• Title/Summary/Keyword: Private security certification system

Search Result 36, Processing Time 0.023 seconds

Practice and Improvement Scheme of Management of Human Resources in Korean Private Security Service Industry (한국 민간경비 인적자원 확보관리의 실태 및 개선방안)

  • Suh, Sang-Yul;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.81-99
    • /
    • 2008
  • Despite its legal, systematic and quantitative growth, Korean private security has not been showing satisfactory level of qualitative growth comparing to quantitative growth as it socially shocked with recent occurrence of the events and accidents. People on demand of security are making use of private security service to offset insufficient supply of security power as, especially, the incendiarism at Sungryemun last February brought out security issues for nationally important facilities and cultural assets, and other cases showed that the police would not cope with the appropriate security services under the current security system for protecting the life and property of people. For the supplementation of security power, the private security service is prevalent, but lots of service providers would not overcome its small business scale, except some large-sized security providers. There are some problem occurred as some providers employed staff who would not have the stuff for performing security service and they even committed illegal actions. Some opinions pointed out that it should come up with measures as they socially lose their credit. Therefore, this research suggests the recognition of the importance and the improvement measures of human resources management as follows. Security Service needs: 1. control of criteria for the employment/recruitment of human resources; 2. inducement of qualitative improvement of security service by ensuring excellent quality of human resources; 3. elevation of morale of organizational members with the operation of efficient promotion system; 4. introduction of professional certification system for the inflow of excellent quality of human resources.

  • PDF

A Study on Digital Certification Based on the Electronic Commerce (전자상거래기반하의 전자인증에 관한 연구)

  • 황상규;이재달
    • Journal of Korea Port Economic Association
    • /
    • v.19 no.1
    • /
    • pp.223-245
    • /
    • 2003
  • As a rapid development of electronic commerce transactions in these days, the security and private protection problems became more important matters under the electronic transaction base. Because electronic transaction using electronic documents be carried without direct person to person meeting, there can be the possibility to use other's identity illegally without notice, and very hard to verify authenticity of transaction as well. In addition, it is very hard to find out that the electronic documents on the process of submitting is forged documents or not, and also have much difficulty in maintaining transmitting secret. Therefore, to solve such problems on electronic commerce transactions and electronic documents, the digital signature and certification system with cryptography skill is inevitably necessary. As the wide use of digital signature together with beginning of digital government and financial transaction, not only the issuance of electronic certification, but certification market came to gradually expand. In Korea, after enacting digital signature act in 1999, the act contents were expanded to the wide range of contents complying with global standards from the end of 2001 to April, 2002, including the new clause of certification problems. And the act was put into operation now. Therefore, in this paper, we'd like to suggest development scheme through the investigation on electronic certification related problems, such as, concepts, procedures, service conditions here and abroad.

  • PDF

The Problems and Guidances of Digital Certification in EC (전자서명 인증제도의 문제점과 발전방향)

  • Kang Tea-Gyung;Hwang Sang-Gyu
    • Management & Information Systems Review
    • /
    • v.12
    • /
    • pp.1-15
    • /
    • 2003
  • As a rapid development of electronic commerce transactions in these days, the security and private protection problems became more important matters under the electronic transaction base. Because electronic transaction using electronic documents be carried without direct person to person meeting, there can be the possibility to use other's identity illegally without notice, and very hard to verify authenticity of transaction as well. In addition, it is very hard to find out that the electronic documents on the process of submitting is forged documents or not, and also have much difficulty in maintaining transmitting secret. Therefore, to solve such problems on electronic commerce transactions and electronic documents, the digital signature and certification system with cryptography skill is inevitably necessary. As the wide use of digital signature together with beginning of digital government and financial transaction, not only the issuance of electronic certification, but certification market came to gradually expand. In Korea, after enacting digital signature act in 1999, the act contents were expanded to the wide range of contents complying with global standards from the end of 2001 to April, 2002, including the new clause of certification problems. And the act was put into operation now. Therefore, in this paper, we'd like to suggest development scheme through the investigation on electronic certification related problems, such as, concepts, procedures, service conditions here and abroad.

  • PDF

A Study on The Vulnerabilities and Problems of Security Program (보안 프로그램의 취약성 및 문제점에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.77-84
    • /
    • 2012
  • Recent Security Programs are widely used to improve the security of Client Systems in the Web authentication. Security Program is provide the function of the Keyboard Security and Certificate Management, Vaccines, Firewall. in particular, This Security Program has been used Financial Institutions and Government Agencies, and some private corporate Home Page. and ActiveX is used to install the Security Program. but Security Programs caused by several security vulnerabilities and problems as they appear, are threat to the stability of the Client System. Therefore, This paper will be analyzed through Case Studies and Experiments to the Vulnerabilities and Problems of Security Program and This Is expected to be utilized to further improve the performance of the Security Program and the building of a new Certification Scheme for material in the future.

