• Title/Summary/Keyword: Program Security

Search Result 1,229, Processing Time 0.031 seconds

A Study on Government Support for Logistics Security (물류보안 인증을 위한 정부지원 방안 연구)

  • Lee, DonHee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.6
    • /
    • pp.109-123
    • /
    • 2016
  • This study investigates the importance of government's support for logistics security assurance through certification programs. First, the study analyzed priorities among the requirements of logistics firms through Analytic Hierarchy Process(AHP) and Quality Function Deployment(QFD) approaches. For this process we invited 21 logistics experts to assess the relationships between logistic firms' requirements and government policies regarding logistics security using the house of quality, a set of matrices of QFD. The results of this phase of the study revealed the priorities of logistics firms' goals regarding the diffusion of the government security certification program as follows: integrated logistics security systems(40.3%), strengthening government support systems(32.4%), and operational effectiveness of logistics security certification(27.2%). Second, a relative weights applied QFD method based on AHP was applied to determined the expected outcome of the logistics security certification program. The results indicated as follows: productivity improvement(28.4%), improved level of service(26.7%), logistics cost reduction(21.6%), advanced information systems(19.7%), and improved environmental protection(3.6%). The results of this study provide new insights concerning logistics firms' requirements for supply chain security and the importance of government's support policies through logistics security certification programs.

Accomplishment Analysis of the Fire Fighting and Safety Research Development Program Supported by Ministry of Public Safety and Security (2012-2014) (국민안전처 소방안전분야 연구개발사업(2012년~2014년)의 성과분석)

  • Chung, Jae-Han;Han, Yong-Taek
    • Fire Science and Engineering
    • /
    • v.30 no.4
    • /
    • pp.141-147
    • /
    • 2016
  • The fire fighting and safety research development program supported by Ministry of Public Safety and Security is composed of fire prevention and alert technology research, special disaster response technology research, and rescue and disaster-field response safety technology research. The principal accomplishment indices of this research program are (1) patent submitting or registration; (2) field test, ensuring performance criteria for commercialization, development of prototype, registration of software, royalty of technology-transfer; (3) the task to be carried out in a published research paper, and number of applied policies; and (4) the study period of task performance of employment and incubated high-technology manpower. Therefore, this study analyzed the performance result of a patent, research paper, and software registration of the fire-fighting and safety R&D program supported by Ministry of Public Safety and Security from 2012 to 2014.

A Study on the Development of ICT Curriculum for Private Security Workers (민간경비 종사자의 ICT직무교육과정 개발에 관한 연구)

  • Sim, Hyun;Kwon, Gyeong-Ae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.397-404
    • /
    • 2019
  • This study developed the ICT curriculum focusing on apartment security guards and analyzed the actual application results. We developed the educational contents and it designed ICT job courseware for elder education by considering and that designed in consideration of the computer attitudes and physical and cognitive characteristics of the elderly. The educational program was applied to the experimental group and the satisfaction and the educational effect were analyzed through the pre and post test results. As a result of the analysis, the satisfaction level of the education program was higher than the average of 4.00 points. The elderly informal education program was examined by using the qualitative assessment test tool before and after the application of the education program. Internet self-efficacy of experiment group, improvement of internet utilization ability, usage of internet use, personal information willingness, life correction, elimination of conflict among generations, self-confidence, and internet stress increased statistically significantly. These results suggest that the "Private Expense ICT Job Training" program developed in this study can be effective for elderly informatization and can be applied to other elderly education programs and contribute to promotion.

