• Title/Summary/Keyword: Information Security Professional

Search Result 186, Processing Time 0.032 seconds

The Process of Occupational Socialization of the Court Security Team (법원경비관리대의 직업사회화 과정 분석)

  • Park, Ok-Cheol;Kwon, Tae-Il
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.3
    • /
    • pp.276-286
    • /
    • 2012
  • The purposes of this study are to investigate various experience factors of the court security team's occupational socialization process and suggest basic materials which are necessary to establish educational service strategies of preliminary court security and guard. Therefore, in-depth interview and ethnographic study were conducted for 4 court securities whose career is more than 3 years. As the result, the process of occupational socialization process of the court security was divided into preparation period, adaptation period, conflict period and maturity period. In the preparation period, vision of university departments, acquisition of certificates and information of the court security team are the factors of basic stage for becoming court securities. In the adaptation period, they adapt themselves for playing their own roles sincerely and become professional manpower after being court securities, through the university educational program useful for practical duties, certificates for practical duties and occupational satisfaction. In the conflict period, they aware conflicts of the company and job stress, that court securities should experience, and endure them. In the maturity period, they are grown by one more step as court securities, through the motivation, job professionalism, occupational prospect and efforts of self-development.

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure (트럼프 행정부의 주요기반시설 사이버보안 정책분석에 관한 연구)

  • Kim, Geunhye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.907-918
    • /
    • 2019
  • The purpose of this study is to understand the cybersecurity policies and critical infrastructure protection of the United States through analyzing Donald Trump's administration executive orders, the national cyber strategy, and the legislation. The analysis has three findings. First, the Department of Homeland Security (DHS) became a main agent in the cybersecurity while the role of the White House was reduced. Second, Trump's administration expanded its role and mission in the policy area by extending the meaning of critical infrastructure. Third, in the case of cyber threats, the government can be involved in the operation of critical infrastructures in the private sector. The opinions of the professional bureaucrats and DHS were more reflected in the direction of the cybersecurity policy than those of the White House. In contrast to Barack Obama's administration, the Trump administration's cybersecurity strategies were not much studied. This study provides insights for improving cybersecurity policies and critical infrastructure protection.

Security Issues in Combined Protocol Between RFID Application and Wireless Sensor Network (RFID와 무선 센서네트워크를 융합한 프로토콜에서의 보안 문제)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.154-155
    • /
    • 2013
  • This paper presents a user authentication scheme for healthcare application using wireless sensor networks, where wireless sensors are used for patients monitoring. These medical sensors' sense the patient body data and transmit it to the professionals. Since, the data of an individual are highly vulnerable; it must ensures that patients medical vital signs are secure, and are not exposed to an unauthorized person. In this regards, we propose a user authentication scheme for healthcare application using medical sensor networks. The proposed scheme includes: a novel two-factor user authentication, where the healthcare professionals are authenticated before access the patient's body data; a secure session key is establish between the patient sensor node and the professional at the end of user authentication. Furthermore, the analysis shows that the proposed scheme is safeguard to various practical attacks and achieves efficiency at low computation cost.

  • PDF

Formation Of Digital Culture Of Scientific And Pedagogical Workers In The Conditions Of General Digitalization Of Education

  • Kononenko, Andrii;Smyrnova, Iryna;Rybalko, Petro;Obraz, Vasyl;Balakhovska, Yuliia;Prepotenska, Maryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.189-192
    • /
    • 2021
  • The article theoretically substantiated, developed and practically implemented a structural and functional model of the formation of ICT competence, taking into account interdisciplinary integration, defines the pedagogical conditions that contribute to the formation of ICT competence: interdisciplinary integration as a basis for building an interdisciplinary course, the content of which is aimed at the formation of ICT competence; the use of IEE, including information, didactic, technological components as a basis for the formation of ICT competence; integration of formal, non-formal and informal education for the implementation the integrity of the acquired knowledge, skills, experience as the basis for the formation of the ICT competence of teachers; creation and use of a set of tasks (educational (UZ), educational and methodological (UMP), educational and professional (UPZ)) as special tools for the formation of ICT competence.

Implementation of Intrusion Detection System Using Packet Capture (패킷캡쳐를 이용한 침입탐지 시스템의 구현)

  • 김영진;한승조
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.833-842
    • /
    • 2002
  • Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of use of computers. A attack of intruders using a vulnerability of operating system, protocol and application programs. And so, The attack methods is to be high technology and professional. Thus It must be necessity that we necessary a solution to structure, management for framework of information technology. This paper develope intrusion detecting system for separating intruders form critical system and design IDS model and implementation of it.

