• Title/Summary/Keyword: Private security certification system

Search Result 36, Processing Time 0.017 seconds

Trend of standardization in the field of Industrial Security through ISO/TC 292 (ISO/TC 292에 의한 산업보안 분야 국제표준화의 동향)

  • Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.79-111
    • /
    • 2016
  • This study aims at analyzing the global trend of standardization in the field of Industrial Security through ISO/TC 292. It covers broad areas from risk management for industrial property protection and loss prevention through supply chain security, product and document fraud and counterfeiting countermeasures and control and community resilience. It also explores the historical background of the standardization in the security field, how ISO TC 292 came out as a leading group in order to standardize relevant security management systems. TC 292 deals with terminology, general security-related standards and supply chain security management. One of the major findings from this analysis is that security targets and threats are diversified and so organizations like enterprises should have proper flexibility to adapt themselves to new security environment and take appropriate resilience system to cope with the threats and incidents. Also the ISO standardization requires public or private entities to take holistic approaches in security management. Finally, it was found that South Korea has to prepare for this global trend of standardization in this field so that ISO certification market demand and the requirements for transnational trades can be well met.

  • PDF

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

A Study on the Level of BCMS(Business Continuity Management System) of Small and Medium Enterprises (중소기업의 재해경감활동관리체계 수준진단(Checklist)에 관한 연구)

  • Lee, Mi Sun;Kim, Min Ji;Kim, Do Yeon
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.4
    • /
    • pp.122-128
    • /
    • 2017
  • Recently, accidents such as human accidents are increasing rapidly due to natural disasters and changes in social conditions due to abnormal weather. As a result, damage has been causing massive damage unlike the past. In the case of small and medium enterprises excluding financial institutions and big company, there is no system for prevention and restoration for stable operation from various risks such as human and natural disasters. As the current disaster continues, public and private companies have raised the need for BCM, and with the introduction of the ISO22301 certification system, the company has been establishing and operating Enterprise Disaster Management Standards in the Ministry of Public Safety and Security since 2007. However, in most SMEs, it is hard to bear the input of internal labor and investment cost, and there is a lack of personnel with expertise to conduct BCM diagnosis. Therefore, in this paper, we will study the diagnosis level of enterprise continuity plan which is commonly used in Korea and abroad. Based on this, we will study the BCM system diagnosis method which can be applied to small and medium enterprises in Korea efficiently.

A Study on Job creation Using PMP in ISE development process (산업보안관리사 개발과정에서 PMP를 활용한 단계별 창직 연구)

  • Yim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.79-86
    • /
    • 2019
  • In a small sense Job creation is the making of certificate and In the big sense the government will create new industries and create jobs accordingly. therefore We used the most similar ISE as an example and linked it with the PMP of PMBOK. And I tried to standardize this process by deriving the detailed knowledge required for the foundation. As a result, eleven stages such as creation of (1) Job creation making plan (2) Offer on registration of private qualification (3) business process analysis (4) Confirmation of test criterion (5) Reception system development (6) Educational book development (7) Assist open lecture (8) TEST notice plan making (9) Implement training for certification (10) Operation of qualifying examination and Never ending training. Afterwards It will become the data for the development of the Professional making a job in the future.

Development of Career Management System with Rewarding Policy Considering the Ethereum Blockchain Performance (이더리움 블록체인의 성능을 고려한 보상정책을 갖는 이력관리 시스템 개발)

  • Jung-Min Hong;Ye-Jin Kim;Yu-Jeong Kim;Hye-Jeong Park;Eun-Seong Kang;Hyung-Jong Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.4
    • /
    • pp.59-67
    • /
    • 2023
  • Private blockchains can apply enhanced security policies that allow only authorized users to participate in the blockchain network. In addition, when used in a career management system where the validity of an individual's career is important, it has the suitable characteristics in terms of information integrity. However, due to the excessive performance requirements of blockchain technology, identifying performance characteristics through simulation can be helpful in stable operation of the system. This paper presents research results that utilized performance evaluation results while constructing a career management system based on the Ethereum blockchain. The service not only serves as a portfolio that records personal career development activities, certification acquisition, and award results, but also provides a community function for career planning to strengthen employment competitiveness. In addition, we present how a compensation policy can be executed to encourage users to participate in career development through community activities. In particular, an appropriate compensation policy was derived by reviewing changes in performance characteristics in accordance with the transaction volume on Geth nodes.

The Future of BlockChain Technology Leading Innovation in the Industrial Ecosystem (산업 생태계의 혁신을 선도할 블록체인 기술의 미래전망)

  • Kim, Jung-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.324-332
    • /
    • 2018
  • Blockchain technology has the potential to revolutionize trust models and business processes in a variety of industries. However, it is considered to be the initial stage of the system that pursues autonomy rather than efficiency, and it is necessary to monitor and inspect the distributed ledger technology from the price and introduction time as compared with the existing relational DB transaction technology. However, domestic and foreign private sectors have already been activated by applying block-chain technology in the national domain, and the block chain is devoid of doubt that it is an exaggerated technology, characterized by the invariance of the record, transparency, and autonomous execution of business rules. It has begun to be utilized in history, identity, certification and auditing in the financial industry as well as various industries. In this paper, we analyze the problems such as security weakness, insufficient regulatory environment, technical consensus and lack of common standard. In addition, the business sense and possibility of the block chain technology is expected to be the innovation of the industrial ecosystem by entering into the reality system from the concept through monitoring the actual introduction performance in the field of copyright, logistics, health care and environment.