• 제목/요약/키워드: Security Area

Search Result 1,686, Processing Time 0.024 seconds

Future Education Skills Needs Analysis through Patent Analysis in the field of Information Security (특허분석을 통한 정보보안 부문 미래교육 수요분석)

  • Hwang, Gyuhee;Rim, Myung-Hwan;Song, Kyungseok;Lee, Jung Mann
    • Korean Management Science Review
    • /
    • v.31 no.4
    • /
    • pp.1-13
    • /
    • 2014
  • This study aims to expand the future study methodology and to develop a methodology of future-oriented curriculum analysis with future skills needs derived from patent analysis. With the case of information security, the methodology is applied to the 16 universities, which have information security department in undergraduate course. From the results, the followings are suggested : 1) for the increasing importance area including hacking, infiltration and PC security, a practical exercise should be emphasized; 2) for the convergence area including security policy, security legislation and OS security, proper faculties should be filed with recruiting field-based experts; 3) for the increasing importance area including professional area including security audit and information security protocol, the advanced curriculum related to graduate level should be provided.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Security Design of Information Security for Wireless Local Area Network (무선 네트워크망의 정보보호를 위한 시스템 설계)

  • Kim, Jung-Tae;Jung, Sung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.729-732
    • /
    • 2003
  • Security and privacy issues complicate wireless local area network deployment. for a wired network, certain levels of security are maintained since access to the physical medium is restricted to the devices physically connected to the network. Though wireless local area networks offer some built-in security features, security breaches are possible if appropriate precautions are not taken. This paper describes security issues related to wireless local area networks and presents a software approach for restricting and controlling wireless access. The system authenticates users on the basis of identity, privileges and access hardware by distributed software agents that implement security policy and restrict unauthorized access.

  • PDF

Status and Future of Security Techniques in the Internet Banking Service (인터넷 뱅킹 서비스 보안기술의 현황과 미래)

  • Lee, Kyungroul;Yim, Kangbin;Seo, Jungtaek
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.31-42
    • /
    • 2017
  • As Internet banking service became popular, many users can exchange goods by online. Even though this advantage, there are incident cases in the Internet banking service due to security threats. In order to counteract this problem, various security techniques have been applied over whole area in the Internet banking service. Therefore, we described that analyzed results of security techniques applied in the financial institutions area and network communication area in this paper. We consider that this paper will be useful as a reference to protect security threats occurred by insiders and vulnerabilities in implementation.

Classification Analysis on Private Security (민간경비에 대한 분류 분석)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.103-124
    • /
    • 2017
  • The purpose of this study is to analyze regional clusters and discrimination on size and sector of private security in national 16 areas in 2015. The results of the study using hierarchical cluster analysis and discriminant analysis are as follows. First, we can classify national 16 areas into 3 clusters, such as Large Area(1), Medium Area(2), and Small Area(3) according to the size of private security. The discriminant functions D for each cluster is as follows: (1) Large Area(1) = -383.981 + (.108 ${\times}$ number of security companies) + (.016 ${\times}$ number of guards), (2) Medium Area(2) = -35.570 + (.029 ${\times}$ number of security companies) + (.005 ${\times}$ number of guards), and (3) Small Area(3) = -5.381 + (.012 ${\times}$ number of security companies) + (.002 ${\times}$ number of guards). Second, we can classify national 16 areas into 3 clusters, such as Large Area(1), Medium Area(2), and Small Area(3) according to the sector of private security. The discriminant function D for each cluster is as follows: (1) Large Area(1) = -2224.402 + (-.562 ${\times}$ facilities security) + (1.245 ${\times}$ protection security) + (171.142 ${\times}$ convoy security) + (-2.722 ${\times}$ electronic security) + (2.020 ${\times}$ special security), (2) Medium Area(2) = -4.762 + (.052 ${\times}$ facilities security) + (.063 ${\times}$ protection security) + (-3.819 ${\times}$ convoy security) + (.110 ${\times}$ electronic security) + (-.165 ${\times}$ special security), and (3) Small Area(3) = -125.742 + (-.009 ${\times}$ facilities security) + (.432 ${\times}$ protection security) + (5.748 ${\times}$ convoy security) + (5.530 ${\times}$ electronic security) + (-.901 ${\times}$ special security).

  • PDF

Analysis of Standard Security Technology for Security of the Network (네트워크의 보안성 강화를 위한 표준 정보보호 기술 분석)

  • Kim, Bong-Han
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.193-202
    • /
    • 2015
  • The development of the security solutions that can provide a variety of security services is needed urgently. For development of the security solutions, analysis of international standard security technology is the key. In this paper, international organizations' standardization(ISO/IEC JTC1 SC27, ITU-T SG-17, IETF Security Area, etc.) and the current trend of the standard security technology are mainly analyzed. The core of the latest security technology(Application Bridging, DNS-based Authentication, HTTP Authentication, IP Security, Javascript Security, Authentication Technology Next Generation, Managed Incident, Web Authorization Protocol, Security Automation, Transport Layer Security, etc.) is analyzed focusing on 18 working groups of the IETF.

