• Title/Summary/Keyword: Security Companies

Search Result 1,047, Processing Time 0.021 seconds

Design and Implementation of Unified Network Security System support for Traffic Management (종단간 트래픽 관리를 지원하는 통합 네트워크 보안시스템 설계 및 구현)

  • Hwang, Ho-Young;Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.267-273
    • /
    • 2011
  • The importance of networking capability is gaining more weight for enterprise business and high-speed Internet access with guaranteed security management is essential to companies. This paper presents a unified network security management solution to support high-speed Internet access, active security management, traffic classification and control. The presented system provides firewall, VPN, intrusion detection, contents filtering, traffic management, QoS management, and history log functions in unified manner implemented in a single appliance device located at the edge of enterprise networks. This will enable cost effective unified network security solution to companies.

Cyber Defense Analysis and Improvement of Military ecosystem with Information Security Industry (국방 사이버 방호체계 구축 생태계 취약점 분석 및 개선방안)

  • Baek, Jaejong;Moon, Byoung-Moo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1263-1269
    • /
    • 2014
  • Since the cyber defense has been dependent on commercial products and protection systems, in aspect of the recent trends, our cyber defence ecosystem can be more vulnerable. In case of general defense weapon companies, they have to be observed by the government such as certain proprietary technologies and products for the protection from the enemy. On the contrary, most cyber weapon companies have not been managed like that. For this reason, cyber attack can reach to the inside of our military through the security hole of commercial products. In this paper, we enhanced a military cyber protection ecosystems out of enemy attacks and analyze the hypothetical scenarios to evaluate and verify the vulnerability, and finally more securable ecosystem of military protection system is presented politically and technically.

A Study on the Education Curriculum for Bodyguarding Related Departments with the Prospect of Security Services (한국 경비업발전 전망에 따른 경호관련학과 교육과정 연구)

  • Kim, Young-In
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.89-108
    • /
    • 2002
  • The prospect of security services industries is as followings. First, integrated security system will be increased in the security service sphere of collective housing such as apartments. Second, the needs to security services with high-tech electronic security system and systematic security service against crimes will be increased. Third, the needs to crime prevention and disaster prevention service including information security service by means of internet and information and communication technology will be increased. Fourth, perhaps domestic market of security service will be reshaped in relation with localization trend and entrance of foreign security service companies to our country. With these conclusions I think that the departments of universities related to security services will focus on their social roles.

  • PDF

Perceptions of the Relationship between Port Security Level, Resilience, Cargo Operational Performance, and Sustainability Performance among Korean Port Operators and Shipping Companies

  • Chan-Ho Kim;Sang-Gyun Choi;Sung-Ki Kim
    • Journal of Korea Trade
    • /
    • v.27 no.3
    • /
    • pp.65-86
    • /
    • 2023
  • Purpose - As globalization progresses, complexity also increases, and various factors that threaten port functions are emerging. Accordingly, the demand for port security to prevent the crisis and resilience that quickly recovers its original function after the crisis is also increasing in port operations. However, few studies have examined how to ensure the port security and how the resilience affects operation performance of port and sustainability performance as well. So the study aims to find out how port security affects port resilience and port operational performance, and consequently, this two factors affect socioeconomic and environmental sustainability performance respectively and synthetically. Design/methodology - Confirmatory Factor Analysis (CFA) was first performed to determine the validity of the factors of model and hypothesis test was performed using Structural Equation Model (SEM) to analyze the Port Performance Model, which show the perception logic among port security level, port resilience, operation performance, and sustainability performance. In order to empirically analyze this model, total 264 respondents from port security operators, shipping companies in South Korea were surveyed. Findings - As result of SEM, First, port security level positively affected the resilience (H1) and cargo operational performance (H2) but not in both of the sustainability performances (H3, H4). Second, resilience positively affected only cargo operational performance (H5) and socio-economic sustainability performance (H7). Last, cargo operation performance positively affects the both of sustainability performances (H8, H9). Originality/value - It was confirmed that port security could improve cargo operational performance through ensuring port resilience and eventually increase the socio-economic sustainability. Therefore the study implies that careful integration and management of port security, port resilience, and sustainability are required, along with compromise on sustainable development goals in the social, economic, and environmental area among all stakeholders.

