• Title/Summary/Keyword: Information Security Budget

Search Result 122, Processing Time 0.031 seconds

Extending Plans of the Role of ROK Navy vis-'a-vis the Expansion of Maritime Security Threats (해양안보위협의 확산에 따른 한국해군의 역할 확대방안)

  • Kil, Byung-ok
    • Strategy21
    • /
    • s.30
    • /
    • pp.63-98
    • /
    • 2012
  • Northeast Asia has a multi-layered security structure within which major economic and military powers both confront one another and cooperate at the same time. Major regional powers maintain mutually cooperative activities in the economic sphere while competing one another in order to secure a dominant position in the politico-military arena. The multifarious threats, posed by the North Korea's nuclear development, territorial disputes, and maritime demarcation line issues demonstrate that Northeast Asia suffers more from military conflicts and strifes than any other region in the world. Specifically, major maritime security threats include North Korea's nuclear proliferation and missile launching problems as well as military provocations nearby the Northern Limit Line(NLL) as witnessed in the Cheonan naval ship and Yeonpyong incidents. The ROK Navy has been supplementing its firm military readiness posture in consideration of North Korea's threats on the NLL. It has performed superb roles in defending the nation and establishing the Navy advanced and best picked. It also has been conducive to defend the nation from external military threats and invasion, secure the sea lanes of communications, and establish regional stability and world peace. In order to effectively cope with the strategic environment and future warfares, the ROK Navy needs to shift its military structure to one that is more information and technology intensive. In addition, it should consolidate the ROK-US alliance and extend military cooperative measures with neighboring countries in the Asia-Pacific region. Evolved steadily for the last 60 years, the ROK-US alliance format has contributed to peace and security on the Korean peninsula and in the Northeast Asian region. In conclusion, this manuscript contends that the ROK Navy should strive for the establishment of the following: (1) Construction of Jeju Naval Base; (2) Strategic Navy Equipped with War Deterrence Capabilities; (3) Korean-type of System of Systems; (4) Structure, Budget and Human Resources of the Naval Forces Similar to the Advanced Countries; and (5) Strategic Maritime Alliance and Alignment System as well as Domestic Governance Network for the Naval Families.

  • PDF

A Study on Cybersecurity Data Sharing System Model with a Hierarchical Structure for Effective Data Sharing (효과적인 데이터 공유를 위한 계층적 구조를 갖는 사이버 보안 데이터 공유시스템 모델 연구)

  • Ho-jei Yu;Chan-hee Kim;Ye-rim Cho;Sung-sik Im;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.39-54
    • /
    • 2022
  • Recently, the importance of collecting, analyzing, and real-time sharing of various cybersecurity data has emerged in order to effectively respond to intelligent and advanced cyber threats. To cope with this situation, Korea is making efforts to expand its cybersecurity data sharing system, but many private companies are unable to participate in the cybersecurity data sharing system due to a lack of budget and professionals to collect cybersecurity data. In order to solve such problems, this paper analyzes the research and development trends of existing domestic and foreign cyber security data sharing systems, and based on that, propose a cybersecurity data sharing system model with a hierarchical structure that considers the size of the organization and a step-by-step security policy that can be applied to the model. In the case of applying the model proposed in this paper, it is expected that various private companies can expand their participation in cybersecurity data sharing systems and use them to prepare a response system to respond quickly to intelligent security threats.

A study on Information Protection Manpower and Budget Adequacy for Cooperative-Type Financial Company's Federation (협동조합형 금융회사의 중앙회를 위한 정보보호 인력 및 예산의 적정성에 관한 연구)

  • Lim, Jung-hwan;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.29-38
    • /
    • 2016
  • A financial institution operated by cooperatives, abiding by the principle set by the cooperative federation, is comprised of a numerous financial institutions. Most of these small institutions are operated within local areas, providing financial services for coop members. The Financial Supervisory Regulations that supervises security professionals, organizations, and budgets are established entirely based on commercial banks in which the application of these regulations on coop financial institutions may not be proper. This paper aims to provide an efficient IT security policy for nation-wide financial institutions operated by the Cooperative Federation by analyzing its security personnel managements and adequacy.

A Study on the Current Situations of Knowledge Management Systems Introduction in Korean University Libraries (우리 나라 대학도서관의 지식관리시스템 도입현황에 관한 연구)

  • 손창식;신호균
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.459-470
    • /
    • 2002
  • The purpose of this study is to present the factors needed to introduce knowledge management systems to university libraries in Korea, to suggest various methods needed to offer much more improved services of a library than now by investigating the current situations about introducing such factors in national and pubic university libraries in Korea. Almost all of the 33 university libraries selected the subject of investigation have offered the on-line reference service, e-mail pushing service, and full text constructions out of the 11 knowledge management system elements presented in this study, but the other services else have been offered by less than half the number of the libraries. The findings suggest to greatly improve the current services of libraries such as information education and selective dissemination of information, and immediately to introduce new systems including e-book and wireless service systems in order to the university competitiveness. The study implies that each library has already introduced the knowledge management systems, in proportion to a budget of the library, ifs librarian number, and a degree restructuring organization, and that an introduction of knowledge management systems such as policy and culture of organization, its librarian number, and its related security of budget takes the most important role in improving services of a library.

