• Title/Summary/Keyword: Industrial Security Programs

Search Result 58, Processing Time 0.023 seconds

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

A Study on the Establishment of Industrial Security Education Programs in Korea (한국 산업보안교육 프로그램의 정립에 관한 연구)

  • Choi, Sun-Tae;Yu, Hyeong-Chang
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.185-208
    • /
    • 2010
  • This study is to suggest the current security education programs and improvement of industrial security curriculums in Korea. We live in a world of insecurity; the world is changing at an ever accelerating pace. Life, society, economics, international relations, and security risk are becoming more and more complex. The nature of work, travel, recreation, and communication is radically changing. We live in a world where, seemingly with each passing year, the past is less and less's guide to the future. Security is involved in on one way or another in virtually every decision we make and every activity we undertake. The global environment has never been more volatile, and societal expectations for industrial security and increasing if anything. The complexities of globalization, public expectation, regulatory requirements, transnational issues, jurisdictional risks, crime, terrorism, advances in information technology, cyber attacks, and pandemics have created a security risk environment that has never been more challenging. We had to educate industrial security professional to cope with new security risk. But, how relevant is a college education to the security professional? A college degree will not guarantee a job or advancement opportunities. But, with a college and professional training, a person has improved chances for obtaining a favored position. Commonly, Security education and experience are top considerations to find a job so far, also training is important. Today, Security is good source to gain competitive advantage in global business. The future of security education is prospect when one considers the growth evident in the field. Modern people are very security-conscious today, so now we had to set up close relevant industrial security programs to cope with new security risk being offered in colleges or several security professional educational courses.

  • PDF

A Study on Computer Security and Controls (Computer Security에 관한 소고 - 사고범죄예방을 중심으로 -)

  • 이종철
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.4 no.4
    • /
    • pp.25-34
    • /
    • 1981
  • Recently there has been a marked increase in concern for security in computerized operations. The purposes of computer security controls are to protect against the unauthorized access to and modification of data processing resources, unauthorised access to and modification of data files and software, and the misuse of authorized activities. The controls relate to the physical security of the data processing department and of the areas within the data processing department : to the security of the data files, programs, and system software : and to the human interaction with the data files, programs, and system software. The controls that will be discussed in this paper include : I. Risk on the computer use. II. Methods of risk counter measure. III. Role of system auditing.

  • PDF

Development of Small Farms in the Agro-Industrial Complex

  • Petrunenko, Iaroslav;Pohrishchuk, Oleg;Plotnikova, Mariia;Zolotnytska, Yuliia;Dligach, Andrii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.287-294
    • /
    • 2021
  • Modern small farms are important link components in the structure of the world agro-industrial complex. It ensures the food and nutritional sustainability of the country exclusively at the local regional level. The purpose of the research is to examine the role of farming in ensuring nutritional security and food stability based on the analysis of the Food Sustainability Index (FSI). Research methods: modeling, abstraction, analogy, analysis, synthesis, formalization, logical abstraction, theoretical cognition, systematization and classification, abstract-logical, etc. Results. Having analyzed the Food Sustainability Index for 2018, it has been established that there is a lack of a clear relationship between the pace of economic development and the level of food and nutritional sustainability. In addition, this study has identified the countries with the largest number of small farms, as well as the number of farms within the region. The correlation between the size of the farm and the area of agricultural land that it cultivates has been determined. The problems faced by small farms in the process of their activity have been analyzed. The programs implemented in the field of agro-industrial complex development by international profile institutions have been systematized. Particularly, the regional structure of agricultural development programs under the guidance of IFAD is defined, as well as the areas to which they are directed. Specific measures taken by governments to stimulate the development of small farms have been outlined. Reasonable conclusions have been formed based on the study. The direction of future research is seen in the assessment of the export potential of small farms in terms of range, volume of export deliveries and geographical direction of movement of their products.

A Study on Mobile Game Security Threats by Analyzing Malicious Behavior of Auto Program of Clash of Clans (클래시 오브 클랜 오토 프로그램의 악성 행위 분석을 통한 모바일 게임 보안 위협에 관한 연구)

  • Heo, Geon Il;Heo, Cheong Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1361-1376
    • /
    • 2015
  • Recently, the size of the mobile game market and the number of mobile game users are growing. Also, as the mobile game's life cycle is increasing at the same time, auto program issue reappears which has been appeared in PC online games. Gamers usually tend to ignore warning messages from antivirus programs and even worse they delete antivirus program to execute auto programs. Therefore, mobile game users are easily compromised if the auto program performs malicious behaviors not only for the original features. In this paper, we analyze whether seven auto programs of "clash of clans" which has a lot more users for a long time perform malicious behaviors or not. We forecast the possible security threats in near future and proposed countermeasures based on this analysis. By analyzing auto programs of highly popular mobile game of today, we can acquire the knowledge on auto program's recent trend such as their development platform, operating mode, etc. This analysis will help security analysts predict auto program's evolving trends and block potential threats in advance.