The effects of group guidance program using positive psychology for national security related university entrants' psychological wellbeing (긍정심리학을 활용한 집단지도 프로그램이 대학생의 심리적 안녕감에 미치는 영향 -국가안보관련학과 신입생을 중심으로-)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.235-258
    • /
    • 2016
  • The purpose of this study is to find out the effectiveness of the group guidance program using positive psychology for national security related university entrants' psychological wellbeing. This study is to investigate the influence of group guidance program on the increase of psychological well-being of university entrants through active and deliberate program based on the positive psychology. To achieve this purpose, thirty nine students (male 19, female 20) among national security related university entrants were selected and allocated to experimental and comparative groups. Experimental group was nineteen students (male 10, female 9), and comparative group was twenty students (male 9, female 11). Experimental group was divided into two teams (male and female team), and guided by each leader. The group guidance was participated in total ten-week sessions, fifty mins per week. The results were as follows; First, the group guidance program using positive psychology for national security related university entrants' had a positive effect on the students' psychological wellbeing. Second, effects of subordinate factors (autonomy, controling environment, personal growth, positive relations) in comparison in pre and post test of program had an influence very positive or positive, while one factor (purpose in life) didn't show a positive effect.

  • PDF

The Analysis of the Differences in the SME's Perception about Industrial Technology Security Support Policy (산업기술 보안 지원정책에 대한 중소기업의 인식차이 분석)

  • Jung, Yuhan;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.15-32
    • /
    • 2020
  • Increasing uncertainties in the technological innovation environment and increasing technology competition also present new challenges in terms of industrial technology security. Therefore, the purpose of this study was to identify the direction of policy change necessary for the improvement of related policies in the future by examining the importance and implementation of the government's industrial technology security support policies for small and medium-sized enterprises engaged in industrial technology innovation activities. As a result of the analysis, first of all, small and medium-sized enterprises that responded to the government's industrial technology security support policy were perceived to be less performing than the importance of the program. These results can be said to mean that selective budget expansion for related policy programs may be necessary, along with efforts to improve the quality of each program. Second, an analysis of the differences in group recognition between new technology certification firms and industrial technology verification(certification) companies showed that significant differences exist between groups for the program. These results suggest that more effective operation of the relevant policies may require policy enforcement in consideration of the level of security and will of each company in industrial technology, as much as the quantitative characteristics of the entity. This study is meaningful in providing the necessary policy directional basic information for the design and execution of more specific and effective industrial technology security policies by presenting empirical research results that domestic small and medium-sized enterprises are aware of about the government's industrial technology security policies.

Automated Method for Detecting Use-After-Free Vulnerability of Windows System Calls Using Dynamic Symbolic Execution (동적 기호 실행을 이용한 윈도우 시스템 콜 Use-After-Free 취약점 자동 탐지 방법)

  • Kang, Sangyong;Lee, Gwonwang;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.803-810
    • /
    • 2017
  • Recently, social security problems have been caused by the development of the software industry, and a variety of automation techniques have been used to verify software stability. In this paper, we propose a method of automatically detecting a use-after-free vulnerability on Windows system calls using dynamic symbolic execution, one of the software testing methods. First, a static analysis based pattern search is performed to select a target point. Based on the detected pattern points, we apply an induced path search technique that blocks branching to areas outside of interest. Through this, we overcome limitations of existing dynamic symbolic performance technology and verify whether vulnerability exists at actual target point. As a result of applying the proposed method to the Windows system call, it is confirmed that the use-after-free vulnerability, which had previously to be manually analyzed, can be detected by the proposed automation technique.

A Visualization System for Permission Check in Java using Static Analysis (정적분석을 이용한 자바 언어의 권한검사 시각화 시스템)

  • Kim, Yun-Kyung;Chang, Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.399-404
    • /
    • 2006
  • In Jana 2, to enforce a suity policy of a program, programmer writes permission sets required by the code at the policy file, sets Security Manager on system and executes the program. Then Security Manager checks by stack inspection whether an access request to resource should be granted or denied whenever code tries to access critical resource. In this paper, we develop a visualization tool which helps programmers enforce security policy effectively into programs. This system is based on the static permission check analysis which analyzes permission checks which must succeed or fail at each method. Based on this analysis information, programmer can examine visually how permission checks and their stack inspection are performed. By modifying program or policy file if necessary and examining analysis information repeatedly, programmer can enforce security policy correctly.