  • PDF

A Study on Facilitators and Inhibitors to the Introduction of Outsourcing in the Hospital Information Systems in Korea (병원 정보시스템 아웃소싱 도입의 촉진 요인과 저해 요인에 관한 연구)

  • Choy, Soon;Shin, Hyeong-Sik;Choi, In-Young;Kim, Suk-Il
    • Journal of Preventive Medicine and Public Health
    • /
    • v.40 no.1
    • /
    • pp.64-70
    • /
    • 2007
  • Objectives : This study was conducted to investigate the current status of outsourcing in Korean hospital information systems and the factors influencing its introduction. Methods : The authors surveyed 136 hospitals located in Seoul and its surrounding vicinities from June 7 to June 23, 2006. The facilitators and inhibitors to outsourcing in hospital information systems were derived from literature and expert reviews. Multiple logistic regression analysis was applied to identify the major influencing factors on outsourcing in hospital information systems. Results : Eighty-six (63.2%) of the 136 hospitals surveyed, which were mainly tertiary hospitals, responded to using outsourcing for their hospital information systems. "Hardware and software maintenance and support," "application development," and "management of service and staff" were the major areas of outsourcing. Outsourcing had been employed for $4\sim7$ years by 45.5% of the hospitals and the proportion of the budget used for outsourcing was less than 20%. A need for an extension in outsourcing was agreed on by 76.5% of the hospitals. The multiple logistic regression analysis showed that both consumer satisfaction and security risk have an influence on hospital information system outsourcing. Conclusions : Outsourcing in hospital information systems is expected to increase just as in other industries. One primary facilitator to outsourcing in other industries is consumer satisfaction. We found that this was also a facilitator to outsourcing in hospital information systems. Security risk, which is usually considered an inhibitor to information technology outsourcing, was proven to be an inhibitor here as well. The results of this study may help hospital information systems establish a strategy and management plan for outsourcing.

Secured MPLS-based Mobile IP using the Private IP Address

  • Wiroon, Sriborrirux;Kim, Jeong-Beom;Rhe, Yun-Jung;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1289-1292
    • /
    • 2002
  • The number of connected computers in the Internet, which has reached a state in which its address space is becoming insufficient is exponentially increased. Also nowadays modern Laptops and Mobile terminal are being used more and more. As hewn, the number of available IPv4 address is limited and many organizations have limited budget to use the global address. So the way to overcome such problems is using private addresses in their networks. In addition, the use of private address makes the system more secure. Moreover, we have considered about supporting of the scalability of data forwarding processes of nodes in their network especially Mobile IP data communication. Thus, we propose the integration of MPLS and Mobile IP network. Also we propose the security services of a constrained LSP for the MPLS payloads.

  • PDF

Efficient countermeasures against e-terrorism (e-테러리즘의 효율적 통제방안)

  • Lee, Yoon-Ho;Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.271-289
    • /
    • 2009
  • In e-terrorism, terrorists use cyber spaces including the internet in order to strike terror into the heart of a nation. It is revealed that recently happening terror cases use cyber spaces as a strategic tool. This research aims to investigate efficient countermeasures against various types of terror attacks made by terrorists and their cyber networking, in order to contribute to the prevention of terrors from a modern standpoint. Based on the results of the investigation, relevant problems are suggested such that terrors are not cases happening in a specific country only because they take place in cyber spaces, that hacking incidents frequently happen in Korea which is used as a footstool by foreign hackers, and that Korea has poor professional security manpower and foundational facilities in comparison with other advanced countries. Answers to the problems include cultivating cyber information manpower to cope with e-terrorism, making an appropriate budget, setting up networks to integrate and systematize anti-e-terrorism organizations, and intensifying the collection of information of cyber attacks and the analysis of the information.

  • PDF

Analysis of the Present Status and Future Prospects for Smart Agriculture Technologies in South Korea Using National R&D Project Data

  • Lee, Sujin;Park, Jun-Hwan;Kim, EunSun;Jang, Wooseok
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.112-122
    • /
    • 2022
  • Food security and its sovereignty have become among the most important key issues due to changes in the international situation. Regarding these issues, many countries now give attention to smart agriculture, which would increase production efficiency through a data-based system. The Korean government also has attempted to promote smart agriculture by 1) implementing the agri-food ICT (information and communications technology) policy, and 2) increasing the R&D budget by more than double in recent years. However, its endeavors only centered on large-scale farms which a number of domestic farmers rarely utilized in their farming. To promote smart agriculture more effectively, we diagnosed the government R&D trends of smart agriculture based on NTIS (National Science and Technology Information Service) data. We identified the research trends for each R&D period by analyzing three pieces of information: the regional information, research actor, and topic. Based on these findings, we could suggest systematic R&D directions and implications.

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

Intelligence in the Internet Era: Understanding OSINT and Case Analysis (인터넷 시대의 정보활동: OSINT의 이해와 적용사례분석)

  • Lee, Wan-Hee;Yun, Min-Woo;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.259-278
    • /
    • 2013
  • With advances of information technology (IT) and the Internet, it became much easier to search and collect information through many different types of web search engine. Such information only restricted to the intelligence services became available to the public, and the increased open source changed the intelligence collection activities of governments. Open Source Intelligence (OSINT) was introduced to organize and analyze the large volumes of information. OSINT is actively used after the 9/11 terrorist attack, and the United States government invest a huge amount of budget to conduct research and develope technology about OSINT. Although many Western countries recognize the importance of OSINT and deal with open source as priority, South Korea has not fully understand the important role of OSINT. Therefore, this study introduces the fundamental principles of OSINT and provides practical examples of OSINT usage. OSINT is an effective source to prevent terrorist attacks as well as a variety of crimes. Extensive discussion and suggestions for future usages are provided.

  • PDF