• Title/Summary/Keyword: Security Companies

Search Result 1,047, Processing Time 0.024 seconds

A Study on Security Measure of Step-Wise Project (단계별 프로젝트 보안 방안에 대한 연구)

  • Shin, Seong-Yoon;Jang, Dai-Hyun;Kim, Hyeong-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2459-2464
    • /
    • 2012
  • Many companies has led to the damage case being leaked to personal information by taking cyber attack. Also, planned hacking cases continues to increase for the purpose of acquiring monetary gain or causing social disruption induction, etc. Approximately 75% of the Web site attacks exploit the vulnerability of the application. Major security issue is to strengthen the S/W development security according to the legal basis. The members of the project team is the fact that the lack of recognition of application development security. In addition, passive response and security validation/testing, etc. throughout the SDLC to the entire area is insufficient. Therefore, rework due to the belated discovery of a defect has occurs. In this paper, we examine the case of the project step-by-step security activities by performing IT services companies. And, through this, we present security measures that can be applied to the step-wise real-world projects.

Improvement the Security Service of Cash Delivery Using Real-time Binary CDMA Monitoring (실시간 Binary CDMA 모니터링을 통한 현금호송 보안업무 개선방안)

  • Kim, Min-Su;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.53-60
    • /
    • 2012
  • Financial institutions keep putting efforts to filling cash into ATMs and branches in order to provide customers with better service. This kind of job usually required an automobile unit to be done, and financial institutions employee perform this task directly or sourcing out to professional security service companies. However, the job has been of ten a target of criminals because it deals with cash. In fact, since 2003, there were several cash truck robberies occurred. This circumstances made the public be aware of the necessity of creative research and the strict management of financial institutions and security companies. However, the existing studies on security service of cash delivery suggest only how to improve the job legally and in operation, and the technological aspect of the improving way has not been studied. Therefore, this study aimed at suggesting an improvement the security service of cash delivery using real-time binary CDMA monitoring for providing better safety service to customers.

Factors to Affect Acceptance of Open Banking from Information Security Perspectives (정보보호 관점에서의 오픈뱅킹 수용도에 대한 영향요인)

  • Go, Jeunghyeun;Lee, Woonboo
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.63-81
    • /
    • 2021
  • Joint financial network of Korea Financial Telecommunications and Clearings Institute, which is an essential facility with a natural monopoly, maintained its closedness as monopoly/public utility model, but it has evolved in the form of open banking in order to obtain domestic fintech competitiveness in the rapidly changing digital financial ecosystem such as the acceleration of Big Blur. In accordance with digital transformation strategy of financial institutions, various ICT companies are actively participating in the financial industries, which has been exclusive to banks, through the link technology called Open API. For this reason, there has been a significant change in the financial service supply chain in which ICT companies participate as users. The level of security in the financial service supply chain is determined based on the weakest part of the individual components according to the law of minimum. In addition, there is a perceived risk of personal information and financial information leakage among the main factors that affect users' intention to accept services, and appropriate protective measures against perceived security risks can be a catalyst, which increases the acceptance of open banking. Therefore, this is a study on factors affecting the introduction of open banking to achieve financial innovation by developing an open banking security control model for financial institutions, as a protective measures to user organizations, from the perspectives of cyber financial security and customer information protection, respectively, and surveying financial security experts. It is expected, from this study, that effective information protection measures will be derived to protect the rights and interests of financial customers and will help promote open banking.

A Study on the Counter-Terrorism and Security Strategy for Korean Companies Engaged in the Overseas Business (해외진출 한국 기업의 대테러 경호${\cdot}$경비 전략에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.507-528
    • /
    • 2007
  • June 2006, five korean oil workers, three who worked for Daewoo and two for Korea Gas, released after being held hostage by separatist militants in Nigeria. The kidnapping was happened in the Niger Delta where armed separatists are demanding a larger share in oil revenues and compensation for environmental destruction due to oil exploration. Seven months later, nine Korean pipeline workers of Daewoo together with a Nigerian were kidnapped again and safely released thanks to the efforts of the company and the Korean government. These two kidnapping incidents have shown that companies engaged in the overseas business are not safe any more from the terrorist attacks and has given an invaluable lesson that the company having an intention to go abroad for business should take all possible anti and counter-measures against terrorism. The main purpose of this study is to suggest a guideline for the establishment of counter-terrorism and security strategy against terrorist attacks on the private companies at the overseas. In order to foster a better understanding of the problem, a brief history of terrorism is presented in the first part. In addition, this study analyses and describes the variations of terrorist attacks against private companies together with the terrorism related environment of Korea. Based on the outcome of the study, this paper takes a global view and perspectives of terrorist attacks against private companies and suggests consideration for the future.

  • PDF

A STUDY ON THE GROWTH OF PRIVATE SECURITY IN THE UNITED STATES (미국(美國) 민간경비의 성장요인 분석)

  • Lee, Chang-Mu
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.273-289
    • /
    • 2003
  • The purpose of this study is to explore the underlying causes of the development of private security in the United States. These include the increasing crime rates and fear of crime, the poor performance of public policing, the decentralization of political authority, the increase of mass private property, economic growth and increase of personal income, commodification of security, insurance companies' demand for tighter security and fear of litigation, and historical events such as World War I & II. Based on the findings of this study, it is suggested that no single factor would account for the growth of private security in the United States. In other words, the rapid growth of private security in the United States should be attributed to the interrelated influences of the factors given above. Finally, it might be the contribution of this study that the future development of private security in Korea would be guided by understanding the case of the United States because of the similarities of the developmental process in private security industry of two countries.