Effects of Spinal Stabilization Training Program on Muscle Function and Gait Ability for Private Security Guard (민간경호원의 규칙적인 척추안정화운동 프로그램 참여가 근기능 및 보행능력에 미치는 영향)

  • Kim, Kyong-Tae;Cho, Ji-Hoon
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.33-51
    • /
    • 2010
  • The purpose of this study was to analyze the variation of muscle function and gait ability according to regular spinal stabilization exercise program for private security guards and the conclusion as follows. First, it increased lumbar extension strength and lumbar flexion strength both exercise and non exercise group according to the variation of muscle function with the spinal stabilization exercise program. There was significant difference between exercise and non exercise group after the program but not before the program. Second, it appeared the functional vanishment of lumbar extensor before the program both exercise and non exercise group according to the variation of muscle function with the spinal stabilization exercise program for lumbar flexor extensor ratio. Third, it analyzed for the spinal stabilization with 8 ways according to the variation of muscle function with the spinal stabilization exercise program for the change of the spinal stabilization. The spinal stabilizaton increased each angle for the execise group but decreased or not changed for non exercise group. Fourth, it used 10m gait test for the speed and step length according to the variation of muscle function with the spinal stabilization exercise program. It appeared the increasement of gait ability for exercise group and there was significant difference between exercise and non exercise group. In conclusion, there was a positive effect for lumbar extension strength, lumbar flexion strength, lumbar flexor extensor ratio, spinal stabilization, and gait ability with regular spinal stabilization exercise program. This means that spinal stabilization exercise program give positive effect to the decrease of back pain and the development of muscular strength for private security guard, also will help to recover and return to work more faster. Also, it seems that the exercise prescription program may be applicable to prevent or to improve the function for private security guard.

  • PDF

The Study on the Private Security Employee' Education and Training System for the Emergency Management (민간경비원의 위기관리 능력 제고를 위한 교육훈련 시스템 개선방안)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.129-146
    • /
    • 2008
  • When the primary function of private security is to protect lives and property of clients, emergency management should be included in the security service and many countermeasure services should be carried out for that purpose. In theses contexts, private security should develop and maintain a educational program to meet their responsibilities to provide the protection and safety of the clients. Conclusionally, private security industry employers in Korea has not concerned with the importance of training and education by lack of recognition and has been passive about qualified guards. And the authorities supervising and the administrating the guards has not recognized the importance of private security and has neglected the training of the guards. In theses contexts, private security should develop and maintain a educational program of emergency management to meet their responsibilities to provide the protection and safety of the clients.

  • PDF

Building an Electronic Approval Module Using Multi-Level Security (다중등급 보안 정책을 적용한 전자결재 모듈의 개발)

  • 김진성;안병혁
    • The Journal of Information Systems
    • /
    • v.11 no.1
    • /
    • pp.175-198
    • /
    • 2002
  • This paper is to develop a security module for electronic approval systems. Electronic documents are created, transmitted and saved in the company's intranet computer network. Transmitting electronic documents, however, brings us a security problem. Communications among various computer systems are exposed to many security threats. Those threats are eavesdropping, repudiation, replay back etc. The main purpose of this paper is to develop a module which provides the security of electronic documents while they are passed from one place to another This paper applies Multi-Level security to the electronic approval system that guarantees security of electronic documents from many threats. Multi-Level security controls the access to the documents by granting security level to subject users and object electronic documents. To prevent possible replay back attacks, this paper also uses one time password to the system. The security module is composed of client program and server one. The module was developed using Microsoft Visual Basic 6.0 and Microsoft SQL Server 7.0. The code uses Richard Bondi's WCCO(Wiley CryptoAPI COM Objects) library functions which enables Visual Basic to access Microsoft CryptoAPI.

  • PDF