• Title/Summary/Keyword: Managed Security

Search Result 271, Processing Time 0.029 seconds

A Study on the Procedure Model to Carry on Works of the Private Security Company (민간경비업체의 업무 수행 절차 및 모델 설정에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.47-65
    • /
    • 2003
  • In Korea, Private security companies has steadily grown and amounts to 2,051 places as of November 30, 2002. Private security in korea is carrying out firm name role assignment to have held the police and public peace environment change factors for a standard faithfully, and protects social a little property that is a basic purpose, and it is spare no efforts in loss prevention. In spite of numeral increase of private security companies, private security companies have many problem. Moreover, they mostly did not have any remarkable in-house expertises in their own business under tough conditions. Under the unfavorable circumstances including insufficient investment and education in private security guard, there have been actually little further studies on private security business in practices. So this study mainly focused on addressing the installation security business managed by authorized companies, which amount to 96%(1,963 companies) of total 2,051 domestic security companies. Furthermore, the study formulated and modeled a series of business procedures in private security companies. A series of business procedures of private security companies can be modeled as follows : Setting of a business scope and aim market ${\Rightarrow}$ Marketing, Contact from customers(On-line or Off-line) ${\Rightarrow}$ Diagnosis of security target ${\Rightarrow}$ Submission of security operational plan ${\Rightarrow}$ Estimation of security operational plan ${\cdot}$ decision ${\Rightarrow}$ Contract ${\Rightarrow}$ Employment, selection of security guards ${\Rightarrow}$ Nomination of security guard instructors ${\Rightarrow}$ Education & training of security guards ${\Rightarrow}$ subscribe to insurance of damage liability ${\Rightarrow}$ Commitment and placement of security guards ${\Rightarrow}$ Establishment and preparation of security planning ${\Rightarrow}$ Field management and procurement of relevant security service.

  • PDF

A study on Improved Convergence Security Monitoring System model (융합보안관제시스템 개선에 관한 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.3-12
    • /
    • 2011
  • According to the NIS, damages due to leaking industrial technology are reaching tens of trillion won. The type of damages are classified according to insider leaks, joint research, and hacking, illegal technology leaks and collaborated camouflaged. But 80% of them turned out to be an insider leak about connecting with physical security. The convergence of IT and non IT is accelerating, and the boundaries between all area are crumbling. Information Security Industry has grown continuously focusing Private Information Security which is gradually expanding to Knowledge Information Security Industry, but Information Security Industry hereafter is concentrated with convergence of IT Security Technology and product, convergence of IT Security and Physical Security, and IT convergence Industry Security. In this paper, for preventing company information leaks, logical security and physical security both of them are managed at the same level. In particular, using convergence of physical security systems (access control systems, video security systems, and others) and IT integrated security control system, convergence security monitoring model is proposed that is the prevention of external attacks and insider leaks, blocked and how to maximize the synergy effect of the analysis.

Comparative analysis of blockchain trilemma

  • Soonduck Yoo
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.41-52
    • /
    • 2023
  • The purpose of this study is to review the proposed solutions to the Blockchain trilemma put forward by various research scholars and to draw conclusions by comparing the findings of each study. We found that the models so far developed either compromise scalability, decentralization, or security. The first model compromises decentralization. By partially centralizing the network, transaction processing speed can be improved, but security strength is weakened. Examples of this include Algorand and EOS. Because Algorand randomly selects the node that decides the consensus, the security of Algorand is better than EOS, wherein a designated selector decides. The second model recognizes that scalability causes a delay in speed when transactions are included in a block, reducing the system's efficiency. Compromising scalability makes it possible to increase decentralization. Representative examples include Bitcoin and Ethereum. Bitcoin is more vital than Ethereum in terms of security, but in terms of scalability, Ethereum is superior to Bitcoin. In the third model, information is stored and managed through various procedures at the expense of security. The application case is to weaken security by applying a layer 1 or 2 solution that stores and reroutes information. The expected effect of this study is to provide a new perspective on the trilemma debate and to stimulate interest in continued research into the problem.

A study on Technology for Performance of Network Configuration Management (네트워크 구성관리 성능 향상을 위한 기법 연구)

  • Kang, Hyun Joong;Han, Jeong-Soo
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.47-55
    • /
    • 2004
  • Currently used to manage a whole bunch of networks is the Client/Server Network Management Technique in which a central manager system supports a number of managed ones. Unfortunately it has a big drawback: wasting network resources, most of all bandwidth, which is mainly caused by too much traffic between the central manager system and the managed ones. In a way to overcome this weak point, we have designed a new type of system, a Configuration Management System (CMS), based on code mobility which has been used in distributed network management systems. In this thesis we have compared the CMS with the currently used network management system, identified class to make Mobile Code, and analyzed the techniques of other network management systems in order to verify the validity of the new system.

