• Title/Summary/Keyword: Private security enterprise

Search Result 40, Processing Time 0.023 seconds

Qualitative Research on the Curriculum of Department Security Programs in University (대학 경호 관련 학과의 교육과정 특성에 관한 질적 연구)

  • Kang, Min-Wan;Kim, Seon-Ah;Kim, Dong-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.326-336
    • /
    • 2010
  • The purpose of this research is to analysis of difference about university curriculum of secretary from ethnographic research. The research participant 4 years is the university graduate. The participant who is selected is the practical career person of 3 or more years that Works at the Seoul individual enterprise. The specialist verified continuously about research truth and ethical from collection of data and analytical process. The research method and analysis results are as follows : First, Martial art and sports relation subject is more protocol secretary and secretary subject. But emphasized an importance about protocol secretary and secretary subject. Second, The male emphasized that Specialist training and segmentation in major field of study. The woman emphasized that women's studies and protocol secretary, culture of high-level class. Third, They have emphasized difference about private security in professionalism of curriculum.

The Method for Data Acquisition on a Live NAS System (활성 상태의 NAS 시스템 상에서 내부 데이터 수집 기법 연구)

  • Seo, Hyeong-Min;Kim, Dohyun;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.585-594
    • /
    • 2015
  • As the storage market has been expanded due to growing data size, the research on various kinds of storages such as cloud, USB, and external HDD(Hard Disk Drive) has been conducted in digital forensic aspects. NAS(Network-Attached Storage) can store the data over one TB(Tera Byte) and it is well used for private storage as well as for enterprise, but there is almost no research on NAS. This paper selects three NAS products that has the highest market share in domestic and foreign market, and suggests the process and method for data acquisition in live NAS System.

Assessment Of The Place And Role Of Personnel Management In The General Management System Of The Organization

  • Kovalenko, Yelena;Kirdan, Oleksandr;Krivonos, Anatoliy;Dobrovolska, Olena;Gutsul, Tetiana;Hromov, Sergii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.271-275
    • /
    • 2021
  • The article assesses the role of the human factor in management, analyzes the personnel policy, as well as the style and methods of management at the enterprise. The purpose of the article is to study the place and role of personnel management in the general management system of an organization. Particular tasks of the research have been solved: the place and role of personnel management in the system of general management theory have been determined; determined the place of personnel management in the system of modern sciences.

A study on Improved Convergence Security Monitoring System model (융합보안관제시스템 개선에 관한 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.3-12
    • /
    • 2011
  • According to the NIS, damages due to leaking industrial technology are reaching tens of trillion won. The type of damages are classified according to insider leaks, joint research, and hacking, illegal technology leaks and collaborated camouflaged. But 80% of them turned out to be an insider leak about connecting with physical security. The convergence of IT and non IT is accelerating, and the boundaries between all area are crumbling. Information Security Industry has grown continuously focusing Private Information Security which is gradually expanding to Knowledge Information Security Industry, but Information Security Industry hereafter is concentrated with convergence of IT Security Technology and product, convergence of IT Security and Physical Security, and IT convergence Industry Security. In this paper, for preventing company information leaks, logical security and physical security both of them are managed at the same level. In particular, using convergence of physical security systems (access control systems, video security systems, and others) and IT integrated security control system, convergence security monitoring model is proposed that is the prevention of external attacks and insider leaks, blocked and how to maximize the synergy effect of the analysis.

기업 사이버재난 관리를 위한 재해경감활동계획 수립

  • Lee, Young-Jai;Lee, Sung-Joong
    • Review of KIISC
    • /
    • v.20 no.4
    • /
    • pp.42-51
    • /
    • 2010
  • Government legislates a private sector preparedness act related to disasters such as natural, technological, and social ones. According to the law, it announces new standard for private sector preparedness. This paper illustrates a mitigation action plan based on the standard in terms of a cyber disaster. This plan includes organization, policy, assessment, impact analysis, strategy, plan, action, evaluation, and feedback. It will also help for business to mitigate a cyber disaster. Private sector accreditation and certification preparedness program which introduces on the law is the realization that enterprise disaster management will be expected as a great tipping-point.

Voice and Video Call Continuity for Enterprise Users (기업형 사용자들을 위한 음성/영상 서비스 이동성 제공 방안)

  • Jung, Chang-Yong;Kim, Hyeon-Soo;Moon, Jeong-Hyeon;Kim, Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.99-103
    • /
    • 2009
  • Recently, as wired and wireless communication services have rapidly developed and multimodal mobile devices which have various characteristics have widely spread, the need for new convergence services increases. The growing population of VoIP technologies and the high communication expense yield that the market of IP based telephony such as WiFi phone and IP phone is substituted for one of the conventional PSTN telephony. With the help of this trend, the wireline network operators desire to find a market in mobile networks. Therefore, they focus on Fixed Mobile Convergence (FMC) service as one of the key factors to accomplish this goal. FMC services are able to provide the mobility of voice services between circuit switched and packet switched networks. IP Multimedia Subsystem (IMS) based Voice Call Continuity (VCC) is one of the schemes to embody FMC services. As Application Server (AS) which has this VCC function provides seamless handover of services between heterogeneous networks, FMC subscribers can communicate seamlessly with others m WiFi domain and COMA domain using WiFi-COMA dual phone. Most of enterprises have already introduced IP network infrastructure and IP-PBX (Private Branch eXchange) for telephony. However, the problems of high communication cost and work inefficiency due to frequent outside jobs or business trips have remained. In order to solve these problems, demands for enterprise FMC services increase. In this paper, we introduce a new IP-PBX based VCC model that can provide seamless handover of voice services between WiFi and COMA networks for enterprise users and we investigate some interworking and security issues between Soft Switch (SSW) and IMS, or between IMSs. In addition, we introduce a new service that can provide the continuity of voice sessions as well as video sessions using Multimedia Session Continuity (MMSC) technology which has evolved from VCC. This service is expected to be one of the next-generation personalized services based on user's context.

