• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.025 seconds

A Study of Energy Security Cooperation and its Integration Potential in South America through Brazilian Leadership (남미지역 에너지안보 협력과 통합 가능성 연구 : 브라질의 리더십 역할 고찰)

  • Ha, Sang-Sub
    • Journal of International Area Studies (JIAS)
    • /
    • v.15 no.1
    • /
    • pp.83-108
    • /
    • 2011
  • South America has vast energy resources with the renewable and non-renewable sources. However, many countries in the region are unable to guarantee adequate energy security both of energy supply and demand. Currently the possibility of energy security is high through regional energy integration based on the potential economic benefits. The difference of regulation system with the individual countries in the region impose strong barriers to integration process. Security of energy supply and its demand as well is fundamental issues in this region and regional energy cooperation is essential for getting rid of the insecurity of energy supplies. Despite of this problem, currently Latin American countries made a great effort to make multilateral energy security regime through projecting great energy infrastructure network(e.g. IIRSA) or mechanism especially in South America, which can give countries access to the region's reserve supplies by providing regulations and pricing mechanism with a shared energy market in this region. Brazil's active leading in the formulation of such movement toward energy security integration and participation of energy infrastructure network is good initiative to enforce this great energy security change. Politically and economically, Brazil's geographical position and the level of market size and oil and natural gas resources, in addition the leadership in renewable energy sources make it a sound candidate to take over the coordination of the secure integration of region's energy market. However, on the conditions of existing many obstacles such as, control of the output of the region's power plant, energy flows, the environmental matter within local community must be overcome to make more advance process and steps. Finally, to secure more institutional approach, this region must settle regional disputes resolution regime urgently.

Analysis of Research Trends of the Information Security Audit Area Through Literature Review (문헌 분석을 통한 정보보안 감사 분야의 국내 및 국제 연구동향 분석)

  • So, Youngjae;Hwang, Kyung Tae
    • Informatization Policy
    • /
    • v.30 no.4
    • /
    • pp.3-39
    • /
    • 2023
  • With the growing importance of information/information system, information security is emphasized, and the significance of information security audit as a tool for maintaining the proper security level is increasing as well. The objectives of the study are to identify the overall research trends and to propose future research areas by analyzing domestic and overseas research in the area. To achieve the objectives, 103 research papers were analyzed based on both general and subject-related criteria. The following are the major research results : In terms of research approach, more empirical studies are needed; For subject "Auditor," studies to develop a framework for related variables (e.g., capability) are needed; For subject "Audit Activities/Procedures," future research should focus on the process/results of detailed audit activities; Future domestic research for "Audit Areas" should look for the new technology/industry/security areas covered by foreign studies; For "Audit Objective/Impact," studies to define the variables (e.g., performance and quality) systematically and comprehensively are needed; For "Audit Standard/Guidelines," research on model/guideline needs to be continued.

A Study on the Mutual Cooperation of Private Security and Local Government (지방자치단체와 민간경비의 상호협력에 관한 연구)

  • Song, Sang-Wk;Lee, Min-Hyong
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.105-128
    • /
    • 2006
  • The suggestions that follow are about the plan for the cooperation between private security and local government and the enhancement of its service for facing the change of public peace environment. Fist, by a local government collecting funds, the business for revitalization of local economics should be done to enhance local economic independence. Second, the autonomous right of a local government should be reinforced and the center for taking complete charge of local security should be established in the self-governing body. Third, the private security should be connected with the local characteristics, the role of which enlarged as well. For this developing the model of security service for the local area and working together between private security and police should be achieved. Fourth, it is necessary for a local government to entrust the private security with its public security service. For this it should be achieved to set up the range of local security service and inform local residents of the advantage of security service entrusted to private security. Finally, in connection with the new system of local police, it is necessary to have clear grasp of the work related to the private security among local police services and private security business and local police should take partial charge of the public peace service. Through the cooperation between private security and local government, the role of private security will be enlarged and its business revitalized as well.

