• Title/Summary/Keyword: Private Security Service

Search Result 339, Processing Time 0.031 seconds

A study about the influence to the client system when using PKI-based authentication system (공개키 기반 인증체계의 사용이 클라이언트 시스템에 미치는 영향에 관한 연구)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.159-167
    • /
    • 2012
  • The authentication system of the PKI(public key infrastructure) provides the authenticity and security, accessibility, economic feasibility, and convenience to the service provider and users. Therefore the public and private companies in Korea widely use it as the authentication method of the web service. However, the safety client system is threatened by many vulnerable factors which possibly caused when using PKI-based authentication system. Thus, in this article vulnerable factors caused by using the PKI-based authentication system will be analyzed, which is expected to be the useful data afterwards for the construction of the new authentication system as well as performance improvement.

The Qualitative Study on the Triggering Factors of Private Security Guards' Stress (민간경호원의 스트레스 유발요인에 관한 질적연구)

  • Kim, Jin-Hwan
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.89-105
    • /
    • 2008
  • The aim of this study is to examine the primary causes of security guard's stress by conducting a survey of 50 guards engaging in security companies in Seoul and Gyeonggido. The following results are attained by an inductive content analysis of conviction interview data through in-depth interview of qualitative study method. 1. Factors of stress related to personal problems. The stress by personal problems is resulted from two factors. One is the physical strength inferiority, which leads to negative thoughts, dismay, mental conflict and tension. The other is complex about not-specializing security, which causes discord with his/her supervisor or co-workers and a feeling of uneasiness. 2. Factors of stress related to human relationship. The stress due to human relations is constantly resulted from discord with his/her supervisor and inclined to be accumulated. The mental conflict is elated in feeling that the manager's instructions are not right. So this factor makes them want change of occupation. Also working conditions are different from those of their friends, which causes them not to spend a lot of time with their friends. 3. Factors of stress related to domestic life It appears that most security guards are under stress due to their spouses' discontent with a small number of wages. Also it is reported that male guards are under stress in case of unhappy conjugal relations. And security guard's life is restricted much more than that of workers in a general occupation because of standing ready for mobilization and 24-hour service. So some of male guards experienced an early symptoms of a morbid suspicion about their wife's chastity and are suffering from insomnia as an occupational disease.

  • PDF

Security Analysis on the Home Trading System Service and Proposal of the Evaluation Criteria (홈트레이딩 시스템 서비스의 보안 취약점 분석 및 평가기준 제안)

  • Lee, Yun-Young;Choi, Hae-Lahng;Han, Jeong-Hoon;Hong, Su-Min;Lee, Sung-Jin;Shin, Dong-Hwi;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.115-137
    • /
    • 2008
  • As stock market gets bigger, use of HTS(Home Trading System) is getting increased in stock exchange. HTS provides lots of functions such as inquiry about stock quotations, investment counsel and so on. Thus, despite the fact that the functions fur convenience and usefulness are developed and used, security functions for privacy and trade safety are insufficient. In this paper, we analyze the security system of HTS service through the key-logging and sniffing and suggest that many private information is unintentionally exposed. We also find out a vulnerable point of the system, and show the advisable criteria of secure HTS.

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.

The Technology of Personal Cloud Computing and Market Research (퍼스널 클라우드 컴퓨팅의 기술과 시장 분석)

  • Shim, Hyun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.239-251
    • /
    • 2014
  • The personal cloud is a service which approaches the personal contents scattering to all terminals and online space at the personal information-oriented age in which the person's digital device including the Smart-phone, MID, PC, IPTV and etc, increases and the personal online service including the blog, E-mail, UCC, social network service and ect, rapidly increasing for the cloud computing regardless of the terminal anywhere independently and can provide the high vale added personalization service through the analysis of the contents and processing. The future of the personal cloud market is prospected through the service and technology which enhances the understanding about the cloud computing, that is the next generation IT paradigm which the world IT companies pay attention to, and is provided and business strategy analysis of the security and normalizing and related companies.

Ubiquitous Car Maintenance Services Using Augmented Reality and Context Awareness (증강현실을 활용한 상황인지기반의 편재형 자동차 정비 서비스)

  • Rhee, Gue-Won;Seo, Dong-Woo;Lee, Jae-Yeol
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.3
    • /
    • pp.171-181
    • /
    • 2007
  • Ubiquitous computing is a vision of our future computing lifestyle in which computer systems seamlessly integrate into our everyday lives, providing services and information in anywhere and anytime fashion. Augmented reality (AR) can naturally complement ubiquitous computing by providing an intuitive and collaborative visualization and simulation interface to a three-dimensional information space embedded within physical reality. This paper presents a service framework and its applications for providing context-aware u-car maintenance services using augmented reality, which can support a rich set of ubiquitous services and collaboration. It realizes bi-augmentation between physical and virtual spaces using augmented reality. It also offers a context processing module to acquire, interpret and disseminate context information. In particular, the context processing module considers user's preferences and security profile for providing private and customer-oriented services. The prototype system has been implemented to support 3D animation, TTS (Text-to-Speech), augmented manual, annotation, and pre- and post-augmentation services in ubiquitous car service environments.