Designing on Security zone to improve Cookie File Security level (쿠키파일의 보안성을 향상하기 위한 보안영역 설계)

  • Seo, Hee-Suk;Choi, Yo-Han
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.6
    • /
    • pp.75-81
    • /
    • 2011
  • Cookie is simple text file, which contains records of web service which provided to user. some of data included in Cookie has user's private information. When attacker has Cookie which included user's private information, will causing financial losses. In this paper we designed security section which can improve vulnerable Cookie's security level. Through research and vulnerability analysis of Cookie file, we find out how to implement security area to offer efficient security area and design security area for cookie file. Also we checked security level to performance evaluation. Through this security level, we can keep user's private information secure using Cookie's improve security level which stored in user's personal computer.

  • PDF

Enhancing Internet of Things Security with Random Forest-Based Anomaly Detection

  • Ahmed Al Shihimi;Muhammad R Ahmed;Thirein Myo;Badar Al Baroomi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.67-76
    • /
    • 2024
  • The Internet of Things (IoT) has revolutionized communication and device operation, but it has also brought significant security challenges. IoT networks are structured into four levels: devices, networks, applications, and services, each with specific security considerations. Personal Area Networks (PANs), Local Area Networks (LANs), and Wide Area Networks (WANs) are the three types of IoT networks, each with unique security requirements. Communication protocols such as Wi-Fi and Bluetooth, commonly used in IoT networks, are susceptible to vulnerabilities and require additional security measures. Apart from physical security, authentication, encryption, software vulnerabilities, DoS attacks, data privacy, and supply chain security pose significant challenges. Ensuring the security of IoT devices and the data they exchange is crucial. This paper utilizes the Random Forest Algorithm from machine learning to detect anomalous data in IoT devices. The dataset consists of environmental data (temperature and humidity) collected from IoT sensors in Oman. The Random Forest Algorithm is implemented and trained using Python, and the accuracy and results of the model are discussed, demonstrating the effectiveness of Random Forest for detecting IoT device data anomalies.

Abolition of restrictions and research on precondition for nominating drone photographing free area (규제혁파, 드론 촬영 자유구역 지정을 위한 선결조건 연구)

  • Seok, Geum-Chan;Park, Gye-Soo;Nam, Soung-Ho;Kim, Young-Ki
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.209-217
    • /
    • 2020
  • The background of the research is the following. With the prosperity of drone industry, the government has been actively promoting measures to nominate 'drone photographing free areas'. However, existing laws, and procedures are rather unclear with related environmental factors in discordance with one another. Hence, voices in need for establishing a clear precondition for nominating drone photography free area have been rising. The purpose of the research is to provide measures for the preconditions to establish photography free areas for convenient drone photographing. The research utilizes literary methods, conducting focus group interviews to coordinate with specialists who can participate and discuss so that they can provide improvement measures. The research renders improvement measures in different sectors including 2x items in aviation security law, 8x items in free area nomination and procedure, 4x items in infrastructure establishment and information management area. The expected effects are the following: by attaching drone photography with aviation security law, nominating photography free area can be linked up with the Ministry of Land Infrastructure and Technology. Secondly, by enlarging photography restricted area to upper mid-air, a three dimensional drone security will be possible. Thirdly, by providing a 'Yongin area standard model', free area nomination will become more easy. Future research will focus on enhancing aviation security law regarding drone photographing. In addition, the promotion to nominate free areas for 33x responsible areas in accordance with the National Intelligence service will be required.

The Study of a rational management to the protective area of military installations (군사시설보호구역의 합리적 관리방안에 관한 연구)

  • Kim, Myeong-Sun
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.23-89
    • /
    • 2004
  • The protective area of military installations can be a essential investment goods for producting public goods like military installations and national security. For the purpose of this, The protective area of military installations are set up and applicated at important strategic areas. It causes colplications and frictions among the people, government and army inevitably to set up the protective area of military installations, as the relation between the army which produces security or public goods and the people that make and use valuable goods is opposed and contradictory to each other. Heretofore, the civil petition of the protective affair to military installations has been presented individually. As local self- government is fixed, a local selg-governing body presents many civil petitions now. Therefore the protective affair to military installations came to be examined carefully in the aspecs of improving the relationship between the civil and army, raising natinal competitiveness, and increasing efficiency of military operations. Though the relationship between the civil and army is opposed and contradictory, it is required to be in keeping with each other with a situation around society, that is, changes and trend of national security, politics, economy, society. Accordingly, if you drive plans of rational management to the protective area of military installations, you can not only achieve successful military installations, but also be a great help to growth of a local community. Then 「The Army with the people」worthy of the name can be real.

  • PDF