  • PDF

An Improvement in Level of Facility Security Operation (시설보안 운영수준 향상방안)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.205-225
    • /
    • 2012
  • This study is to present an improvement of facility security through the evaluation of facility security operation level. To fulfill the purpose of the study, a survey of some facilities was conducted and the result was analyzed as follows; First, although security personnels were deployed in the facilities, the level of security personnel operation was relatively low. Second, job education training level was relatively proper, that is relevant to the result that show the level of service mind and the working mind of security personnel were proper, also relevant to the relatively good work shift system. Third, although situation room was operated well, the level of restricted area set-up and access control of visitor were low, and the level of article inspection and vehicle access control were very low. Forth, the level of security manual application that include detailed security method and procedure was proper. But accident prevention and response manual application was lower than security manual application, that show preparation for fire and negligent-accident is passive. For the improvement of facility security, the high level part and low level part in the survey result could be merged. For example, we could specify factors that show low level in the survey such as security personnel operation, access control of visitor and vehicle, article inspection, accident prevention and response in the security manual and promote education circumstance that show high level.

  • PDF

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

Design and Implementation of an Authentication Method for Secure Distribution and Use of E-documents in Online Environment (온라인 환경에서의 전자문서 안전배포 및 이용을 위한 인증방법 설계 및 구현)

  • Kim, Yong
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.1
    • /
    • pp.75-98
    • /
    • 2008
  • With explosive growth in the area of the Internet and IT services, various types of e-documents are generated and circulated. An e-Document is a sort of electronic records which a organization performs works and goals. In this study, we propose a security algorithm for secure use and distribution of e-documents. Especially, the proposed method can be applied to generate digital signature which can guarantee authenticity, integrity, confidentiality of an e-document and authenticate authorized users. Also, we can get higher security level as using a smart card that provides highly storing capacity and security. We carried out an experiment to verify efficiency and security of the proposed method.

Requirements Analysis in Security Model Design of Mobile Agent Systems (이동 에이전트 시스템의 보안모델 설계를 위한 요구사항 분석)

  • Jin-Ho Park;Jin-Wook Chung
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.77-88
    • /
    • 2002
  • A mobile agent system is an infrastructure that supports the mobile agent paradigm. The main challenges encountered in designing this infrastructure are discussed in this paper. After introducing a generic mobile agent system, we discuss the design issues at two levels. System level issues like the provision of agent mobility and security, are mainly encountered in developing the runtime environments for agent execution. Language level issues, such as agent programming models and primitives, arise in providing support for mobile agent programming, mainly at the library level. This paper Identifies such system and language-level issues, and illustrates the different ways developers ate addressing them. We outline the specific challenges addressed by this dissertation, primarily in the area of mobile agent security.

  • PDF

Global market trends of Information Security Industry (정보보호 산업의 글로벌 시장 동향)

  • Hong, Jae-pyo;Kim, Pang-ryong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.790-791
    • /
    • 2015
  • This study analysis the global market trends of information security industry expanding its area through the convergence with other technologies. domestic market of information security industry is expected to show a high growth rate, given that the share of the domestic market in the world market is very low, heightened awareness caused by several information accidents, and the expansion of physical information industry's exports. The crucial point to note is the prospect that the domestic market will be led by its product market, but global market will be spearheaded by its service market. Consequently, to overcome current slump, it is need to establish market promotion strategies focused on fostering the information security service market which is higher value added than information security product market.

  • PDF

Assessing Web Browser Security Vulnerabilities with respect to CVSS

  • Joh, HyunChul
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.199-206
    • /
    • 2015
  • Since security vulnerabilities newly discovered in a popular Web browser immediately put a number of users at risk, urgent attention from developers is required to address those vulnerabilities. Analysis of characteristics in the Web browser vulnerabilities can be used to assess security risks and to determine the resources needed to develop patches quickly to handle vulnerabilities discovered. So far, being a new research area, the quantitative aspects of the Web browser vulnerabilities and risk assessments have not been fully investigated. However, due to the importance of Web browser software systems, further detailed studies are required related to the Web browser risk assessment, using rigorous analysis of actual data which can assist decision makers to maximize the returns on their security related efforts. In this paper, quantitative software vulnerability analysis has been presented for major Web browsers with respect to the Common Vulnerability Scoring System. Further, vulnerability discovery trends in the Web browsers are also investigated. The results show that, almost all the time, vulnerabilities are compromised from remote networks with no authentication required systems. It is also found that a vulnerability discovery model which was originally introduced for operating systems is also applicable to the Web browsers.

Implementation of Virtualization-based Domain Separation Security Platform for Smart Devices (안전한 스마트 단말을 위한 가상화 기반 도메인 분리 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.116-123
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices.