• Title/Summary/Keyword: Security Department

Search Result 4,701, Processing Time 0.034 seconds

Private Security Regulation: A Comparative Study of South Korea and Mongolia (한국과 몽골의 경비업법 비교연구)

  • Lkhagvamm, G;Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.139-165
    • /
    • 2016
  • In Mongolia, the regulation related to the private security industry, the Law on Contracted Private Security Services, was legislated relatively recently. The Law on Contracted Private Security Services was enacted into law in Mongolia 16 years ago, in 2000. This regulation has undergone two amendments since its inception. However, new revisions still need to be made to ensure that this regulation is in line with internationally accepted standards and practices. This paper compares the existing private security regulations of South Korea and Mongolia. The purpose of this comparative study was to identify the weaknesses of and problems in the Mongolian regulation and propose amendments to the Mongolian regulation. The comparative study of the two countries' regulations showed and underscored an imperative need to make further amendments to the Law on Contracted Private Security Services. Specifically, the weaknesses of and problems in the Mongolian regulation at issue include the following: the level of accuracy in defining certain legal terms and providing the proper names for various regulations; stipulations which set forth the procedure for registering a private security company; provisions regarding operating a private security company; the details of eligibility and accountability requirements concerning chief executives and security service officers; and the scope of work provisions. This study proposes constructive amendments to strengthen the Law on Contracted Private Security Services.

  • PDF

Design of Network Topology Map Generator for Management of Security System (보안 시스템의 관리를 위한 망 토폴러지 맵 생성기의 설계)

  • Ahn, Gae-Il;Baik, Kwang-Ho;Kim, Ki-Young;Jang, Jong-Soo
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.1293-1296
    • /
    • 2002
  • 악의 있는 사용자로부터 네트워크와 시스템을 보호하기 위하여 침입 탐지 시스템이나 방화벽같은 보안 시스템들이 제안되었다. 현재 보안 영역은 사용자 망에서 ISP 망으로 확대되고 있으며, 그에 비례하여 보안 시스템의 관리가 상대적으로 중요해졌다. 또한 보안 시스템에 적용하는 정책도 단순 정적 설정에서 현재의 보안 상황을 반영하여 정책을 재 수립하는 동적 설정으로 바뀌고 있기 때문에, 이를 위하여 관리자에게 망 상태를 주기적으로 보고하는 일도 또한 매우 의미 있는 일이 되었다. 본 논문에서는 SNMP(Simple Network Management Protocol) 프로토콜을 이용하여 보안 시스템의 설치 및 운용을 용이하게 할 수 있는 망 토폴러지 맵 생성기를 설계한다. 제안하는 망 토폴러지 맵 생성기는 탐색할 네트워크 도메인이 주어지면 자동적으로 네트워크 시스템과 보안 시스템을 발견하여 망 토폴러지를 생성하며 또한 망 상태를 주기적으로 수집하는 기능도 제공한다.

  • PDF

Value Complexity of Virtual Communities and Information Security in the Postmodern World: Semantic Focus and Language Innovations

  • Khrypko, Svitlana;ALEKSANDROVA, Olena;Stoliarchuk, lesia;Ishchuk, Olena;OBLOVA, Liudmyla;Pavlovska, Olena;Andrii, Bezuhlyi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.712-718
    • /
    • 2021
  • Virtual communities are studied to analyze their characteristic features, types, and tole to modern society. The article is aimed at creating a classification of virtual communities according to specific characteristics, which can be used to model the interaction, and necessity of components that are important for the community. The classification of virtual communities will contribute to their better performance and satisfy the users' needs in information. The study reveals the value structure of virtual communities, educational and communicative influence, and the possible threats these communities may bring to society and security.