Impact of Corporate Social Responsibility on Organizational Trust and Organizational Commitment in Private Security Companies (시큐리티 기업의 사회적 책임이 조직신뢰 및 조직몰입에 미치는 영향)

  • Kim, Il Gon;Bae, Du Youl
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.41-50
    • /
    • 2012
  • The findings of the study were as follows: First, as a result of analyzing the relationship of the demographic characteristics of the subjects to their awareness of corporate social responsibility, organizational trust and organizational performance, there were differences in awareness of corporate social responsibility according to the form of employment, academic credential and marital status. As for awareness of legal/ethical responsibility by the form of employment, the regular workers put more emphasis on that than the irregular workers. Second, as a result of analyzing the relationship of the corporate social responsibility of the private security companies to organizational performance, namely organizational commitment and organizational citizenship behavior, the two factors were found to affect each other.

Enhancement of a Secure Remote Working Environment using CloudHSM and edge-DRM Proxy (Cloud HSM와 edge-DRM Proxy를 활용한 안전한 원격근무 환경 강화 연구)

  • Kim, Hyunwoo;Lee, Junhyeok;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.25-30
    • /
    • 2021
  • Due to the current COVID-19 pandemic, companies and institutions are introducing virtual desktop technology, one of the logical network separation technologies, to establish a safe working environment in a situation where remote work is provided. With the introduction of virtual desktop technology, companies and institutions can operate the network separation environment more safely and effectively, and can access the business network quickly and safely to increase work efficiency and productivity. However, when introducing virtual desktop technology, there is a cost problem of high-spec server, storage, and license, and it is necessary to supplement in terms of operation and management. As a countermeasure to this, companies and institutions are shifting to cloud computing-based technology, virtual desktop service (DaaS, Desktop as a Service). However, in the virtual desktop service, which is a cloud computing-based technology, the shared responsibility model is responsible for user access control and data security. In this paper, based on the shared responsibility model in the virtual desktop service environment, we propose a cloud-based hardware security module (Cloud HSM) and edge-DRM proxy as an improvement method for user access control and data security.

A Study on The Step-by-step Security Measures of Project through Cases (사례를 통한 프로젝트 단계별 보안 방안에 대한 연구)

  • Shin, Seong-Yoon;Jang, Dai-Hyun;Kim, Hyung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.44-46
    • /
    • 2012
  • Leading companies has led to the victimization being leaked to accept personal information by the cyber attack. Also planned hacking cases on purpose such as acquiring monetary gain or social distracting is constantly increasing. In this paper, we identify examples of the project step-by-step leading IT services companies to perform security activities. Real-world projects step-by-step through security measures that can be applied are presented.

  • PDF

A study on the physical security market economy revitalization plan (물리보안 시장경제 활성화 방안에 관한 연구)

  • Min Su Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.115-120
    • /
    • 2023
  • In the domestic physical security (mechanical security) market, there is an increasing variation in the expansion of security areas due to the infrastructure of large enterprises and small and medium-sized enterprises. In other words, problems related to on-site dispatch between companies are constantly being raised due to the limitation of physical security service s to the scope of dispatch according to the dispatch time. Therefore, in this study, based on the results of the criteria for the scope of dispatch as a criterion for dispatch time through simulations related to on-site dispatch, we propose a plan to activate the physical security (mechanical security) market in the future.

Security-Based Intranet Structure

  • Lee, S. M.;Lee, P. J.
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.265-273
    • /
    • 1997
  • Intranet is an enterprise network using Internet protocols as communication standard and HTML as content standard. The Internet is like a house built on information water. It has a lot of strong points as a future enterprise network. However, companies wish to have confidence in its functional and economic effectiveness and security before adopting it. The security issue especially is a problem to solve inevitably. Enterprises will hold back to adopt Intranet unless there are enough security counter plans and countermeasures against vulnerabilities of Intranet(it is the wise decision !). Nevertheless the researches related to Intranet has been concentrated on techniques for building it. In this paper, we focus the security aspect of Intranet. Intranet security must be considered on the whole from structure design to users' services. We propose a security-based Intranet structure and security management system.

  • PDF

Internal and External Characteristics of Information Security Officers Affecting Organization's Information Security Performance (조직 정보보호성과에 영향을 미치는 정보보호담당임원의 내·외적 특성)

  • Oh, Ha-Kyeong;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.4
    • /
    • pp.1-19
    • /
    • 2020
  • Infringement of information security has caused the corporate image to be damaged and share price to fall, and it is emerging as an organizational risk. The value of information assets in enterprises has led to a higher level of security than in the past. As a result, companies are aware of the need for officers to protect information and to oversee a security management system. However, despite the growing importance of information security officers, there is a lack of research on their roles and characteristics. This study validates the relationship between determinants that affect the performance of information security. And a structural equation model was presented and empirically analyzed to see the impact of the internal and external characteristics of the staff in charge of information security on the organization's information security performance.