A Study on Government Support for Logistics Security (물류보안 인증을 위한 정부지원 방안 연구)

  • Lee, DonHee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.6
    • /
    • pp.109-123
    • /
    • 2016
  • This study investigates the importance of government's support for logistics security assurance through certification programs. First, the study analyzed priorities among the requirements of logistics firms through Analytic Hierarchy Process(AHP) and Quality Function Deployment(QFD) approaches. For this process we invited 21 logistics experts to assess the relationships between logistic firms' requirements and government policies regarding logistics security using the house of quality, a set of matrices of QFD. The results of this phase of the study revealed the priorities of logistics firms' goals regarding the diffusion of the government security certification program as follows: integrated logistics security systems(40.3%), strengthening government support systems(32.4%), and operational effectiveness of logistics security certification(27.2%). Second, a relative weights applied QFD method based on AHP was applied to determined the expected outcome of the logistics security certification program. The results indicated as follows: productivity improvement(28.4%), improved level of service(26.7%), logistics cost reduction(21.6%), advanced information systems(19.7%), and improved environmental protection(3.6%). The results of this study provide new insights concerning logistics firms' requirements for supply chain security and the importance of government's support policies through logistics security certification programs.

The Analysis of the Differences in the SME's Perception about Industrial Technology Security Support Policy (산업기술 보안 지원정책에 대한 중소기업의 인식차이 분석)

  • Jung, Yuhan;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.15-32
    • /
    • 2020
  • Increasing uncertainties in the technological innovation environment and increasing technology competition also present new challenges in terms of industrial technology security. Therefore, the purpose of this study was to identify the direction of policy change necessary for the improvement of related policies in the future by examining the importance and implementation of the government's industrial technology security support policies for small and medium-sized enterprises engaged in industrial technology innovation activities. As a result of the analysis, first of all, small and medium-sized enterprises that responded to the government's industrial technology security support policy were perceived to be less performing than the importance of the program. These results can be said to mean that selective budget expansion for related policy programs may be necessary, along with efforts to improve the quality of each program. Second, an analysis of the differences in group recognition between new technology certification firms and industrial technology verification(certification) companies showed that significant differences exist between groups for the program. These results suggest that more effective operation of the relevant policies may require policy enforcement in consideration of the level of security and will of each company in industrial technology, as much as the quantitative characteristics of the entity. This study is meaningful in providing the necessary policy directional basic information for the design and execution of more specific and effective industrial technology security policies by presenting empirical research results that domestic small and medium-sized enterprises are aware of about the government's industrial technology security policies.

The End-to-End Encryption for Enhancing Safety of Electronic Financial Transactions (전자금융거래의 안전성 강화를 위한 종단간 암호화)

  • Seung, Jae-Mo;Lee, Su-Mi;Ahn, Seung-Ho;Noh, Bong-Nam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1920-1925
    • /
    • 2009
  • '05. June, the first Internet banking accident occurred by the malignant cord. It discontinued security programs for protecting important financial informations. A computer hacker had made a collation of password, OTP(One Time Password) values etc and illegally withdraw one´s savings from the bank using the financial information. The attackers are continuously attempted with the hacking tool under bypass security programs as the vaccine program or the personal fire-wall. Therefore, an electronic financial system should be composed with the goal which is to protect financial informations from user's terminal to a banking server. In this paper, we make an analysis of menaces in electronic financial transactions and explain considerable security issues to enhance safety in Internet banking, CD/ATM and mobile banking.

A Study on the Construction of an Urban Disaster Prevention System based on WSN/GIS

  • Lee, Jeong-Eun;Shin, Seong-Hyun;Hwang, Hyun-Suk;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1671-1678
    • /
    • 2007
  • In these days, Disaster Management Systems have still put emphasis on its recovery more than the prevention of disaster events. However, the countermeasure of restoration has limitations to prevent the caused loss because the disasters often happen and are massive. Therefore, we propose a disaster prevention system for supporting the safe urban. In this paper, we try to construct a real-time monitoring system to prevent disaster events using new technologies such as Wireless Sensor Networks (WSN) and Geographic Information System (GIS). As a prototype to simulate the fire disasters on real-time, we construct gas sensors and temperature sensors. Our system consists of a WSN system to collect data of the gas and temperature sensors and to monitor the situation information. Our contribution is to provide a prototype application to prevent the disasters from the fire by constructing a WSN system with gas and temperature sensors.

  • PDF

Learning from the ASIS International strategy for specialization and globalization (미국경비협회(ASIS)의 전문화와 세계화 전략에 관한 방문연구)

  • LEE, Sanghun
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.3-10
    • /
    • 2015
  • ASIS(American Society for Industrial Security) is already rationing their standard to the world and succeeded in organizing these professionals. In base of that result, there are the executions of the various programs in accordance with the specialization and globalization strategy over the last 60 years. This study looked at the overseas practices that strengthen the capacity of the internal security specialists and promote the development of knowledge and technology through the mutual visits between the network through a survey of ASIS. We can accept viable and sustainable growth strategy, specialization and globalization strategy, such as ASIS model for the various activities performed by the past 60 years to improve the efficiency of the country's private security activities. It will be something we ought to be a new starting point.