• Title/Summary/Keyword: Public Financial Security

Search Result 151, Processing Time 0.031 seconds

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi;Park, Jeonghun;Park, Namje
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.77-85
    • /
    • 2019
  • In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

The Singapore Field Epidemiology Service: Insights Into Outbreak Management

  • Ooi, Peng-Lim;Seetoh, Theresa;Cutter, Jeffery
    • Journal of Preventive Medicine and Public Health
    • /
    • v.45 no.5
    • /
    • pp.277-282
    • /
    • 2012
  • Field epidemiology involves the implementation of quick and targeted public health interventions with the aid of epidemiological methods. In this article, we share our practical experiences in outbreak management and in safeguarding the population against novel diseases. Given that cities represent the financial nexuses of the global economy, global health security necessitates the safeguard of cities against epidemic diseases. Singapore's public health landscape has undergone a systemic and irreversible shift with global connectivity, rapid urbanization, ecological change, increased affluence, as well as shifting demographic patterns over the past two decades. Concomitantly, the threat of epidemics, ranging from severe acute respiratory syndrome and influenza A (H1N1) to the resurgence of vector-borne diseases as well as the rise of modern lifestyle-related outbreaks, have worsened difficulties in safeguarding public health amidst much elusiveness and unpredictability. One critical factor that has helped the country overcome these innate and man-made public health vulnerabilities is the development of a resilient field epidemiology service, which includes our enhancement of surveillance and response capacities for outbreak management, and investment in public health leadership. We offer herein the Singapore story as a case study in meeting the challenges of disease control in our modern built environment.

APPLICATION OF PROJECT MANAGEMENT: LEAN TECHNOLOGIES AND SAVING MANUFACTURING (ASPECTS OF MANAGEMENT AND PUBLIC ADMINISTRATION)

  • Kulinich, Tetiana;Berezina, Liudmyla;Bahan, Nadiia;Vashchenko, Iryna;Huriievska, Valentyna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.57-68
    • /
    • 2021
  • Successfully adapting to digital and customer-oriented transformation, the concept of lean manufacturing professes the philosophy of creating greater benefit while minimizing losses. These losses are operations that do not add value in the production process to ensure the efficiency, flexibility, and profitability of projects. In the context of broad automation and digitalization of all sectors of the economy, mechanisms for combining automation technologies and lean production are becoming available. Moreover, when it comes to the efficient use of financial, human, or material resources, it is clear that the use of Industry 4.0 technologies can be an effective tool for achieving the goals of lean production, as many of them pursue the same goal. In this context, this article aims to study the effectiveness of the implementation of project management concepts at the global level and identify the main factors influencing its effectiveness to ensure the achievement of lean production through LEAN technologies and Industry 4.0 technologies. To achieve this goal, several statistical indicators were selected and several statistical methods of analysis were used: pairwise correlation, regression analysis, methods of comparison, synthesis, and generalization. Statistical analysis was conducted according to a survey conducted by the Project Management Institute (PMI) in 2020. An economic-mathematical model of dependence of project effectiveness in different regions of the world on the level of implementation of project management approaches is built, which shows that the increase in project effectiveness by 85% is due to financial losses, technical training, and consumer orientation. These results allow project managers to develop appropriate strategies to improve project management approaches at all levels. It is established that LEAN technologies and technologies of Industry 4.0 have several tools that have a positive effect on minimizing losses following the concept of lean production. Besides, given that the technology of Industry 4.0 is focused on the automation of Lean Production technology, a mechanism for the introduction of lean production using these technologies and methods.

A Theoretical Comparative Study of Human Resource Security Based on Korean and Int'l Information Security Management Systems (국내·외 정보보호 관리체계기반의 인적보안의 이론적 비교연구)

  • Rha, Hyeon-Dae;Chung, Hyun-soo
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • In various ICBM (IoT, Bigdata, Cloud, Mobile) IT convergence environments, IT technologies have been evolved, new information security threats have been occurred. As information security incidents in major public agencies, financial institutions and companies occurred, it was emphasized that the importance of human security was disclosed. Thus, implementing of information security management system could protect hacks and security breaches and respond quickly to accidents so it minimized the sized of loss. In this paper, comparison of human security controls shown in ISO27001, COBIT, NIST 800-53, K-ISMS, Cyber Security Framework such as the main information security management systems was analyzed, and proposed of the security implications about effective controls of human resources security issues.

Status and prospects of Knowledge Information Security Industry (지식정보보안 산업의 현황과 전망)

  • Choi, Jeong-Il;Chang, Ye-Jin;Lee, Ok-Dong
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.269-294
    • /
    • 2014
  • Korea is concerned with information security industry due to recent leak-out private information of 3 card companies. Executives are aware of damage from breach of security such as personal data spill, is more dangerous than any other financial risks. The information security industry, which was limited in physical security and network security formerly, is evolving into convergence security of public and facility security industry. The field of interest has also been changed into security of smart phone and intelligence image recently, from firewall or Anti-virus. The convergence security is originally about access control of facility, but recently its demand has been increased mostly by public institutions and major companies. The scope of the industry also varies from finance, education, distribution, national defense, medical care to automobile industry. The market of convergence security has been expanded and new various products and services of security of intelligent vehicle, 'U' healthcare, finance, smart grid and key industries are also developed. It is required to create and enhance of new curriculum and cultivate human resources for the development of knowledge information security industry. Raising standard of education and security consciousness of the nation is also necessary to strengthen the global competitiveness.

