390 Yen which is more than that of Korea by 10times outstandingly. Likewise Japanese have evaluated the paddy field very important enterprise from the view point of food security and multi -functions of paddy to their socio-economic life and environmental sustainability in Japan.

  • PDF

Qualitative Study on Service Features for Cloud Computing (클라우드 컴퓨팅의 서비스 특성에 관한 질적연구)

  • Ra, Jong-Hei
    • Journal of Digital Contents Society
    • /
    • v.12 no.3
    • /
    • pp.319-327
    • /
    • 2011
  • Cloud computing is the probated transmission-platform that provide the enterprise or individual with efficient and cost-effective IT service on internet. Cloud computing serve as data or computing is moved from desktop or portable PC to the massive data center. Searching for the services offered by cloud computing indicates that their current service feature needs to be improved to satisfy current and future customers. This study attempted to satisfy this need by identifying the service's features for the cloud computing service environment through qualitative approaches. Finally, we classify into seven features(Security, Reliability, Availability, Inter-operating, Economic, Intellectual Property) of cloud computing service.

The Mechanism of the Investment Resources Involvement in Order to Introduce Innovations at Enterprises in the Conditions of Digitalization

  • Karpenko, Oksana;Bonyar, Svitlana;Tytykalo, Volodymyr;Belianska, Yuliia;Savchenko, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.81-88
    • /
    • 2021
  • The presented scientific research substantiates the principles of the mechanism of the investment resources involvement in order to introduce innovations at enterprises in the context of digitalization using a resource-functional approach. The importance of attracting investment resources, which contributes to the modernization of production systems, the creation of a stable economic field of development of economic entities, is justified. The expediency of application of the resource-functional approach on research of the mechanism of attraction of investment resources for introduction of innovations at the enterprises in the conditions of digitalization is proved. The investment process is presented in the form of a chain of interdependent processes which include: attraction of investment resources, investments, increase of investment value, profit. It is proved that the mechanism of attracting investment resources for the introduction of innovations in enterprises in the context of digitalization cannot be considered in isolation from the process, due to the fact that the mechanism is aimed at performing specific functions. The functions of the mechanism include management, complex, coordination, monitoring, performance and control functions. Functions of the mechanism of attraction of investment resources for introduction of innovations at the enterprises in the conditions of digitalization are caused by the purposes of attraction of investment resources for innovative development; the presence of an objective nature; relative independence and homogeneity; implementation of functions in the process of investing in innovative activities of the enterprise.

Building Guanxi and Networks of Korean Foreign Direct Investment Firms in China (대중국 한국 투자기업의 꽌시 형성과 네트워크)

  • Choe, Ja-Yeong;Lee, Sung-Cheol
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.15 no.2
    • /
    • pp.228-239
    • /
    • 2012
  • Guanxi could be regarded as communities based on blood, regionalism, school ties centering on individual person. It has been used as a means of personal interests security and acquisition. What is more, it has formed a mode of socio-economic order, which is an inter-obligation relations based on mutual benefits. In practice, it is necessary to understand and accept guanxi in China, as it is a key factor to understand consumer patterns, inter-firm relations and extra-firm relations between firm and government. In this context, the main aim of the reserach is to identify the impact of guanxi on the business activities of Korean foreign direct investment firms in China by investigating their networks based on guanxi.

  • PDF

A Study on the Third Party Logistics Service Enforcement of Inland Container Depot at Busan area (부산지역 ICD의 TPL(Third Party Logistics) 서비스의 기능 강화에 관한 연구)

  • Choi, Young-Bong;Lee, Chun-Su
    • Journal of Korea Port Economic Association
    • /
    • v.25 no.3
    • /
    • pp.165-182
    • /
    • 2009
  • The purpose of this paper is to study on the third party logistics service enforcement of inland container depot at Pusan area. The main results of this paper are as follows: First, the inland container depot related to location selecting factor researches analyzed and korean TPL market reviewed. Second, the TPL service function reinforcement method and investments are mentioned. In detail the 9 factors are as follows: competitive high position and improvements of harbor back complex, ICD goods enterprise investment strategies, the harbor back which is inexpensive only the rent, taxes benefit and incentive, site security and base facility expansion, the goods service provision which is flexible, connection plan construction of goods enterprise, the incentive strategic establishment which is discriminated, the marketing activity which is long-term. and lastly the ICD and TPL Policy are needed that government and logistic enterprise's cooperation gains competitive advantage.

  • PDF

Multiple Method Authentication System Using Embedded Device (임베디드 기기를 활용한 다중 방식 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.7
    • /
    • pp.7-14
    • /
    • 2019
  • Users who use smartphone can using knowledge-based authentication, possession-based authentication, biometric-based authentication, and token-based authentication in order to access rights to systems requiring authentication. However, desktop computer users use method only ID and password, which are knowledge-based authentication factors, due to limitations of authentication devices, despite various authentication methods. In this paper, we designed and implemented a raspberry pi based authentication system that provides multiple authentication method of a user's desired type. The implementation system uses knowledge-based authentication, possessive-based authentication, biometric-based authentication, and token-based authentication. The proposed system can provide a security function that can be used by SMEs, which is difficult to hire a security officer due to the economic burden. The implemented system can be used not only for personal use but also for enterprise, and it can be applied to various fields such as finance and game.