• Title/Summary/Keyword: National Information Service(NIS)

Search Result 7, Processing Time 0.021 seconds

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF

Parkinson's Disease as Risk Factor in Osteoporosis and Osteoporotic Vertebral Fracture : Prevalence Study Using National Inpatient Sample Database in Korea

  • Lee, Jin Yong;Lim, Nam Gu;Chung, Chun Kee;Lee, Jee-Young;Kim, Hyun Joo;Park, Sung Bae
    • Journal of Korean Neurosurgical Society
    • /
    • v.62 no.1
    • /
    • pp.71-82
    • /
    • 2019
  • Objective : To determine the prevalence of osteoporosis (OP) and osteoporotic vertebral fracture (OVF) in people with Parkinson's disease (PD) in Korea and its association with socioeconomic status. Methods : Using Health Insurance Review and Assessment Service-National Inpatient Sample (HIRA-NIS) data from 2009 to 2013, we estimated the annual prevalence of PD, OP, and OVF and investigated its association with socioeconomic status using data from National Health Insurance (NHI) beneficiaries and Medical Aid (MA) recipients. This study was supported by research funding from Korean Society for Bone and Mineral Research 2015. There were no study-specific biases related to conflicts of interest. Results : The number of PD patients in the HIRA-NIS increased each year from 2009 to 2013. Among patients with PD, the standardized prevalence rates of OP and OVF increased from 2009 to 2013; from 23.2 to 27.8 and from 2.8 to 4.2, respectively. Among patients with PD with OP, the prevalence of OVF were 12.2% and 15.1% in 2009 and 2013, respectively. The standardized prevalence rates of PD with OP and PD with OVF were significantly higher in MA recipients than in NHI beneficiaries. Conclusion : The prevalence of PD both with OP and with OVF increased and the prevalence was higher in MA recipients than in NHI beneficiaries. These findings may suggest that age over 65 years, female and low income may be a significant factor related to PD occurring with OP and OVF.

An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response (보안관제 효율성 제고를 위한 실증적 분석 기반 보안이벤트 자동검증 방법)

  • Kim, Kyu-Il;Park, Hark-Soo;Choi, Ji-Yeon;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.507-522
    • /
    • 2014
  • Domestic CERTs are carrying out monitoring and response against cyber attacks using security devices(e.g., IDS, TMS, etc) based on signatures. Particularly, in case of public and research institutes, about 30 security monitoring and response centers are being operated under National Cyber Security Center(NCSC) of National Intelligence Service(NIS). They are mainly using Threat Management System(TMS) for providing security monitoring and response service. Since TMS raises a large amount of security events and most of them are not related to real cyber attacks, security analyst who carries out the security monitoring and response suffers from analyzing all the TMS events and finding out real cyber attacks from them. Also, since the security monitoring and response tasks depend on security analyst's know-how, there is a fatal problem in that they tend to focus on analyzing specific security events, so that it is unable to analyze and respond unknown cyber attacks. Therefore, we propose automated verification method of security events based on their empirical analysis to improve performance of security monitoring and response.

A Study on Voice over Internet Protocol Security Response Model for Administrative Agency (행정기관 인터넷전화 보안 대응 모델 개발 연구)

  • Park, Dea-Woo;Yang, Jong-Han
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.237-240
    • /
    • 2011
  • Voice over Internet Protocol calls using administrative agency to build a national information and communication service, 'C' group, providers, the KT, SK Broadband, LG U+, Samsung SDS, as there are four operators. To prepare for an attack on Voice over Internet Protocol for administrative agency, security is a need for research to support the model. In this paper, the Internet telephone business of Administrative Agency to investigate and analyze the specific security measures to respond. Should set priorities around confidentiality about five security threats from NIS to Study of Voice over Internet Protocol Security Response Model for Administrative Agency. (1) Illegal wiretapping, (2) call interception, (3) service misuse, (4) denial of service attacks, (5) spam attacks, write about and analyze attack scenarios. In this paper, an analysis of protection by security threats and security breaches through a step-by-step system to address the research study is a step-by-step development of the corresponding model.

