• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.025 seconds

Development of S-SLA based on the Analyses of Security Functions for Anti-virus System (안티바이러스 시스템 보안기능 분석을 통한 보안SLA 등급화 지표 개발)

  • Yi, Wan-Suck;Lee, Dong-Bum;Won, Dong-Ho;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.237-249
    • /
    • 2010
  • If one analyzes recent cyber incidents including personal information infringement cases, it seems like actual attack is targeting Internet service providers but actually they are targeting Internet service users. For many users, all the services were not provided to them as they have signed for in the contract or personal informations, which users have provided to service providers when signing contracts, were disclosed to public without users' consent causing aftereffect. As a result, importance of S-SLA indexes, which is to be included in the SLA to be signed between a user and a service provider, is ever more increasing. Especially, if there is a S-SLA indexes for anti-virus services, service providers have to provide a high quality of service as they have signed in the SLA. However, there wasn't any researches in the S-SLA area domestically and there are only limited SLA indexes related to system or service maintenances at the moment. Therefore, this paper analyses security functions in anti-virus services and proposes S-SLA indexes for different security level.

Perceptions of the Relationship between Port Security Level, Resilience, Cargo Operational Performance, and Sustainability Performance among Korean Port Operators and Shipping Companies

  • Chan-Ho Kim;Sang-Gyun Choi;Sung-Ki Kim
    • Journal of Korea Trade
    • /
    • v.27 no.3
    • /
    • pp.65-86
    • /
    • 2023
  • Purpose - As globalization progresses, complexity also increases, and various factors that threaten port functions are emerging. Accordingly, the demand for port security to prevent the crisis and resilience that quickly recovers its original function after the crisis is also increasing in port operations. However, few studies have examined how to ensure the port security and how the resilience affects operation performance of port and sustainability performance as well. So the study aims to find out how port security affects port resilience and port operational performance, and consequently, this two factors affect socioeconomic and environmental sustainability performance respectively and synthetically. Design/methodology - Confirmatory Factor Analysis (CFA) was first performed to determine the validity of the factors of model and hypothesis test was performed using Structural Equation Model (SEM) to analyze the Port Performance Model, which show the perception logic among port security level, port resilience, operation performance, and sustainability performance. In order to empirically analyze this model, total 264 respondents from port security operators, shipping companies in South Korea were surveyed. Findings - As result of SEM, First, port security level positively affected the resilience (H1) and cargo operational performance (H2) but not in both of the sustainability performances (H3, H4). Second, resilience positively affected only cargo operational performance (H5) and socio-economic sustainability performance (H7). Last, cargo operation performance positively affects the both of sustainability performances (H8, H9). Originality/value - It was confirmed that port security could improve cargo operational performance through ensuring port resilience and eventually increase the socio-economic sustainability. Therefore the study implies that careful integration and management of port security, port resilience, and sustainability are required, along with compromise on sustainable development goals in the social, economic, and environmental area among all stakeholders.

A Small-area Hardware Design of 128-bit Lightweight Encryption Algorithm LEA (128비트 경량 블록암호 LEA의 저면적 하드웨어 설계)

  • Sung, Mi-Ji;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.888-894
    • /
    • 2015
  • This paper describes an efficient hardware design of Lightweight Encryption Algorithm (LEA) developed by National Security Research Institute(NSRI). The LEA crypto-processor supports for master key of 128-bit. To achieve small-area and low-power implementation, an efficient hardware sharing is employed, which shares hardware resources for encryption and decryption in round transformation block and key scheduler. The designed LEA crypto-processor was verified by FPGA implementation. The LEA core synthesized with Xilinx ISE has 1,498 slice elements, and the estimated throughput is 216.24 Mbps with 135.15 MHz.

Reference Image Update on the Security System for the Moving Object Detection (침입자 검출을 위한 보안 시스템에서의 참고영상 갱신 방안에 관한 연구)

  • 안용학
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.99-108
    • /
    • 2002
  • In this paper, I propose a reference image updating algorithm for Intruder Detection System using a difference image method that can reliably separate moving objects from noisy background in the image sequence received from a camera at the fixed position. The proposed algorithm consists of four process determines threshold value and quantization, segmentation of a moving object area, generation of adaptive temporary image that removes a moving object area, and updates reference image using median filtering. The test results show that the proposed algorithm can generate reference image very effectively in the noisy environment.

  • PDF

A Study on the Factors Affecting the Establishment of Personal Information Management Systems (PIMS)

  • Seo, Young-Soo;Lee, Seong-Il;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.3
    • /
    • pp.31-47
    • /
    • 2012
  • As the dependence on information is increasing, the protection of personal information (PI) becomes a critical issue for the organizations, causing not only financial loss but also negative impacts on corporate images and reputations. To date, academic research in this area is scarce. This study analyzes the factors affecting the establishment and/or implementation of Personal Information Management System (PIMS) and provides direction for the practice. In this study, we assume that PIMS is one of the new technology adopted by organizations, and Unified Theory of Acceptance and Use of Technology (UTAUT) model is selected as a base model for the study. Using structural equation modeling technique, both measurement and structural models are validated, and hypotheses are tested. Major findings of the study include (1) the major driver of the organizations attempting to adopt PIMS seems to be the improvement of the business outcomes, (2) organizational capability and resource are important in the establishment of PIMS, and (3) the perceived difficulty of the establishment of PIMS is not affecting the intention to adopt PIMS. Since the importance of personal information security is high, establishment of PIMS is becoming one of the critical issues in the organizations. The establishment of PIMS should be encouraged to strengthen the competitiveness of businesses and to enhance the security level of the entire nation. It is expected that this study may contribute to developing plans and policies for establishment of PIMS in practice, and to providing a foundation for further research in this area.

