• Title/Summary/Keyword: Information Security Professional

Search Result 190, Processing Time 0.023 seconds

The study of meanings and follow-up tasks for enactment of Assistive Technology Act in Korea (한국의 보조기기법 제정 의의와 후속과제에 대한 연구)

  • Nam, Se-hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.535-542
    • /
    • 2016
  • This study was to explore the meanings and follow-up tasks for enactment of Act on Supply and Utilization Promotion of Assistive Technology Devices for People with Disabilities and Seniors(Assistive Technology Act) in Korea. I conducted analysis about contents and establishment process of the Act. The study found meaningful effects ; it provided the basis for supporting assistive technology devices based on the social model, it led to an Implementation of the national obligations such as UN Convention on the Rights of Persons with Disabilities, it provided terms related to assistive technology. It is suggested to conduct follow-up studies and to put the efforts to strengthen additional laws for backing up the effective policy for extended support of assistive technology devices and for security of budget, for establishing regional service centers, for phasing of professional qualification, for controlling quality, for establishing an information system, and for promoting industries.

Influencing Factors on Outsourcing Success in the Defense Sector (국방부문의 아웃소싱 성공도에 영향을 미치는 요인에 관한 연구)

  • Yu, Dae Beom;Oh, Jay In
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.79-103
    • /
    • 2016
  • The Korean Army has to construct a system that will enable it to cope immediately with the flexible military relationships in Northeast Asia by systematizing and improving the efficiency of operations. These improvements include building a smart and strong army, concentrating on cost-effective combat skills, maximizing the utilization of private resources, and establishing a military structure based on information and technology. Accordingly, this study proposes solutions to solve the problems affecting the success of outsourcing in the defense industry. Unlike outsourcing in other government ministries, outsourcing in the national defense sector may be unrealistic because this strategy is related to the renovation project of the Ministry of the National Defense. In general, the objective of outsourcing in the defense industry, similar to other businesses, is to improve efficiency and not to reduce troops and national defense budget. Several factors, such as identification and security guarantee, risk reduction, cost saving, quality improvement, the reliability of enterprise, and professional technology, are necessary to ensure outsourcing success in the national defense sector. In terms of effectiveness, the improvement in service quality significantly influences outsourcing success in the national defense sector. Eventually, the national defense forces must be strengthened to prevent the provocative actions of North Korea and other threats by improving identification, sense of national security, and quality unlike the current outsourcing of the government, as well as emulating German GEBB or PMC, which utilizes social capital.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

An Authentication Model based Fingerprint Recognition for Electronic Medical Records System (지문인식 기반의 전자의무기록 시스템 인증 모델)

  • Lee, Yong-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.379-388
    • /
    • 2011
  • Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient's record. In order to protect the patient's privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user's private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

Human Capital as a Development Factor for Cultural and Creative Industries

  • Horban, Yurii;Dolbenko, Tetiana;Yaroshenko, Tetiana;Sokol, Oleksandr;Miatenko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.604-610
    • /
    • 2021
  • Human capital is the defining value of the national economy under market conditions. The manifestation of human capital is realized as an intellectual and creative capital, theoretically grounded and proven. The realization of intellectual capital is realized through the research creativity of scientists and researchers, and creative capital is manifested through artists and thinkers. Accordingly, creativity in market conditions forms a separate source of income and is an essential article in the formation of the GDP of the national economy. This research aims to analyze human capital from the perspective of cultural and creative industries. Research methods: systematization; comparative analysis of individual indicators of advanced countries of the world on the training system; statistical, taking into account macroeconomic indicators to assess the level of national creativity potential; system and logical analysis; method of information synthesis. Research results. The structural and quantitative composition of the factors of intellectual and creative capital formation has been systematized. The article proves that the unique properties of human capital, knowledge, creativity, experience and professional skills are the push factors of creativity development of the national economy and provide the priority development of creative and cultural industry that allows generating the added value on the national scale. The functions of creativity in the sphere of cultural industries are highlighted. It is noted that education and creativity of both intellectual and creative capital are the forming basis. The research of the world's advanced countries on the creativity index has pointed out the Netherlands as the leading country in the quantitative measurement of creativity. The economic development factors of the Netherlands were analyzed from the position of economic creativity, which allowed the formation of a two-factor model providing priority development of creativity in the cultural and creative industries.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

XMPP-based Vehicle messaging System for Collaboration and Contents Sharing (협업 및 콘텐츠 공유를 위한 XMPP기반 차량용 메시징 시스템)

  • Jung, Hun;Park, HaeWoo;KU, Jahyo
    • Journal of the Korea society of information convergence
    • /
    • v.5 no.2
    • /
    • pp.67-76
    • /
    • 2012
  • XML-based open protocol, XMPP users to pass messages to other users, which means that a decentralized communication network is the network infrastructure and enable it. In addition, XMPP servers using a professional server-to-server protocol to communicate with each other and decentralized social networks and collaboration framework provides an important possibility. In this paper, the features of XMPP messaging protocol is applicable to automotive telematics terminals XMPP-based platform design, and presence of two-way communication point for the problem, point-to-point session setup issues, security issues, compatibility issues, and to solve the scalability problem XMPP-based messaging system was implemented.

  • PDF

Factors Affecting Job Satisfaction of Cybersecurity Workforce: Focused on the Recent College Graduates (정보보호인력의 직무만족에 관한 연구 : 대졸 초기경력자를 중심으로)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.20 no.4
    • /
    • pp.53-68
    • /
    • 2021
  • Many organizations try to hire and retain a well-trained workforce to get their security level of IT assets and networks. However, most academic studies have focused on only how many workforces are needed to keep the secure function. We have to transit to other aspects of cybersecurity HRM studies because well-training workforces are not the problem of numbers but the quality. This study proves how the person-job fit and the work values impact job satisfaction of the cybersecurity workforce in early careers who graduated school recently and have a high turnover intention. The results of this study provide a lot of practical implications regarding job satisfaction of the cybersecurity workforce in an early career as follows. First, the major-job fit of the cybersecurity workforce doesn't influence job satisfaction, unlike other studies. Second, what graduates learned in college is little helpful in hands-on work, so retraining the cybersecurity workforce in an early career is very important. Third, the cybersecurity HRM plans have to center on realizing the self-realization of workforces to improve job satisfaction.

A Study on Standardization of Copyright Collective Management for Digital Contents (디지털콘덴츠 집중관리를 위한 표준화에 관한 연구)

  • 조윤희;황도열
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.301-320
    • /
    • 2003
  • The rapidly increasing use of the Internet and advancement of the communication network, the explosive growth of digital contents from personal home pages to professional information service the emerging file exchange service and the development of hacking techniques . these are some of the trends contributing to the spread of illegal reproduction and distribution of digital contents, thus threatening the exclusive copyrights of the creative works that should be legally protected Accordingly, there is urgent need for a digital copyright management system designed to provide centralized management while playing the role of bridge between the copyright owners and users for smooth trading of the rights to digital contents, reliable billing, security measures, and monitoring of illegal use. Therefore, in this study, I examined the requirements of laws and systems for the introduction of the centralized management system to support smooth distribution of digital contents, and also researched on the current status of domestic and international centralized management system for copyrights. Furthermore, 1 tried to provide basic materials for the standardization of digital contents copyright management information through the examination of the essential elements of the centralized digital contents management such as the system for unique identification the standardization for data elements, and the digital rights management (DHM) .