• Title/Summary/Keyword: Security Area

Search Result 1,686, Processing Time 0.03 seconds

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

Survey of Perception about Security Works (경비업무에 대한 경비요원 인식 조사)

  • Park, Jeong-Hun;Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.143-155
    • /
    • 2008
  • Purpose of this study is to analyze actual perception of security business of security workers centering on employees working within building and to improve accomplishment of works for security workers. For this, first, activities of security workers are discussed. Second, perception of employees of companies for the necessity of security workers, non-necessity of security workers, qualification requirements of security workers for improving business recognition were established as a framework of the study. Changes for recognition of security works in modern life are a little falling behind compared to unstopping economic development and diversifying job classifications. Even at present, expression of security works is still regarded as manager of facilities or apartments in the past. In other words, it is recognized as a simple change of title and names from apartment guard to security workers. Security works in the modern job classification is settling down as a professional field of facility management and as a part of various controls such as protection and security and its field is also expanding. It is a professional job with the purpose to analyze and prevent diverse criminal actions occurring in the society and also to introduce alternative measures with the role to prevent accidents to be occurred in variety in advance instead of simple working format taking a fixed guard post. Area of security works for the purpose of maximizing necessity of security works shall have equipped with deployment of professional security workers, consideration of business satisfaction of security workers, prevention education for rapidly changing safety accidents, and substantiality in the field. We expect to have more sophisticated area of security works with ceaseless efforts and with instillation of recognition of professionalism by security workers themselves.

  • PDF

Designing demand side education of information security professionals (수요자 중심의 정보보호 전문 인력 양성을 위한 교육과정 설계)

  • Lee, Jong Lark
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.99-106
    • /
    • 2013
  • There has been a lot of growth more than 10% in the information security industry. In accordance with the industrial growth, it increased needs for the information security manpower development as a national problem. But there is an imbalance between demand and supply of the information security manpower in terms of the quantity and quality. It is mainly caused by the curriculum of the information security is made considering for suppliers not for demanders. As a resolution to solve this problem, we suggest the curriculum of information security for vocational education and training. As the information security area is wide in view of required knowledge and technology, we design the curriculum by selecting major occupation type from the information security manpower distribution and products and then by investigating the job description using NCS(National Competency Standard). And we compared the curriculum to that of two or three year diploma courses in Korea.

A Study on Improving Security Controls in the Electronic Financial Transaction (전자금융거래 시 보안 통제 사항의 개선 연구)

  • Lee, Gangshin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.881-888
    • /
    • 2015
  • Financial Authorities have added security controls to the Electronic Financial Transaction Act and the Supervisory Regulation according to the recent frequent personal credit information leakages. Accordingly, the security level has been upgraded. But it is necessary to study more security controls to add. This paper deduces 19 security controls over the mean value to be added to the financial area receiving 15 security consultant's help.

Analysis of Education Training Program of Information Security Man Power in Domestic (국내 정보보호 교육 훈련 프로그램 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3725-3730
    • /
    • 2009
  • A serious disturbance of the 7.7 DDoS hacking gets a chance of raised awareness for importance of response countermeasure with current status of information security. The critical factor out of countermeasure of information security is the supply of information human power. In this paper, we review program of information security of domestic and foreign, from major courses of domestic university, and category of government about information security, and analyze security education training awareness program of human power in the information security area.

A Study on the Improvement of Network Security Systems Based on Critical Success Factors for Systems Development (개발 성공요인을 적용한 네트워크 보안 시스템 개선에 관한 연구)

  • Kim, Chong-Sun;Hwang, Kyung-Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.4
    • /
    • pp.121-138
    • /
    • 2007
  • This study proposes a method to improve network security systems based on critical success factors for systems development. To accomplish the research objective, the study analyzes required functions of network security systems and reviews existing methods to improve network security systems. Based on the analyses and literature review, critical success factors for development of network security systems are identified and a new method to improve network security systems based on the critical success factors is proposed. The proposed method to improve network security systems is based on utilizing multi-core processors. A prototype is developed and validated. This study will provide a good case in the network security area where research incorporating both engineering and management disciplines lacks.

  • PDF

A Study Related on Relationship between New Terrorism's and Security Strategy for Korea (뉴테러리즘의 민간시큐리티 연계와 발전방안)

  • Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.1-13
    • /
    • 2008
  • Conclusion is like below. First, as a private security area's mutual relationship and development device, it is necessary to bring up corresponding-terror expert. Second, a privatized corresponding-terror research center is necessary. Third, the importance of privatization's role for the corresponding-terror prevention law establishment. It is considered that a diversified examination research that can minimize a violation of human rights by bringing up various corresponding-terror expert, paradigm shift of workers related security area, and construct corresponding- terror education equipment as well as education content, it is not a special group's authority, should be continued by a following research. Academical area of terrorism's construction is necessary. You need to approach by private initiatively boldly with the academic world as an active mutual cooperation politically, culturally, socially, internationally, etc, rather than developing national institute initiatively. Also, in a following research, an academical research about a correlation of crime, war, terror should be done deeply, variously. It is necessary to establish an academic foundation of terror study.

  • PDF

An Area-efficient Design of SHA-256 Hash Processor for IoT Security (IoT 보안을 위한 SHA-256 해시 프로세서의 면적 효율적인 설계)

  • Lee, Sang-Hyun;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.109-116
    • /
    • 2018
  • This paper describes an area-efficient design of SHA-256 hash function that is widely used in various security protocols including digital signature, authentication code, key generation. The SHA-256 hash processor includes a padder block for padding and parsing input message, so that it can operate without software for preprocessing. Round function was designed with a 16-bit data-path that processed 64 round computations in 128 clock cycles, resulting in an optimized area per throughput (APT) performance as well as small area implementation. The SHA-256 hash processor was verified by FPGA implementation using Virtex5 device, and it was estimated that the throughput was 337 Mbps at maximum clock frequency of 116 MHz. The synthesis for ASIC implementation using a $0.18-{\mu}m$ CMOS cell library shows that it has 13,251 gate equivalents (GEs) and it can operate up to 200 MHz clock frequency.

Target Object Image Extraction from 3D Space using Stereo Cameras

  • Yoo, Chae-Gon;Jung, Chang-Sung;Hwang, Chi-Jung
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1678-1680
    • /
    • 2002
  • Stereo matching technique is used in many practical fields like satellite image analysis and computer vision. In this paper, we suggest a method to extract a target object image from a complicated background. For example, human face image can be extracted from random background. This method can be applied to computer vision such as security system, dressing simulation by use of extracted human face, 3D modeling, and security system. Many researches about stereo matching have been performed. Conventional approaches can be categorized into area-based and feature-based method. In this paper, we start from area-based method and apply area tracking using scanning window. Coarse depth information is used for area merging process using area searching data. Finally, we produce a target object image.

  • PDF

Study Tendency of Cyber Security in Power IT Area (전력 IT Cyber Security 연구 동향)

  • Kim, Hak-Man;Park, Jae-Sae;Kim, Sang-Nam
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.205-206
    • /
    • 2008
  • Electrical Power System is very important infrastructure in the country. The functions of control, monitoring and so on in the electrical power system are implemented by information technologies(IT) through cyber space. Recently, many activities for enhancing cyber security in the world. In this paper, we introduce the study tendency of cyber security in power IT areas.

  • PDF