Implementation of Hybrid Smartcard Using Multi Encryption Method (다중 암호화 기법을 활용한 하이브리드 스마트카드 구현)

  • 이성은;장홍종;박인재;한선영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.81-89
    • /
    • 2003
  • With the rapid development of information and communication technology, online dissemination increases rapidly. So, It becomes more important to protect information. Recently the authentication system using public key infrastructure (PKI) is being utilized as an information protection infrastructure for electronic business transactions. And the smartcard system makes the most use of such an infrastructure. But because the certification based on the current PKI provides oかy basic user certification information, the use has to be limited in various application services that need the identification and authorization information as well as face-to-face information of the user. In order to protect a system from various kinds backings and related treats, we have proposed angular and private key multiplexing for prevention of smartcard forgery and alteration based on a photopolymer cryptosystem. When smartcard becomes prone to forgery and alteration, we should be able to verify it. Also, our parer proposes a new authentication system using multi authentication based on PKI. The smartcard has an excellent advantage in security and moving.

Study Recognizing the Explosives Detection Service of Explosive Detection Dog Handlers (폭발물 탐지견 도수사들의 폭발물 탐지업무에 관한 인식 연구)

  • Kim, Jae Yup;Kim, Il Gon
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.157-166
    • /
    • 2018
  • This study conducted a perfect detection of explosives by placing various devices and personnel in place of terrorist bomb detection in a situation that is difficult to detect and protect against the use of explosives not only in countries but also in civilians. The result is that the legal system applies, first, the obligation to introduce bomb-sniffing dogs for national critical and large civil facilities. Secondly, it introduces a certification system for bomb-sniffing dogs to verify their detection capabilities. Third, it is to introduce a system for fostering expert manpower to activate expert water supply companies that operate bomb-sniffing dogs.

  • PDF

A Study for the Certified Security Certification in Private Security Industry in Korea (민간경비 자격제도에 관한 연구)

  • Ahn, Hwang-Kwon
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.159-181
    • /
    • 2006
  • This study is concerned on Why The Certified Security certification is needed and How to control the security quality to get better service to the clients. Theses days are required The Certified Certificate in all the industry. And in this point of view, the certified certificate is a kind of confirmation by an authority to the person who has how much special knowledge and practice in a certain field. Moreover, in the functionalism society the certified certificate system would be very positive effect to the related industry and society as official measurement by an authority. The security is freedom from fear and anxiety. Which means the security can not be operated in isolation from citizen's safe-living expectation, and which is also dealing with valuable human being's life. For getting the better purpose the security industry employees should have more organized special training and education. As my understanding the certified certificate exam system is the confirmation by an authority, the certified certificate is only neutral evidence to get the confidence and credit from the clients. In this point of view the core point is How to control The Certified Certificate by a credied authority.

  • PDF

A Design for a Hyperledger Fabric Blockchain-Based Patch-Management System

  • Song, Kyoung-Tack;Kim, Shee-Ihn;Kim, Seung-Hee
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.301-317
    • /
    • 2020
  • An enterprise patch-management system (PMS) typically supplies a single point of failure (SPOF) of centralization structure. However, a Blockchain system offers features of decentralization, transaction integrity, user certification, and a smart chaincode. This study proposes a Hyperledger Fabric Blockchain-based distributed patch-management system and verifies its technological feasibility through prototyping, so that all participating users can be protected from various threats. In particular, by adopting a private chain for patch file set management, it is designed as a Blockchain system that can enhance security, log management, latest status supervision and monitoring functions. In addition, it uses a Hyperledger Fabric that owns a practical Byzantine fault tolerant consensus algorithm, and implements the functions of upload patch file set, download patch file set, and audit patch file history, which are major features of PMS, as a smart contract (chaincode), and verified this operation. The distributed ledger structure of Blockchain-based PMS can be a solution for distributor and client authentication and forgery problems, SPOF problem, and distribution record reliability problem. It not only presents an alternative to dealing with central management server loads and failures, but it also provides a higher level of security and availability.

Design and Implementation of the Semi-automated Evaluation Workflow Management System(Sa-EWMS) (반자동화 평가워크플로우 관리 시스템 설계 및 구현)

  • Kang Yeon-hee;Kim Jung-dae;Lee Gang-soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.39-50
    • /
    • 2005
  • An evaluation demand and a market growth regarding evaluation and certification are increasing because the importance of information Security is gradually rising to solve the information disfunction. Therefore, it is necessary the cost-effect evaluation management of the Information Security System(ISS). In this paper, we propose the Semi-automated Evaluation Workflow Management System(Sa-EWMS) based on the Common Criteria(CC) which performs and manages evaluation work through the procedure when evaluator evaluates the Information Security System(ISS). The Sa-EWMS is solving a problem of consumption of time and effort and performing efficient evaluation, it is playing a significant role that traces workflow process of each work of the Engines and controls performance. It will be able to use useful the private evaluation enterprise which confront in an evaluation demand and a market growth.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.