  • PDF

Poverty Reduction Effectiveness and Efficiency of Social Security Benefits (사회보장급여의 빈곤완화 효과성 및 효율성)

  • Noh, Hye-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.237-247
    • /
    • 2021
  • The purpose of this study is to analyze the effectiveness and efficiency of social security benefits to poverty alleviation. To this end, this study analyzed the poverty alleviation effect of public pension, basic pension, child-rearing allowance, disability allowance, basic living security subsidy, EITC, and other government subsidies using 2019 Household Financial Welfare Survey. The analysis results are as follows. First, social security benefits lowered the poverty rate by 6.8%p. Second, in terms of the poverty gap reduction effect, the public pension for the elderly male households, the basic pension for the elderly female householder, and the basic guarantee for the working female householder contributed the most. Finally, in terms of poverty alleviation efficiency, about 33% of social security benefits contribute to narrowing the poverty gap. Social security benefits for female heads of households were found to serve as a function of alleviating poverty gap and for male heads of households to supplement household income. Based on these results, this study suggested the discovery of various poverty states, expansion of basic security for the female elderly, and the connection between the purpose of social security benefits and key targets.

An Examination of Financial Feasibility and Redistributive Effect of Universal Basic Income (기본소득의 재정적 실현가능성과 재분배효과에 대한 고찰)

  • You, Jong-sung
    • 한국사회정책
    • /
    • v.25 no.3
    • /
    • pp.3-35
    • /
    • 2018
  • This article critically reviews the arguments that deny the financial feasbility and effectiveness of universal basic income as an alternative to existing social security systems and makes some suggestions to design effective and efficient basic income schemes. Regarding the financial feasibility of universal basic income, I argue that replacement of the existing regressive tax expenditures with universal basic income without raising tax rates can effectively reduce tax burden or provide income support to a majority of people except the rich. Addition of basic income to the tax base and reduction of the number of beneficiaries of public assistance and the amount of cash payment for them can further help save money. Regarding the redistributive effect, I note that the targeting ability of the existing social security systems is not good and that "the paradox of redistribution" that universal-type programs tend to be more redistributive than selective programs applies to universal basic income as well. I demonstrate significant redistributive effect of a hypothetical revenue-neutral basic income scheme and reviews several empirical studies done in Korea and abroad to show that basic income can be more effective in redistribution than social insurances or public assistance programs. Lastly, I emphasize the need to construct a reliable tax-benefit microsimulation model to help researchers to study redistributive effects of basic income schemes and other taxes and social policies.

Design of Online Certificate Revocation Information Transfer using Verifier Lists (검증자목록을 이용한 실시간 인증서 폐지 정보 전송의 설계)

  • 이용준;정재동;오해석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.45-54
    • /
    • 2003
  • A public key certificate may be revoked before its validity period due to causes like the owner identification information change or the private key damage. Since a certificate has long valid time relatively, it is possible to become revoked during lifetime of certificate. The main technical issue in the public key infrastructure is how to handle the status of the certificate. We propose a simple mechanism for online certificate status validation that is suited to the financial network The characteristic of the proposed method is to broadcast certificate revocation information by using verifier list. The experimental results provide the same realtime as OCSP(Online Certificate Status Protocol). The proposed mechanism reduces the network load for certificate status validation in highly concentrated unbearable network.

A study on the improvement of hiring system in the military human resources: introduction of modified blind hiring (군 인적자원 채용제도 개선에 관한 연구 : 수정형 블라인드 채용의 도입 검토)

  • Jung, Jung Kyun;Park, Cheol
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.93-99
    • /
    • 2019
  • In the Republic From the national interest in the recent hiring scandals in the public institutions such as the Financial Supervisory Service, Gangwon Land, and so on, people were outraged by the fact that the competition opportunities were not secured although they should be equally secured to compete with anyone with their capabilities in the fair process. Hence, the government made the public institutions blind hiring to be mandatory, which eliminated writing the academic background, GPA, and English score in the application form and selected the new employees only with job competencies in the public institutions in 2017. In 2018, the prosecution did their best for the investigation on hiring scandal with the strong will to cut the scandal upon announcement of 5-year anti-corruption master plan. Amid this controversy, this study tries to suggest the further direction in the hiring military human resources upon introduction of blind hiring system, reviewing the needs to introduce blind hiring system in the military, the governmental guideline according to the mandatory blind hiring in the public institutions, and the application status of modified blind hiring in the military.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.