  • PDF

Comparison of The ISMS Difference for Private and Public Sector (민간기업과 공공기관의 정보보호 관리체계 차이 비교)

  • Kim, Ji-Sook;Lee, Soo-Yeun;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.117-129
    • /
    • 2010
  • To support the establishment of Information Security Management System, the private sector and the public sector have taken some measures. In the private sector, KISA(Korea Internet & Security Agency) has certified ISMS system based on "The Act on Communication Network Use Promotion and Information Security etc.". In the public sector, No authentication system has been established. Instead, NIS(National Intelligence Service) has enforced 'Information Security Management Condition Evaluation' based on "Electronic Government Act". This article compared ISMS control parts of the private sector with that of the public sector and analyzed the non-enforcement parts of ISMS implementing two sectors for years. Based on this, I would like to consider the method of establishment for efficient ISMS.

Investigating the Level of Competition between Public Health Centers and Private Clinics in Korea

  • Kim, Hyun Joo;Lee, Jin Yong;Jo, Min-Woo;Eun, Sang Jun
    • Korea Journal of Hospital Management
    • /
    • v.21 no.2
    • /
    • pp.37-49
    • /
    • 2016
  • The purpose of this study is to investigate the level of competition between Public Health Centers (PHCs) and private clinics (PCs) by examining the number of patients that used PHCs vs. PCs, estimating the total amount of revenue generated from outpatient services at both PHCs and PCs, thereby analyzing the financial impacts on PCs derived from the PHCs. We utilized 2011 National Inpatient Sample data (NIS). Using the 20 table containing general information on each individual claims, we integrate it with the 40 table which contains all the diagnostic codes for each claim. Then, we disaggregate the bundled claims into the original individual claims. Overall, 3.1% of outpatient visits are made at PHCs while the rest was made at the PCs (96.9%). Among the total claim costs of 6.34 billion USD (as of 2011), PHCs occupy 2.0% (124 million USD), and 98.0% are contributed to PCs (6.21 billion USD). The estimated economic losses of PCs due to PHCs are summarized as follow; the maximum potential loss is estimated at 198 million USD in total and 7,099 USD per clinic when we include all patient types; the minimum loss is estimated at 71 million USD in total and 2,540 USD per clinic where Medical Aid recipients and the elderly (aged 65 and over) are excluded. Our results confirm the potential economic effect on PCs due to PHCs providing outpatient services. PCs and PHCs are the most important players providing primary care in Korea. Unnecessary competition between PCs and PHCs is not desirable. Health authorities should carefully examine the healthcare services currently provided by PHCs and their impacts on PCs.

A Study on the Major Country's Domestic Intelligence Operation and Architecture: Focusing on UK, USA, France and Korea (주요 국가의 국내정보 활동 및 조직체계 연구 : 영국·미국·프랑스·우리나라의 국내정보기구를 중심으로)

  • Moon, Kyeong-Hwan
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.153-183
    • /
    • 2014
  • Nowadays, proactive intelligence activities are required because of enhanced nation wide threats of terrorism and complexity of multidimensional factors of national security. South Korea not only need to draw up plans of information sharing among agencies for more effective national intelligence activities, but also have to evaluate the structure of Domestic Intelligence Agency and its right direction of activities. In this vein, this paper conducts comparative studies of structures and range of activities of intelligence Agencies by reviewing U.K, U.S.A, and France cases and suggests a potential model of 'domestic information specified agency' that we can adopt and methods to share information among agencies. The focus of this paper is on the reviewing of necessity of establishing new 'domestic information specified agency' which will mainly conduct anti-terrorism and counterintelligence activities, and its appropriate form. After reviewing the cases of U.K, U.S.A. and France, we conclude that overcoming the people's distrust about an invasion of freedom and rights caused by centralized and integrated independent intelligence agency is a prerequisite. Disputable issues of FBI, DHS, and South Korea's intelligence agency cases suggest that plans for restoring trust have to be considered if a new 'domestic information specified agency' is established in NIS. If it is established under government ministries such as MSPA focusing on implementing anti-terrorism and counterintelligence activities, organizations such as NCTC, NIC, that can carry out information sharing and cooperating with agencies concerned have to be established. Additionally, measures to solve structural problems caused by carrying out law enforcement functions by domestic information specified agency should be considered.

  • PDF