• Title/Summary/Keyword: IT Security

Search Result 11,344, Processing Time 0.04 seconds

A Study on the Method of Checking the Level of Information Security Management Using Security Maturity Model (보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구)

  • Lee, Sang-kyu;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1585-1594
    • /
    • 2018
  • In recent years The importance of information security management for securing information collection and analysis, production and distribution is increasing. Companies are assured of confidence in information security through authentication of information Security Management System. However, level assessment and use of domains that make up the management system is limited. On the other hand, the security maturity model is able to diagnose the level of information protection of the enterprise step by step. It is also possible to judge the area to be improved urgently. It is a tool to support goal setting according to the characteristics and level of company. In this paper, C2M2, which is an example of security maturity model, is compared and analyzed with Korea Information Security Management System certification. Benchmark the model to check the level of information security management and derive the priority among the items that constitute the detailed area of information security measures of ISMS certification. It also look at ways to check the level of information security management step by step.

Analysis of Growth Factors of Foreign Private Security in Korea: Focusing on the Social Capital of Korean-Chinese (재한 외국인 민간경호의 성장요인 분석 -한국계 중국인의 사회자본을 중심으로-)

  • Park, Jeong-Hun
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.107-124
    • /
    • 2018
  • The purpose of this study is to analyze the growth factors of foreign private security and to propose a successful activation method through collaboration between Korea private security guard and Korean private security guard. The results of this study are as follows. First, we need to acknowledge the need for Korean - Chinese security activities in Korea. Secondly, analysis and research should be conducted to find out why Korean - Chinese security activities are needed in Korea. Third, it is necessary to improve the language ability as one of the efforts to escape the limited domestic security activities by analyzing the advantages and disadvantages of the Korean - Chinese security activities it is difficult, it should be possible to select talented people who can speak language and to be able to work as a security guard. Fourth, it is urgent to improve the perception of Korean - Chinese in order to promote Korean - Chinese security activities and domestic security activities.

Trend and Cause of Information Security Workforce's Job Turnover (정보보호인력 직무이동의 추이 및 요인)

  • Park, Sang-Woo;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.37-47
    • /
    • 2020
  • A significant proportion of information subjects experience information security breaches, and the number of reports and counseling cases of personal information infringements is increasing. Increased awareness of the importance of information security has raised interest in the personnel in charge of such tasks. However, hiring excellent new workers and preventing turnovers in information security remain unresolved. In this paper, by modeling the job career path of information security workforce as a Markov chain, we analyze the workforce turnover process and long-term turnover trends by information security jobs, and further analyze the number and duration of turnovers required to engage in specific jobs. The results of this study are expected to be a reference to balancing the supply and demand of information security workers for the government and to ensuring efficient management of the workforce for businesses.

A Study on the Supply Chain Security and Risk Management Strategies of Global Companies (글로벌 기업의 공급사슬보안 및 위험관리전략에 관한 연구)

  • Yang, Jung-Ho
    • Management & Information Systems Review
    • /
    • v.27
    • /
    • pp.149-172
    • /
    • 2008
  • Since the 9/11 terror attack, the event which caused supply chain disruption, supply chain security has becomes more important than ever before. Furthermore, such company's logistics strategies conflicting supply chain security as increased global sourcing, JIT manufacturing are increasing supply chain vulnerability. It could burden for global companies to strengthen supply chain security because not only it requires additional investment cost but also changes of companiy's global logistics strategy. However, on the other hand, supply chain visibility and resilience can be improved through supply chain security. In addition, it allows companies to stabilize supply chain structure as well as rapid and flexible response to market demand. The key issue is balancing between efficiency and supply chain security. To do this, identifying risk elements under the supply chain and assessing vulnerability of each supply chain components should be performed before developing efficient supply chain security management system without obstructing supply chain efficiency.