Competitive Efforts Regarding the South Pacific Islands by South Korea, Japan and China (동아시아 국가들의 태평양 쟁탈전 : 한국, 일본, 중국의 남태평양 도서국가 외교)

  • Park, Young-June
    • Ocean and Polar Research
    • /
    • v.35 no.4
    • /
    • pp.373-381
    • /
    • 2013
  • The Pacific Island Forum that consists of 14 island countries in the South Pacific has long been the focus of keen attention from East Asian countries such as South Korea, Japan and China. The South Pacific area was controlled by Japan right after the First World War. The League of Nations bestowed the right of trusteeship over the region to Japan, one of the victors in the war. However, the U.S. considered the area indispensible for its security interests in the Pacific after victory in the Second World War. With the end of Cold War period, the region again began to gain the competitive attention of Japan, China and Korea. Japan has made efforts to give economic assistance to this region by holding the Japan-Pacific Islands summit every three years. In addition, Japan is promoting a security engagement with this region by dispatching Self Defense Forces with the aim of initiating construction and development projects. In response to Japan's active involvement in the region, China also began to convene a summit meeting with these countries in 2006, making pledges of economic assistance. Furthermore, Chinese civilian companies struck deals of investment with municipal institutions in the region with a view to enhancing China's influence in the region. Japan's and China's active engagement in the region has galvanized South Korea to craft a more effective strategic approach to the region.

Implementation of Unmanned Aquaculture Security System (무인 어장 도적 감시 시스템 구현에 관한 연구)

  • Yim, Jeong-Bin;Nam, Taek-Keun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.1 s.28
    • /
    • pp.61-67
    • /
    • 2007
  • This paper describes the implementation procedures and results of Fishery Safety and Security System to secure an aquaculture area from a thief. The system designed with various functional modules to implement selectively available system providing low cost to high cost and simple function to high function according to user's requirement in a practical fishing fields. In the abalone farm field located in Jin island, Jeonranam province and having condensed aquaculture facilities with 50 cages (10 row by 5 column) within 0.5 miles from coast, practical field tests are carried out. As results from that tests, it is found that the system can guard not only the whole area of cultivating farm field but also each cages with detail.

  • PDF

World Food Perspective and Food Security in Korea (세계 식량전망과 한국의 식량대책)

  • Kim Kwang Ho
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 1998.10a
    • /
    • pp.189-209
    • /
    • 1998
  • Food resources have been supplied more and more by crop land expansion, technological Improvement for higher crop yield, establishment of irrigation system, and input of fertilizers, chemicals and others, to sustain a world population increase currently about 6 billion. Food demand will be significantly increased in the 21st century due to population increases of 90 million per year and more consumption of meat with per capital income increase. But food production increase will be limited by difficulty of crop/irrigation land expansion and small or decreasing effectiveness of fertilizer use. Development of new techniques for higher yield per ha is only one way to meet future food demand increase. Optimistic prospect for food demand/supply balance was reported by FAO until 2010, and IFPRI until 2020. However, Worldwatch Institute warned world food supply will be less than expected demand by 500 million tons of cereal grains in 2030. It is necessary to establish a national plan to meet expected worldwide shortage of food resources in 21 century. What planning should be under taken to meet the upcoming century of food shortage in Korea whose food self-sufficiency rate is only $30{\%}$. It is recommended that (1) keep paddy field area as much as 1,100 thousand ha, (2) expansion of barley and wheat cultivation on all paddy area in winter season, (3) continue development of new technology to get international superiority of food resources produced in Korea, (4) expand nationwide the importance of food security under the current financial crisis encountered In Korea, and for food security in the future unified Korean peninsula.

  • PDF

An Efficient Implementation of Lightweight Block Cipher Algorithm HIGHT for IoT Security (사물인터넷 보안용 경량 블록암호 알고리듬 HIGHT의 효율적인 하드웨어 구현)

  • Bae, Gi-Chur;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.285-287
    • /
    • 2014
  • This paper describes a design of area-efficient/low-power cryptographic processor for lightweight block cipher algorithm HIGHT which was approved as a cryptographic standard by KATS and ISO/IEC. The HIGHT algorithm which is suitable for the security of IoT(Internet of Things), encrypts a 64-bit plain text with a 128-bit cipher key to make a 64-bit cipher text, and vice versa. For area-efficient and low-power implementation, we adopt 32-bit data path and optimize round transform block and key scheduler to share hardware resources for encryption and decryption.

  • PDF

Efficient security mechanism in 3GPP-WLAN interworking (3GPP-WLAN interworking에서의 효율적인 보안 메커니즘)

  • 신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.137-144
    • /
    • 2004
  • 3GPP(3rd Generation Project Partnership)-WLAN(Wireless Local Area Network) interworking refers to the utilization of resources and access to services within the 3GPP system by the WLAN UE(User Equipment) and user respectively. The intent of 3GPP-WLAN Interworking is to extend 3GPP services and functionality to the WALN access environment. We propose an efficient mechanism for the setup of UE-initiated tunnels in 3GPP-WLAN interworking. The proposed mechanism is based on a secret key which is pre-distributed in the process of authentication and key agreement between UE and 3GPP AAA(Authentication, Authorization Accounting) server. Therefore it can avoid modular exponentiation and public key signature which need a large amount of computation in UE. Also the proposed scheme provides mutual authentication and session key establishment between UE and PDGW(Packet Data Gateway).