• 제목/요약/키워드: Security Conditions

검색결과 878건 처리시간 0.022초

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.

국가중요시설의 물리적 보안 요인 분석 - 항만보안을 중심으로 - (A Study on Physical Security factors of National Major Facilities - Focussed on Port Security -)

  • 이민형;이정훈
    • 융합보안논문지
    • /
    • 제15권6_2호
    • /
    • pp.45-53
    • /
    • 2015
  • 국가중요시설로서 항만보안에 특화된 물리적 보안요인이 선행적으로 제시되어야 그에 적합한 보안활동이 이루어질 수 있다고 볼 수 있다. 물리적 보안의 개념적 특성에 따라 항만시설 내에서의 그러한 요인이 어떠한가에 대한 이론적 기초자료가 제시되어야 함에도 불구하고 그러한 선행연구는 미비하며, 그에 따라 항만시설의 물리적 보안 요인에 대한 탐색적 연구가 이루어져야 한다. 이를 위한 연구방법으로서 본 연구에서는 델파이 기법을 통하여 전문가 패널의 의견을 수렴하여 이에 대한 필요성과 적합성을 평가하고자 하였다. 3차에 걸친 델파이 조사 분석결과를 살펴보면 제1차 개방형 설문 조사에서 전체 패널들의 의견을 수합한 결과 총 168개 중 응답 빈도수가 2이상인 중복응답 87개만 수렴하여 중복된 항목을 제거 및 수정하여 총 19개의 물리적 보안 요소가 도출되었다. 이를 토대로 제2차 필요성 및 제3차 적합성에 대한 델파이 조사를 통하여 기술통계분석과 내용타당도 분석 결과 3개 영역 12개 요인이 최종 선정되었다.

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.

민간경비역량의 강화방안 (The Reinforcing plan of private security capabilities)

  • 박호정
    • 융합보안논문지
    • /
    • 제15권6_2호
    • /
    • pp.19-28
    • /
    • 2015
  • 최근 범죄가 증가하고 흉포화되는 현실에서 경찰력만으로 사회의 안전을 유지하는 것은 한계에 다다르게 되었고. 사회의 안전과 질서유지를 위하여 민간경비의 역할확대가 요구되고 있다. 그러나 현행 경비업법과 관련법의 규정은 많은 한계를 가지고 있다. 민간경비의 역할과 기능을 합리적으로 조정하여 사회의 안전을 유지하기 위하여 민간경비역량의 강화가 필요하고 이를 위해서 여러 방안이 요구된다고 할 것이다. 경비업법과 청원경찰법을 통합하고 전체적으로 통일된 민간경비업법을 마련하고 이를 통하여 민간경비원의 구체적 권한 규정을 마련하는 토대가 될 수 있다. 또한 민간경비의 역할을 확대할 수 있도록 경비업법의 관련규정을 보완하여 사회의 요구에 적절히 대처할 수 있도록 경비업법 제7조 제1항 규정이 수정되어야 할 것이다. 민간경비의 공적책임을 강조하고 업무수행을 위한 여건을 마련할 수 있도록 민간경비원의 권한을 경비업법에 명문화하여 민간경비원 권한행사의 근거를 법률에 규정하여야 한다. 이와 관련하여 민간경비원에게 근무구역내에서 제한된 불심검문권을 부여함으로써 민간경비역량을 강화할 수 있다고 본다. 경비업법의 개정을 통하여 민간경비원의 권한강화을 강화하고 절차규정을 명확하게 한다면 부족한 경찰력을 보완함으로써 범죄예방과 치안유지에 많은 도움이 될 수 있다.

대형 할인매장의 안전관리 방안에 관한 고찰 (The Effective Security Management Scheme against the loss in Hypermarket)

  • 최선태
    • 시큐리티연구
    • /
    • 제5호
    • /
    • pp.327-350
    • /
    • 2002
  • We, in Korea, have over two hundred hypermarkets and the number is continuously increasing. We drop into a hypermarket for merchandise, which is an integral part of our life style. So, we should consider safety for employees as well as customers because hundreds of thousands of people use the hypermarket every day. In addition to this consideration, the government should also be a political support relating to accidents that occur in the hypermarket because security and safety matters are important to all of us. But even now, Our security conditions do not match our ideal goal and we take countermeasures after accident or loss. This is a result of not having a security management expert coupled with a chief executive officer that has no idea about security awareness and loss prevention. In addition, we do not have specific laws to address these matters. We also lack reasonable ideas to prevent accident and loss. Now is the right time to revamp the laws and ordinances to improve the quality of civilian life. Prevention of accidents is a needed investment for all security personnel. The best solution for businesses is prevention of accidents. This will increase profits and cost-effectiveness as well as increase customer satisfaction. The company should form a security management department for comprehensive protection of assets. The goal of security management employees should be productive and effective security management. Every employee should have responsibility in mind to prevent accidents in his or her work. In addition, The company should have a systematic organization in place and regular training sessions. The most effective security management comes from cooperation of all members. In the 21st century, we pursue a high standard of living which is a result of our cooperation against any accident and loss. Sennewald says The value of security is better measure by what does not happen rather than what does.