  • PDF

An Investigation of the Psychology of Password Replacement by Email Users (전자메일 서비스 이용자의 패스워드 교체 심리에 대한 연구)

  • Lim, Se Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1251-1258
    • /
    • 2016
  • Recently, leaks of the personal information of Internet users have been occurring too frequently. Generally, Internet users have email accounts. The use of email as a communications tool in the private and public sectors has increased. Therefore, in email usage, password management to ensure a more secure email service is most important. In this study, we conducted an online survey of email users and analyzed their responses by using structural equation modeling software to find the psychological and behavioral characteristics of their password management. The results of this study provide useful suggestions on information security strategies related to email password management at both the enterprise and individual levels.

A Study on a Plan for Adaptation according to the Change of a Bodyguard's Social Cognition (경호직 근무자의 업무능력 증대방안에 관한 고찰)

  • Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.65-83
    • /
    • 2004
  • In modern society, the enterprises or the public organization have devised consistent means and methods with keen competition in high intelligence, high specialization and high competition for surviving in the struggle for existence. In the rapidly changing modern society like that, guard services are not free any more in the simple business. It will be survived only with consistent self-development and various abilities. Recently, it is on a trend that the enterprise including venture business requires the man of ability having many-sided thought, knowledge and capacity. That is, the era of a man with multi-function has come. The guards engaged in their present posts have to make efforts self-development consistently. And they have to work for self-development with theoretical knowledge acquirement about the expert knowledge escaping from simple function and business. The constitution including universities that train the guard should not adjust to the demand of quantitative manpower required in the enterprise organization with the training of the guard with simple functions only. It needs settlement as a curriculum with technology like ideology and knowledge breaking from short curriculum centered on function only in order to come to stay the recognition about guard services as expert services that the industrial society requires. The education centered on simple function should be replaced in the use of a high school, private academy and special guard institution. In addition, it requires a quality as the auxiliary, division, decision-making and spokesman according to the business role. Also, it requires the martial arts capacity, the communicative capacity, the sports or reports capacity, the guard driving capacity, the policy and assistant capacity and the information and analysis capacity, etc in individual. Lastly, it need each guard's change of cognition most of all. As part of the guard's adaptive plan according to the social change, it was enumerated like the mentioned above. It is important for the guard to prepare for the change of era and to build up quality and capacity before anything else.

  • PDF

A Design for a Hyperledger Fabric Blockchain-Based Patch-Management System

  • Song, Kyoung-Tack;Kim, Shee-Ihn;Kim, Seung-Hee
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.301-317
    • /
    • 2020
  • An enterprise patch-management system (PMS) typically supplies a single point of failure (SPOF) of centralization structure. However, a Blockchain system offers features of decentralization, transaction integrity, user certification, and a smart chaincode. This study proposes a Hyperledger Fabric Blockchain-based distributed patch-management system and verifies its technological feasibility through prototyping, so that all participating users can be protected from various threats. In particular, by adopting a private chain for patch file set management, it is designed as a Blockchain system that can enhance security, log management, latest status supervision and monitoring functions. In addition, it uses a Hyperledger Fabric that owns a practical Byzantine fault tolerant consensus algorithm, and implements the functions of upload patch file set, download patch file set, and audit patch file history, which are major features of PMS, as a smart contract (chaincode), and verified this operation. The distributed ledger structure of Blockchain-based PMS can be a solution for distributor and client authentication and forgery problems, SPOF problem, and distribution record reliability problem. It not only presents an alternative to dealing with central management server loads and failures, but it also provides a higher level of security and availability.

Research about the Identification and Gathering of Digital Forensic Evidence by Cyber Intrusion Accident Types (사이버 침해사고 유형별 디지털 포렌식 증거의 식별 및 수집에 관한 연구)

  • Shin, Kyung-Jun;Lee, Sang-Jin
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.93-105
    • /
    • 2007
  • A digital forensic technology and tools are used much in the rapidly increased cyber intrusion accident investigation. But, almost the identification and gathering tools of digital forensic evidence are very difficultly integrated and simply poor-skill. Thereby, Important digital evidences at intrusion accident investigation of public institution and a private enterprise can be omitted or demaged. In this paper, therefore, we refer to 'The digital forensic tool for identification and gathering evidence' based only Window OS by using 'Log Parser', discuss the methodology for the identification and gathering of digital forensic evidence by cyber intrusion accident types.

  • PDF