  • PDF

Research on Advanced Electronic Records Management Technology Using Digital Forensics (디지털 포렌식 기법을 적용한 전자기록물 관리기술 고도화 연구)

  • Yoo, Hyunguk;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.273-277
    • /
    • 2013
  • Recently, according with a sudden increase of records produced and stored by digital way, it becomes more important to maintain reliability and authenticity and to ensure legal effect when digital records are collected, preserved and managed. On the basis of domestic legal procedure law and record management-related legislation, this paper considered judicial admissibility of evidence on electronic records managed by National Archives of Korea and drew potential problems when these are submitted to court as a evidence. Also, this paper suggested a plan applying digital forensics technique to electronic records management to ensure admissibility of evidence about electronic records stored in National Archives of Korea.

CDOWatcher: Systematic, Data-driven Platform for Early Detection of Contagious Diseases Outbreaks

  • Albarrak, Abdullah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.77-86
    • /
    • 2022
  • The destructive impact of contagious diseases outbreaks on all life facets necessitates developing effective solutions to control these diseases outbreaks. This research proposes an end-to-end, data-driven platform which consists of multiple modules that are working in harmony to achieve a concrete goal: early detection of contagious diseases outbreaks (i.e., epidemic diseases detection). Achieving that goal enables decision makers and people in power to act promptly, resulting in robust prevention management of contagious diseases. It must be clear that the goal of this proposed platform is not to predict or forecast the spread of contagious diseases, rather, its goal is to promptly detect contagious diseases outbreaks as they happen. The front end of the proposed platform is a web-based dashboard that visualizes diseases outbreaks in real-time on a real map. These outbreaks are detected via another component of the platform which utilizes data mining techniques and algorithms on gathered datasets. Those gathered datasets are managed by yet another component. Specifically, a mobile application will be the main source of data to the platform. Being a vital component of the platform, the datasets are managed by a DBMS that is specifically tailored for this platform. Preliminary results are presented to showcase the performance of a prototype of the proposed platform.

User behavior analysis in No Disk System Configuration (No Disk System 환경에서의 사용자 행위 분석)

  • Kim, Deunghwa;Namgung, Jaeung;Park, Jungheum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.491-500
    • /
    • 2013
  • With the advent of big data and increased costs of SSD(HDD), domestic and foreign Internet cafes and organizations have adopted NDS(No Disk System) solution recently. NDS is a storage virtualization solution based on a kind of cloud computing. It manages Operating System and applications in the central server, which were originally managed by individual computers. This research will illustrate the way to analyze user's behaviors under NDS circumstance.

A Study on the New Vulnerability of Inducing Service Charge Doctoring SSID of Smartphone Based on Android (안드로이드폰 SSID 변조를 통한 새로운 과금 유발 취약점에 관한 연구)

  • Heo, Geon-Il;Yoo, Hong-Ryul;Park, Chan-Uk;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.21-30
    • /
    • 2010
  • Wireless network is one of the 2010's most important security issues. As smartphone is popularize, the number of Wireless Internet users is really growing and wireless AP spring up everywhere. But most wireless AP haven't being managed properly in terms of security, Wireless Internet users also don't recognize important of security. This situation causes grave security threats. This paper design and analyze a new cyber attack whose it circulates malware via QR code and activates Mobile AP to induce service charge. The new vulnerability we suggest forces to activate Mobile AP of smartphone based on Android and responds to all Probe Request are generated around, and brings induction of service charge and communication problems in its train.

Development of Managing Security Services System Protection Profile (보안관제시스템 보호프로파일 개발)

  • Son, Seung-Wan;Kim, Kwang-Seok;Choi, Jung-Won;Lee, Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.345-353
    • /
    • 2015
  • Security Management System is a system which operates in the security control center for security control. All living things across the Internet in recent years, with the rapid increase in the subscriber base has increased the need for network security dramatically depending on yirueojim through web services, thus cyber security sheriff, I have a big issue to build a security management system, each agency and perform control tasks. But the security functional requirements for security management system would not specified exactly, in developing a security management system to build and design a situation that PP's needs require a lot of trouble. In this paper, we develop a Managed Security System Protection Profile for the security functional requirements specification of the security management system.