• 제목/요약/키워드: Security Cooperation

Search Result 886, Processing Time 0.027 seconds

A Study on Implementation of Android Security System Based on SELinux (SELinux 기반 안드로이드 보안시스템 구축에 관한 연구)

  • Jeong, Seong-Hwa;Lho, Tae-Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.3005-3011
    • /
    • 2010
  • As soon as high-performanced smart phones is rapidly emerging in recent, its security problems come to the front. Especially in case of an open platform, it is easy to be a target of virus. Many security solution industries such as Symantec and Ahnlab are developing a mobile security system, but they have not yet a commercial product. We developed the effective security function of Android system based on SELinux to solve this problem, and verified its performance by applying the user applications developed to S3C6410 board.

Measures to Use Logistics Policy to Activate the Known Shipper System in Korea (우리나라 상용화주제 활성화를 위한 물류정책 활용 방안)

  • Kwak, Bong-Hwan;Kang, Dong-Yoon
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.139-145
    • /
    • 2013
  • This study examines the logistics policy and system to activate the air freight known shipper system in Korea in order to suggest how to use the system necessary to convert and expand common shippers into known shippers. Even though "The Act on Aviation Safety and Security" and "Air Freight Security Criteria for Known Shippers" were revised in 2012 and 2011 each, the purpose was to regulate procedures to control aviation safety and security and air also freight security, so it does not include any measures to activate the known shipper system. Therefore, to activate the known shipper system, this study suggests measures to use the logistics security support system of "The Fundamental Law on Logistics Policy" revised in 2012, the logistics cooperation system, and consulting support as well.

The Investigation of Security Vulnerability of AP operation in the WLAN (in center around industrial area in Cheonan city) (무선 LAN 환경에서 AP운용의 보안 취약성 조사 (천안시 산업단지 지역을 중심으로))

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.5
    • /
    • pp.1146-1151
    • /
    • 2007
  • In this paper, it is investigated to the security services and vulnerability tools of IEEE802.11 wireless LAN, and it is considered the employment state of wireless LAN AP (access point) and analyzed the state of security vulnerability. In according to this study, among wireless LAN APs, which are operated in each company or each factory, in center around industrial of Cheonan city, 50% of AP, which is used, is not operated on WEP, and therefore, it is stated the weakness of security so far. From the result of this study, in case of mid and small company, it can be distinguished the necessity of the security training for the informaton system manager.

  • PDF

Framework of Security Development Method based on Component (컴포넌트기반 보안개발방법의 프레임워크)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.926-930
    • /
    • 2010
  • This paper is about a development framework, which is required to develop of security system is based on component. With applying of SDLC(system development life cycle) of information system, the application of information security products DLC is required at this point of time. In this paper, we review NIST requirement specification of development method, requirement criteria of SDLC in each stage, and major security guidelines of risk assessment. Also we are reviewed major security element of SDLC, and to aid understanding of security framework based on component, present the relationship fo security design and DFD in respect of spoofing for the outside entity based on threat tree STRIDE.

A Study on efficiency of security police through cooperation with private sector (민간영역과의 공조에 의한 경비경찰 효율화에 관한 연구)

  • Kim, Jin-Hyeok
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.119-140
    • /
    • 2009
  • It seems that security police's business to secure safety of state and citizens has existed since the mankind began to create a community. State was not fully responsible for such security business from the beginning. The business was carried out autonomously by the private sector for a long period. However, as the state system had been strengthened, the public sector absorbed the function. But in the modern society where various risks exist, safety of society could not be guaranteed only by public police. Accordingly, cooperation with the private sector is indispensable. In the limit of public police, autonomous organization of security companies and general citizens is expanding its scope. As a result, they should exercise partnership as a tripod to build social safety net. Security police failed to secure manpower exclusively responsible for security, despite various businesses and excessive mobilization. Accordingly, their professionalism and ability to cope with crisis are being questioned. In particular, efficiency of security police is becoming a more urgent issue in an era of international terrorism. Private sector can be classified into security companies and private autonomous organization. In case of security companies, the problem is quality and business ability of guards compared to a rapid external growth such as quantitative expansion and advancement into various businesses. In terms of pure private activity, the necessity of understanding of public police activity and conditions for organizational and continuous activity should be prepared. To tide over such problems and effectively achieve the common goal, changes in the method of employment, new establishment of security police department, and strengthening of professionalism and crisis management ability are necessary in the public police sector. In case of security companies, improvement of relations with public police through joint education, strengthening of business ability and activation of business cooperation through these matters are necessary. To maximize activity of pure private sector, it needs to establish reserve police, manage such private autonomous organization and bolster publicity with citizens.