  • PDF

Legal Implications of the ISPS Code on Contract of Carriage by Sea (국제해상보안규정(ISPS Code)의 시행이 해상법에 미칠 영향)

  • Yang, Jung-Ho;Myung, Chang-Sig
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.37
    • /
    • pp.217-250
    • /
    • 2008
  • The International Ship and Port Facility Security (ISPS) Code which was developed as the main response of the shipping sector to the miserable event of 11 September 2001 came into effect on 1 July 2004. The ISPS Code designed to detect and eliminate security threats affecting ships and port facilities used in international trade will significantly impact not only on the management and operation of the shipping industry but also on maritime law despite the fact that it is the regulatory framework of public law. It is expected that implementing the ISPS Code will contribute to reinforcement of maritime security on the one hand. However, on the other hand, more intensified security inspection and control measures of port states will also cause delay and additional costs which cause uncertainty in allocating security risk and cost between the contracting parties. Therefore, it is desire to insert new security clause dealing with main security issues or adapt existing clauses to new shipping environments to minimize disputes.

  • PDF

An Enhanced Model on the Selection of Information Protection Security Diagnosis Target Firms (정보보호 안전진단 대상자 선정 기준의 개선 방안 연구)

  • Ahn, Yeon-Shick
    • Journal of Information Technology Services
    • /
    • v.8 no.1
    • /
    • pp.47-58
    • /
    • 2009
  • The information protection security diagnosis institution was applied services since 2004, for the leveling up of public information protection and the establishment of the stability and reliability of information communication. And this security diagnosis was implemented actually on the 142 firms in 2005, the 160 firms in 2006 and the 205 firms in 2007. But this is recognized by the some firms as one of the unnecessary regulations. And there are some difficulties with collecting the subjective and reliable source data for establishing the information protection security diagnosis target. In this research, the enhanced model on the selection of information protection security diagnosis target firms was suggested by the interview with some expert and the analysis for the related actual data. By the model which are introduced from the statistical analysis of the related data and the summary of some expert's suggestions, information protection security diagnosis target can include the information telecommunication service providers taking 5 billion won as sales in a year, and web service providers like as shopping mall site, with the personal records of 2 million subscribers.

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

The Study for Establishment of Security Threat Measures for Secure NFC Service (안전한 NFC 서비스 활용 활성화를 위한 보안 위협 대책 마련을 위한 고찰)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.219-228
    • /
    • 2018
  • The utilization of NFC has been continuously increasing due to the spread of smart phones and the development of short-range wireless communication networks. However, it has been suggested that stability and security of convenient NFC short-range wireless communications can be unstable and problematic. The unstable causes for NFC are the lack of security technologies for NFC, the controversy about personal information infringement, and the lack of social awareness on security breach against data settlement. NFC service can be conveniently used by simply touching other NFC devices and NFC tags through the NFC device. This thesis analyzes that NFC authentication technology, which is convenient for user are one of the unstable causes of security of NFC. This thesis suggest that ministry should research countermeasures and promote how users can use NFC safely. It also suggests that users should have awareness when they use payment and authentication service through NFC to prevent from security threat.

A Study on Unification of Legislation related to Private Security (한국 민간경비 관련법제 단일화 논의 - 경비업법과 청원경찰법을 중심으로)

  • Lee, Min hyung;Kang, Kyung soo;Kim, Jin hwan
    • Journal of the Society of Disaster Information
    • /
    • v.4 no.1
    • /
    • pp.70-83
    • /
    • 2008
  • The basic legislations regulating the private security in Korea are Private Security Business Act and Private Policeman Act. But this dualistic system of private security causes difficulties in unity and efficiency of private security operation and makes it complicated to supervise each personnel with effect. Besides despite similar service and duty, there is all the difference between private security guard and private policeman in regard of social position, pay, authority, and so on. Therefore it is suggested that the two Acts should be unified and the united private security act should be enacted. Legislating new private security act will lead to considering the detail legislative definition on qualification of personnels and business range.

  • PDF

A Study on the Satisfaction of Training of Security Guard Leader (경비지도사의 교육훈련만족도와 발전방안에 관한 연구 -일반경비지도사 기본교육훈련을 중심으로-)

  • Lee, Sang-Won
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.243-261
    • /
    • 2002
  • The role of security guard leader, it cannot be too emphatic as security supervisor who are training security guards and leading. It is also important that security guard leader make activity to a profession of private security by a professional training. An object of this study present satisfaction of training and make clear a developing plan positively through a survey about basic training of security guard leader. A method of this study, This paper used theoretical study, literature study and analyzed data of survey. This study will lead a important of private security of korea suggested a developing plan about training of the security guard leader by a following study.

  • PDF