A study on approach thesis of protection martial arts (경호기법에 입각한 경호무도의 학문적 접근)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.103-122
    • /
    • 2003
  • Protection sciences are new science. therefore, protection martial arts sciences are will studied be based on study of protection in order to supply high level by request. Moreover, It is reconstruction that protection martial arts masters education, systematic manage, certificate system, protection martial arts recognition certificate, protection martial arts equipment, practice of protection martial arts. Protection martial arts occurs on the unforeseen accident and body guarding, therefore martial arts concept of protection martial arts different general martial arts and sport. In order to develope of protection martial arts First, scientific thesis need of protection martial arts learning. Especially, aims of present protection martial arts is not protect oneself, protect the VIP to safely from all dangers is different thing with aims of general martial arts. Instinct that VIP protect rather than oneself should study and develop. Second, techniques and model of protection martial arts spread to who in connection with security service by systematic and organized. Preferentially, study of protection martial arts Techniques and model possible the protection martial arts learned society, found laboratory and endowed protection martial arts society organize and prevention for random of protection martial arts and must make the original protection martial arts. Third, protection martial arts official certificate and license system must organize in order to training and manage of protection martial art master, Match director(First Second), life physical director(First, Second, Third) is systematically manage by Ministry of Culture & Tourism Republic of Korea. Like this protection martial arts also classify the certificate by scholarship and experience. Fourth, In union to university, private security service company, public institution, police and system that possible leaning to protection martial arts certificate course important. In addition, destroy the commercial character of present martial arts and cultivate the pure martial arts mind, should develop to martial arts in order to improve the humanism and temperament of right body guard.

  • PDF

The legal issues on the fintech and e-commerce payment (전자상거래 지급결제의 핀테크 활성화를 위한 보안 및 법제도적 과제)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.25-31
    • /
    • 2015
  • While information and communication develop, the Electronic commerce payment system is progressing. Recently, a government established the electronic commerce activation policy which simplified a payment Through this policy, the information which the financial company monopolizes can be fused with the other industry and create the popularization use of the electronic payment service and value added services. But on the other hand, the concern for the security is very high, Accordingly, the finnancial institute take a restriction of the requirements for the participation company according to the financial scale, this policy is led by the private institue, rather making a participation of fin tech venture difficulty. This paper tries to deal with the technical and legal problems for the activation of electronic payment system and fin tech. So I will examine the security matter that follows in grifting the innovation technology onto the existing payment service and propose a desirable way to improve the current legislation.

Key Factors in the Growth of Security Market and the future of Korean Security Industry (시큐리티 산업의 성장요인과 국내 시장전망)

  • Lee, Hyun-Hee
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.383-402
    • /
    • 2007
  • World security market has continuously been growing since the 2000s. The growth rate seems to reach up to 7-8% annually. What is more, Korea is expected to be one of the most rapidly developing markets, Based of this view, this research investigates the principal drivers to have affected on the expansion of Korean security market over the past 20 years. In addition to that, this study also examines the influence of recent changes in the world economy and globalization, socio-demographic change, development of information technology on the future security market. The data reviewed in this study are official crime rates, socio-economic indicators, statistics from the National Police Agency and the business reports of a leading private security company. This study shows that several factors such as rising crime rates, lack of police capacities, national economic growth and rising household income have played important roles in development of Korean market. It is also expected to keep those positive affects on the future market. On the other side, in recent years, the security market seems to be increasingly affected by new social economic changes. Those are impact of last aging society, rapid increase of individual household and women's participation in labor market. These factors seem to increase personal and household needs for security service. World economy, globalization process and development of information technology are also deemed to give rise to social demands for surveillance, monitoring service and security in cyber space.

  • PDF

Design and Evaluation Security Control Iconology for Big Data Processing (빅데이터 처리를 위한 보안관제 시각화 구현과 평가)

  • Jeon, Sang June;Yun, Seong Yul;Kim, Jeong Ho
    • Journal of Platform Technology
    • /
    • v.8 no.4
    • /
    • pp.38-46
    • /
    • 2020
  • This study describes how to build a security control system using an open source big data solution so that private companies can build an overall security control infrastructure. In particular, the infrastructure was built using the Elastic Stack, one of the free open source big data analysis solutions, as a way to shorten the cost and development time when building a security control system. A comparative experiment was conducted. In addition, as a result of comparing and analyzing the functions, convenience, service and technical support of the two solution, it was found that the Elastic Stack has advantages in the security control of Big Data in terms of community and open solution. Using the Elastic Stack, security logs were collected, analyzed, and visualized step by step to create a dashboard, input large logs, and measure the search speed. Through this, we discovered the possibility of the Elastic Stack as a big data analysis solution that could replace Splunk.

  • PDF