• Title/Summary/Keyword: Industry Security

Search Result 1,720, Processing Time 0.029 seconds

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

A Study on the Strengthening of Smart Factory Security in OT (Operational Technology) Environment (OT(Operational Technology) 환경에서 스마트팩토리 보안 강화 방안에 관한 연구)

  • Young Ho Kim;Kwang-Kyu Seo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.2
    • /
    • pp.123-128
    • /
    • 2024
  • Major countries are trying to expand the construction of smart factories by introducing ICT such as the Internet of Things, cloud, and big data into the manufacturing sector to secure national-level manufacturing competitiveness in the era of the 4th industrial revolution. In addition, Germany is pushing for Industry 4.0 to build a fully automatic production system through the Internet of Things, and China is pushing for the expansion of smart factories to enhance the country's industrial competitiveness through Made in China 2025, Japan's intelligent manufacturing system, and the Korean government's manufacturing innovation 3.0. In this study, considering the increasing security connectivity of smart factories, we would like to identify security threats in the external connection part of smart factories and suggest security enhancement measures based on domestic and international standard security models to respond to the identified security threats. Eventually the proposed method can be applied by accurately identifying the smart factory security status, diagnosing vulnerabilities, establishing appropriate improvement plans, and expanding security strategies to respond to security threats.

  • PDF

Enhancing Cyber-Physical Systems Security: A Comprehensive SRE Approach for Robust CPS Methodology

  • Shafiq ur Rehman
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.40-52
    • /
    • 2024
  • Cyber-Physical Systems (CPS) are introduced as complex, interconnected systems that combine physical components with computational elements and networking capabilities. They bridge the gap between the physical world and the digital world, enabling the monitoring and control of physical processes through embedded computing systems and networked communication. These systems introduce several security challenges. These challenges, if not addressed, can lead to vulnerabilities that may result in substantial losses. Therefore, it is crucial to thoroughly examine and address the security concerns associated with CPS to guarantee the safe and reliable operation of these systems. To handle these security concerns, different existing security requirements methods are considered but they were unable to produce required results because they were originally developed for software systems not for CPS and they are obsolete methods for CPS. In this paper, a Security Requirements Engineering Methodology for CPS (CPS-SREM) is proposed. A comparison of state-of-the-art methods (UMLSec, CLASP, SQUARE, SREP) and the proposed method is done and it has demonstrated that the proposed method performs better than existing SRE methods and enabling experts to uncover a broader spectrum of security requirements specific to CPS. Conclusion: The proposed method is also validated using a case study of the healthcare system and the results are promising. The proposed model will provide substantial advantages to both practitioners and researcher, assisting them in identifying the security requirements for CPS in Industry 4.0.

A Study on the Changes of US Policy in International Defense Industry Cooperation and the Fure Korea-US Defense Industry Cooperation (미국의 국제 방산협력 정책 변화와 한미 방산협력 방안 연구)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.35-44
    • /
    • 2014
  • It has been shown that the lack of sufficient defense industry cooperation between Korea and the US. The severe imbalance in defense trade between tow countries and Korea's weak defense industrial base has been a problem. This paper suggests the enhancement of defense industry cooperation with the US as a defense policy. The US policy has been changed to utilize the globalization of defense industries. The following cases were analyzed to show the policy change; The security of supply arrangement with 6 countries, the defense cooperation treaty with the United Kingdom and Australia. the defense Memorandum of Understanding with 23 countries, and the international cooperation with 8 countries for F-35 JSF program. Korea government needs to sign a defense MOU with U.S. and the defense industries are recommended to increase the opportunities of weapon system co-development and co-production. So that the Korea defense industry may improve competitiveness and to overcome the current weaknesses.

The Legal Structure of Guard & Security Contract and the Prevention & Resolution Method of Security Disputes (경호경비계약의 법적 구조 및 분쟁의 예방과 해결 방안)

  • Ahn, Sung-Cho
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.129-157
    • /
    • 2006
  • With rapid social change, by culminating the social hazards and the safety problems about it are on the increase too. According to the needs for the safety the demand of the private guard & security provided the safety and security service against danger is also increasing. As the need for the safety is increasing, so recently the private guard & security industry is extended. Therefore the purpose of this study is to grasp and carry out researches into the legal structure on the Security contract, is to analyze the formation of contract and find out the ensuing problem in order to prevent or settle the dispute which is apt to occur between the specific client and the security companies. In order to minimize the dispute going with security relationship in particular, it is necessary that one should write down the agreed contents as the document explicitly to make a security contract with the parties. Hereupon in the plan which standardizes the security contract with each parties autonomously, it is suggested that this study should present the model of Dispute Resolution Clause Especially it is the best means that it is amicable consultation or negotiation as the effective way of settlement methods of private dispute arising from the concerned parties. In inevitable case it recommends the method which solves the dispute by means of an arbitration than litigation at administration of justice(in terms of jurisdiction). If the parties wish to settle the disputes by arbitration, they must come to an arbitration agreement in the form of a arbitration clause in the security contract. After the test and evaluation through application utilizing it in actual security field, the security standard contract regulates about it and this terms should widely apply a individual case to whole industry.