  • PDF

An Implementation Method of LSM Based System Security Monitoring (LSM 기반 시스템 보안 모니터링 구현 방법)

  • Cho, Sung-Mok
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.562-564
    • /
    • 2011
  • 본 논문에서는 리눅스 운영체제를 기반으로 오픈 소스 침입탐지 시스템인 Snort 등울 LSM(Linux Security Module) 구조의 hooking 부분에 구현시켜 보안 관리자가 의도하는 포트 스캔, DDOS 공격, ARP/IP 위장, 서명 탐지 등이 가능하도록 시스템을 구현하는 방법을 제시하고자 한다.

  • PDF

The Effective Security Management Scheme against the loss in Hypermarket (대형 할인매장의 안전관리 방안에 관한 고찰)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.327-350
    • /
    • 2002
  • We, in Korea, have over two hundred hypermarkets and the number is continuously increasing. We drop into a hypermarket for merchandise, which is an integral part of our life style. So, we should consider safety for employees as well as customers because hundreds of thousands of people use the hypermarket every day. In addition to this consideration, the government should also be a political support relating to accidents that occur in the hypermarket because security and safety matters are important to all of us. But even now, Our security conditions do not match our ideal goal and we take countermeasures after accident or loss. This is a result of not having a security management expert coupled with a chief executive officer that has no idea about security awareness and loss prevention. In addition, we do not have specific laws to address these matters. We also lack reasonable ideas to prevent accident and loss. Now is the right time to revamp the laws and ordinances to improve the quality of civilian life. Prevention of accidents is a needed investment for all security personnel. The best solution for businesses is prevention of accidents. This will increase profits and cost-effectiveness as well as increase customer satisfaction. The company should form a security management department for comprehensive protection of assets. The goal of security management employees should be productive and effective security management. Every employee should have responsibility in mind to prevent accidents in his or her work. In addition, The company should have a systematic organization in place and regular training sessions. The most effective security management comes from cooperation of all members. In the 21st century, we pursue a high standard of living which is a result of our cooperation against any accident and loss. Sennewald says The value of security is better measure by what does not happen rather than what does.

  • PDF

A Study on Analysing Framework of Information Security Management Systems for Managing Business Risk (비즈니스 위험관리를 위한 정보보호제도 분석 프레임웍에 관한 연구)

  • Kim, Min-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.703-708
    • /
    • 2010
  • Various information sources and the increasing vulnerabilities of information systems could increase the risks of a business. The successful management of business risks depends on appropriate level of risks in business. Business risk management would be conducted in terms of financial risk management and information security management. The financial management and the information security management could not achieve an integrated business risk management. For developing the integrated business risk management, this study analyzes the various information security management systems such as ISMS, EA, ISO27001, COBIT, SPICE, Auditing. This study analyzes information security systems, which could be utilized in developing business risk management.

Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System (침입방지시스템의 보안성 품질 평가기준 및 측정체계의 개발)

  • Jeon, In-Oh;Kang, Sang-Won;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1449-1457
    • /
    • 2010
  • The intrusion prevention system solution is receiving the spotlight as the next generation security system. It is anticipated that the system will form a very active security market both domestically and overseas. Moreover, quality evaluation proving successful inspection of merchandises is required of domestic businesses seeking to operate in the international market, and general users also prefer those that have successfully passed inspection. This study has constructed a security quality evaluation model for intrusion prevention system by deriving and analyzing security quality evaluation items required by an intrusion prevention system solution and by classifying them in detail. The derived quality evaluation model will play an important role of assessing and improving the quality of intrusion prevention system.

Design and Implementation of Mobile Security Equipment System (이동형 보안장비 시스템의 설계 및 구현)

  • Kang, Young-Gu;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.6
    • /
    • pp.2062-2071
    • /
    • 2010
  • This research has been started with the goal of design and implementation of more innovative next generation security equipment system by understanding and reviewing the technological trend and status of security equipment system. The importance of environmental protection and management is ever increasing recently. Various types of equipment and system solutions are used according to the development of CCTV technology, but more efficient environmental protection and management are not in place because of situational restrictions such as expensive equipment and hard to install. Next generation security equipment system is designed and implemented to compensate and innovate these problem, and it is expected to utilize more effectively with lower cost through this research. In addition, methodology to inquire this system is proposed for security equipment system solution.