Implementation of Intrusion Detection System Using Network Packet Capture (네트워크 패킷 감사를 이용한 침입탐지시스템의 구현)

  • 김영진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.391-395
    • /
    • 2002
  • Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of use of computers. A attach of intruders using a vulnerability of operating system, protocol and application programs. And so, The attack methods is to be high technology and professional. Thus It must be necessity that we necessary a solution to structure, management for framework of information technology. This paper develope intrusion detecting system for separating intruders form critical system and design IDS model and implementation of it.

  • PDF

Information and Communication Technologies in the Main Types of Legal Activities

  • Kornev, Arkadiy;Lipen, Sergey;Zenin, Sergey;Tanimov, Oleg;Glazunov, Oleg
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.177-183
    • /
    • 2022
  • Thanks to the informatization of society, complex and high-tech devices are being introduced in all areas of human life, and the latest technologies are being actively improved in the modern, globalizing world. The article deals with the issues of using information and communication technologies in legal activities. It also covers the main types of such activities: law-making, law enforcement, and interpretive activity. Since there is an increase in the flow and accumulation of legal information, it is practically impossible to use traditional methods of working with legal information. The article considers and analyzes the role of information and communication technologies in modern legal activity. It is necessary to reveal the principles, concepts, conditions, and factors of their development and develop theoretical and practical recommendations for the use of such technologies in order to solve legal tasks. The authors of the article raise the issues of increasing the efficiency of legal activity, as well as the integration of information technologies into practical legal activity and their use for collecting, storing, searching, and issuing legal and reference information. Much attention is paid to the specific use of automated data banks and information retrieval systems in legal practice that ensure the accumulation, systematization, and effective search for legally important information. The development of such technologies leads to the creation of comfortable conditions for a lawyer in the course of their professional activity. Currently, legal activity cannot exist without telecommunication technologies, legal reference systems, and electronic programs. The authors believe that due to the use of the latest information technologies, the time for making legal decisions has significantly accelerated, the process of searching and systematizing evidence has been worked out, and it has become possible to quickly and efficiently find information on adopted laws and legal acts.

A study on DVB-SI based additional information transmission method of data service linked with movie information TV program (영화정보 프로그램 연동형 데이터서비스의 DVB-SI 기반 부가정보 전송 방법에 관한 연구)

  • Kwangilm KO
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.91-98
    • /
    • 2022
  • Because the movie has the characteristics of a cultural product where experience is important, a promotional strategy is used to convert viewers into movie audiences by providing indirect experiences of movies through professional movie information programs. Considering that the movie information program is a strategic publicity medium that raises the audience's intention to watch a movie, a study on the data service that provides useful additional information to the viewer in conjunction with the movie information program is meaningful. Against this background, this study contains the core research contents in the development of data service linked with movie information program. Specifically, additional information of the movie information program was defined. And to provide the additional information to the data service, the digital broadcasting international standard DVB-SI-based additional information transmission method was devised.

AIMS: AI based Mental Healthcare System

  • Ibrahim Alrashide;Hussain Alkhalifah;Abdul-Aziz Al-Momen;Ibrahim Alali;Ghazy Alshaikh;Atta-ur Rahman;Ashraf Saadeldeen;Khalid Aloup
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.225-234
    • /
    • 2023
  • In this era of information and communication technology (ICT), tremendous improvements have been witnessed in our daily lives. The impact of these technologies is subjective and negative or positive. For instance, ICT has brought a lot of ease and versatility in our lifestyles, on the other hand, its excessive use brings around issues related to physical and mental health etc. In this study, we are bridging these both aspects by proposing the idea of AI based mental healthcare (AIMS). In this regard, we aim to provide a platform where the patient can register to the system and take consultancy by providing their assessment by means of a chatbot. The chatbot will send the gathered information to the machine learning block. The machine learning model is already trained and predicts whether the patient needs a treatment by classifying him/her based on the assessment. This information is provided to the mental health practitioner (doctor, psychologist, psychiatrist, or therapist) as clinical decision support. Eventually, the practitioner will provide his/her suggestions to the patient via the proposed system. Additionally, the proposed system prioritizes care, support, privacy, and patient autonomy, all while using a friendly chatbot interface. By using technology like natural language processing and machine learning, the system can predict a patient's condition and recommend the right professional for further help, including in-person appointments if necessary. This not only raises awareness about mental health but also makes it easier for patients to start therapy.