  • PDF

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.

A Study on Smart Tourism Based on Face Recognition Using Smartphone

  • Ryu, Ki-Hwan;Lee, Myoung-Su
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.39-47
    • /
    • 2016
  • This study is a smart tourism research based on face recognition applied system that manages individual information of foreign tourists to smartphone. It is a way to authenticate by using face recognition, which is biometric information, as a technology applied to identification inquiry, immigration control, etc. and it is designed so that tourism companies can provide customized service to customers by applying algorism to smartphone. The smart tourism system based on face recognition is a system that prepares the reception service by sending the information to smartphone of tourist service company guide in real time after taking faces of foreign tourists who enter Korea for the first time with glasses attached to the camera. The smart tourism based on face recognition is personal information recognition technology, speech recognition technology, sensing technology, artificial intelligence personal information recognition technology, etc. Especially, artificial intelligence personal information recognition technology is a system that enables the tourism service company to implement the self-promotion function to commemorate the visit of foreign tourists and that enables tourists to participate in events and experience them directly. Since the application of smart tourism based on face recognition can utilize unique facial data and image features, it can be beneficially utilized for service companies that require accurate user authentication and service companies that prioritize security. However, in terms of sharing information by government organizations and private companies, preemptive measures such as the introduction of security systems should be taken.

A Study on the Trade-Economic Effects and Utilization of AEO Mutual Recognition Agreements

  • LEE, Chul-Hun;HUH, Moo-Yul
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.25-31
    • /
    • 2020
  • Purpose: The AEO (Authorized Economic Operator) program, created in 2001 in the United States due to 9.11 terrorist's attack, fundamentally changed the trade environment. Korea, which introduced AEO program in 2009, has become one of the world's top countries in the program by ranking 6th in the number of AEO certified companies and the world's No. 1 in MRA (Mutual Recognition Agreement) conclusions. In this paper, we examined what trade-economic and non-economic effects the AEO program and its MRA have in Korea. Research design, data and methodology: In this study we developed a model to verify the impact between utilization of AEO and trade-economic effects of the AEO and its MRA. After analyzing the validity and reliability of the model through Structural Equation Model we conducted a survey to request AEO companies to respond their experience on the effects of AEO program and MRA. As a result, 196 responses were received from 176 AEO companies and utilized in the analysis. Results: With regard to economic effects, the AEO program and the MRA have not been directly linked to financial performance, such as increased sales, increased export and import volumes, reduced management costs, and increased operating profit margins. However, it was analyzed that the positive effects of supply chain management were evident, such as strengthening self-security, monitoring and evaluating risks regularly, strengthening cooperation with trading companies, enhancing cargo tracking capabilities, and reducing the time required for export and import. Conclusions: When it comes to the trade-economic effects of AEO program and its MRA, AEO companies did not satisfy with direct effects, such as increased sales and volume of imports and exports, reduced logistics costs. However, non-economic effects, such as reduced time in customs clearance, freight tracking capability, enhanced security in supply chain are still appears to be big for them. In a rapidly changing trade environment the AEO and MRA are still useful. Therefore the government needs to encourage non-AEO companies to join the AEO program, expand MRA conclusion with AEO adopted countries especially developing ones and help AEO companies make good use of AEO and MRA.

Security Consideration of Virtual Reality Service (가상현실 서비스 환경에서의 보안 고려사항)

  • Lim, Sanghyeok;Jeon, Junhyun;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.11-17
    • /
    • 2018
  • As many information and communication technology companies around the world pay attention to the virtual reality as the next generation platform, the virtual reality industry is rapidly growing in various fields. For this reason, virtual reality security is becoming important as the number of users increases. In order to use the virtual reality service safely, security measures must be taken. This paper examines virtual reality trends, analyzes security threats according to vulnerabilities and vulnerabilities of virtual reality, and presents security considerations for threats.

  • PDF

Building Cooperation Policing Systems and Roles of Private Security (협력치안체제구축과 민간경비의 역할)

  • Seok, Cheong-Ho
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.67-90
    • /
    • 2010
  • Today, the police alone can not prevent a crime. And the police is limited to meet for people's the increased needs on public safety. So the police and the community needs the cooperation of a variety of resources. Police in cooperation with community resources to respond to the crime's most professional and the private sector is a private security. However, the role of private security for cooperation policing is insufficient in South Korea. So for this study to build a cooperative policing in South Korea as private security for the following four kinds of directions are presented. First, as a private security of the United States and Japan, specializes in diversified business sectors. Simple human-oriented private security of the building security get out. Instead, take the high-tech crime prevention or industry complex security should be changed to a professional organization. Second, the interaction between police and private security should be increased. Police and private security through regular meetings between the need for mutual interests and build consensus is needed. The role of private security companies to be represented on the Security Association of South Korea's active role in the matter. Third, efforts to improve the image of private security activities and the publiciy activity of private security is needed. Some of the private security in an effort to escape a negative image to the people and actively promote a positive image is necessary. Finally, for South Korea to the level the cooperation between the police and private security are required to develop system models. Front-line policing priority in the field and the mutual understanding between the police and private security in an effort to have a positive perception is needed. Equal partners, especially the police and private security to private security companies to have recognized experts in their own recruitment and training should be improved by strengthening the expertise.

  • PDF