  • PDF

A Study on the Competence of the Private Security Guards (민간경비원의 업무능력에 미치는 영향요인에 관한 연구)

  • Kim, Hak-Bum;Lee, Jae-Young
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.81-105
    • /
    • 2011
  • Lately, with the increase of the private security industry, individual quality improvement of the private security guards is rising. Especially, in accordance with competence of the private security guards, in the base of individual technical or knowledge, the confidence of own ability is essential for the improvement of the private security industry. In accordance with the private security guards, the study of their competence is rare. But through the study of teenagers or members of the public organization, we can know the influence of variables competence. The purpose of this study is to show how the self-esteem, need for Achievement, relation with co-worker and supervisor, and leadership effect on competence. Consequently this study will offer effective ways to develop the private security guards competence. We can show that self-esteem effects competence of the private security guards between the need for achievement and self-esteem which are adjusted as the individual characteristic. Namely, the higher the self-esteem of the private security guards is, the higher competence is. The study shows that the relation with co-worker and supervisor of the private security guards doesn't effect competence. Unlike the previous studies, this study proves that contingent reward has a positive effect on the Private Security Guards competence in the transactional leadership. That is, the higher the contingent reward of leader is, the higher the level of competence of the Private Security Guards is. Lastly, We can know individualized consideration effect the competence of the private security guards in the transformational leadership.

  • PDF

Surveillance over IP and its standardization (SoIP(Surveillance over IP)와 표준화)

  • Kim, Choon-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7B
    • /
    • pp.464-468
    • /
    • 2005
  • The DVR industry has been grown with their own, proprietary systems without the need of standards because the security products are independently installed in small scale and the communication needs are very limited. The industry might have tighter security than having standardized products, but the appearance of IP surveillance and the need of communications with IP products such as IP Phones and IP-PBX made the standardization unavoidable. In this paper, we built an IP surveillance system with SIP based session control and investigated the applications of it other than the security itself.

A Study on the Characteristics of Easy Payment Systems for Facilitating Online Sales (온라인 시장 활성화를 위한 간편결제 특성에 관한 연구)

  • Choi, Sujung;Kim, Changsik;Kwahk, Keeyoung;Kim, Heewoong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.259-271
    • /
    • 2016
  • This study develops an extended model to predict customer satisfaction in easy payment systems based on information systems success model. Our data was collected from easy payment systems users and analyzed using PLS. This study selected four variables as easy payment systems characteristics(convenience, variety, security, speed) along with gender being used as a moderating variable. The results showed that convenience and security are turned out to affect customer satisfaction. Additionally, the test of difference in gender revealed that with respect to gender, moderating effects exist in security and speed. This implies that this study can provide different promotion strategies according to gender. Overall, the proposed model could be used to predict customers' willingness to pay on the easy payment systems.

The Legal Justice of Conferring Criminal Negligence on Chief Privacy Officers(CPO) (개인정보관리자의 책임과 벌칙의 형평성)

  • Kim, Beom-Soo
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.21-32
    • /
    • 2011
  • The recently revised "Telecommunications Business Promotion and Personal Data Protection Act" is an important legal milestone in promoting the Korean telecommunications infrastructure and industry as well as protecting individuals' personal data and individuals' rights to privacy. Special characteristics of information security and privacy protection services including public goods' feature, adaptiveness, relativity, multi-dimensionality, and incompleteness, are reviewed. The responsibility of chief security/privacy officers in the IT industry, and the fairness and effectiveness of the criminal negligence in the Telecommunications Act are analyzed. An assessment of the rationale behind the act as well as a survey of related laws and cases in different countries, offers the following recommendations : i) revise the act and develop new systems for data protection, ii) grant a stay of execution or reduce the sentence given extenuating circumstances, or iii) use technical and managerial measures in data protection for exemption from criminal negligence.

Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks (WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석)

  • Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.