  • PDF

Anti-Crisis Management In The System Of Economic Security Of International Business

  • Blakyta, H.V.;Zubko, T.L.;Zhuk, O.S.;Kasianova, A.O.;Guliaieva, N.M.;Vavdiichyk, I.M.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.269-274
    • /
    • 2022
  • Economy of Ukraine is characterized by the rapidly increased level of financial failures at a corporate level. Conditions of doing business in Ukraine become tighter year after year and it should motivate the business owners not only to watch more accurately the state in which their business is but also to introduce new, more precise, more tight systems of crisis management and economic security. The experience shows that in order to stay afloat and not to suffer losses companies should pay more attention to different areas of economic security, such as production potential, financial indicators, logistics, staff, etc. For this purpose companies should use a system of valuation of the most important for their activity indicators and transform their values in an integral one in order to use this assessment in making managerial decisions. Such a valuation is one of the components which the article presents. The article also reveals the key points which characterize crisis management as an integral part of enterprise development and economic security. There are specified the essence and problems of crisis management and proposed the ways of raising the level of economic security of a company based on the example of an industrial and commercial enterprise. The key focus of the enterprise's economic security management is defined as constructive responses to threats from the external environment and, as a result, ensuring stable functioning and effective realization of untapped potential in the future. The current assumption is to explain the scheme of strategic management of an industrial and commercial enterprise and to calculate the methodology of an express assessment of the level of enterprise economic security, taking into account the components of crisis management. To assess the level of economic security of the enterprise, it is proposed to use the method of point assessment, which is based on a multi-level system of indicators, which covers the main areas of the enterprise's activity.

단일 선로고장시 정적 안전도 향상을 위한 유연송전기기 운전 방안 (A Security-oriented Operation Scheme of FACTS Devices to Cope with A Single Line-faulted Contingency)

  • 임정욱
    • 조명전기설비학회논문지
    • /
    • 제18권3호
    • /
    • pp.149-155
    • /
    • 2004
  • 본 논문에서는 상정사고 해석을 통해 결정된 가장 심각한 단일 선로고장에 대하여 부하차단이나 재급전을 하지 않고, 유연송전기기의 운전만으로 안전도를 향상시켜 이를 극복할 수 있는 방법을 제시하였다. 즉, 직렬, 병렬, 직병렬보상기기 등 유연송전기기의 각 종류별로 정적 안전도 여유를 최대화하고 안전도 지수를 최소화하는 방법을 개발하였고, 이를 통하여 각 유연송전기기의 최적 운전점을 결정하는 방법을 개발하였다. 여기서, 정적 안전도 지수는 선로 조류 및 모선 전압에 관한 안전도를 정량화하여 식으로 나타낸 것이다. 안전도 지수가 작아지면 안전도 여유는 커지는데, 본 논문에서는 안전도 지수를 반복계산법으로 최소화하였다. 본 논문에서는 제안한 방법은 IEEE 57모션개통에 적용하여 제안된 방법의 정당성을 수치적으로 입증하였다.

민간경비원 교육과정의 문제점과 개선방안 (The Suggestion for Improvement of the Education System of Private Security Employees)

  • 안황권;김일곤
    • 융합보안논문지
    • /
    • 제12권2호
    • /
    • pp.13-21
    • /
    • 2012
  • 경비업체는 다른 모든 기업조직과 마찬가지로 조직 구성원들의 잠재적 능력을 최대한 발휘하여 조직의 목표와 개인의 목표를 달성할 수 있도록 인적자원을 관리하고 있다. 특히 경비업은 고객의 생명 및 신체에 대한 위해, 재산에 대한 침해 등을 경계하고 방지하는 업무를 수행하기 때문에 그 업무를 담당하고 있는 경비요원의 능력과 자질이 무엇보다 중요하다. 따라서 민간경비 서비스를 제공하는 경비요원들이 어떤 교육을 받고 어떤 서비스를 제공하느냐는 바로 고객의 생명과 신체와 재산에 직접적인 영향을 미치기 때문에 경비원의 법정교육 등은 매우 중요하며 나아가 직 간접적으로 민간경비산업에 영향을 미치는 것이다. 이러한 문제의식 하에서 본 연구는 경비원 법정교육의 변천과정을 살펴보고 나아가 현행 경비원 법정교육제도를 분석하여 문제점을 도출한 후 이에 대한 발전방안을 제시하는 것이 목적이다.

고층건물 화재시 인명구조 방법에 관한 연구 (A Study on Rescue of the Human Life against the Fire in the High-rise Building)

  • 최권중
    • 시큐리티연구
    • /
    • 제5호
    • /
    • pp.309-325
    • /
    • 2002
  • It was because mankind could use the fire that we have been civilized. creating a brilliant culture and developing an industrial society. While fire is very useful to our life, the number of the victims of fire continues to increase, This study suggests the ways to rescue the people safely when they are subject to a fire in a high-rise building. To this end, the concept of fire is reviewed. Fire breaks out when the conditions for congestion are met, and therefore. if any of the conditions can be blocked, the fire will be extinguished. In other words. the knowledge of such conditions will greatly help the fire fighters to rescue the people, and so. such conditions for congestion as flammable, heat, oxygen and chain reaction are examined. In addition, the effects of such by-products of fire as heat and smoke on human body are reviewed. In order to rescue the people more safely, the fire fighters are requested to review the situation and design a rescue strategy before being engaged in a full-scale rescue activity. This study discusses various rescue methods using such passages or equipments as stair case, double ladder, special fire fighting vehicle, elevator, jumar, rope, helicopter, etc. In conclusion. since it is more difficult to rescue the people from a high-rise building than from the ground, it is essential to design a rescue program not after fire but before it and thereby, minimize the number of victims.

  • PDF

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.