The Security and Privacy Issues of Fog Computing

  • Sultan Algarni;Khalid Almarhabi;Ahmed M. Alghamdi;Asem Alradadi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.25-31
    • /
    • 2023
  • Fog computing diversifies cloud computing by using edge devices to provide computing, data storage, communication, management, and control services. As it has a decentralised infrastructure that is capable of amalgamating with cloud computing as well as providing real-time data analysis, it is an emerging method of using multidisciplinary domains for a variety of applications; such as the IoT, Big Data, and smart cities. This present study provides an overview of the security and privacy concerns of fog computing. It also examines its fundamentals and architecture as well as the current trends, challenges, and potential methods of overcoming issues in fog computing.

Government Information Security System with ITS Product Pre-qualification (사전 검증을 통한 행정정보보호시스템 도입 방안)

  • Yeo, Sang-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.763-772
    • /
    • 2009
  • According as information-oriented society is propelled, development of various information security systems is achieved, and introduction of information security system is increasing for service offer securing from nation and public institution. In particular, government information system is increasing interest about security assessment service of government information system because verification about security is weighed first of all. Accordingly, study about various security assessment services is preceded in domestic and overseas. In this paper, analyze security assessment service of Britain and Canada, and we proposed about pre-qualification introduction plan of government information system that can offer user of nation and public institution reliability.

  • PDF

A Study on Threat Containment through VDI for Security Management of Partner Companies Operating at Industrial Control System Facility

  • Lee, Sangdo;Huh, Jun-Ho
    • Annual Conference of KIPS
    • /
    • 2019.10a
    • /
    • pp.491-494
    • /
    • 2019
  • The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.

Design of Command Security Mechanism for the Satellite Using Message Authentication Code (메세지 인증 코드 기법을 이용한 위성명령 보안 메카니즘 설계)

  • Hong, K.Y.;Park, W.S.;Lee, H.J.;Kim, D.K.
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1994.11a
    • /
    • pp.99-107
    • /
    • 1994
  • For the secure control of the communication satellite, security mechanisms should be employed on the ground station as well as on the spacecraft. In this paper, we present a security architecture fur the spacecraft command security of the communication satellite. An authentication mechanism is also proposed using message authentication code (MAC) based on the Data Encryption Standard (DES) cryptosystem.

  • PDF

A Study on the Operational Plan of Information Security Department in Colleges for Educating Information Security Personnel (정보보호 전문인력 양성을 위한 전문대학 정보보안과의 운영방안에 관한 연구)

  • 김경호;김명숙
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.2
    • /
    • pp.13-20
    • /
    • 2004
  • The purpose of this study is to suggest an operational plan for the information security department of colleges. First, the necessity for educating information security personnel was examined. Second, the institutes for educating information security personnel were investigated and the curriculum for information security of the college in Korea were examined. Finally, the challenges were examined and the solutions were suggested.

  • PDF

Network Security Situation Assessment Method Based on Markov Game Model

  • Li, Xi;Lu, Yu;Liu, Sen;Nie, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2414-2428
    • /
    • 2018
  • In order to solve the problem that the current network security situation assessment methods just focus on the attack behaviors, this paper proposes a kind of network security situation assessment method based on Markov Decision Process and Game theory. The method takes the Markov Game model as the core, and uses the 4 levels data fusion to realize the evaluation of the network security situation. In this process, the Nash equilibrium point of the game is used to determine the impact on the network security. Experiments show that the results of this method are basically consistent with the expert evaluation data. As the method takes full account of the interaction between the attackers and defenders, it is closer to reality, and can accurately assess network security situation.

An Exhaustive Review on Security Issues in Cloud Computing

  • Fatima, Shahin;Ahmad, Shish
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3219-3237
    • /
    • 2019
  • The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. Various "Cloud Service Provider" such as Microsoft Azure, Google Web Services etc. enables the users to access the cloud in cost effective manner. However, security, privacy and integrity of data is a major concern. In this paper various security challenges have been identified and the survey briefs the comprehensive overview of various security issues in cloud computing. The classification of security issues in cloud computing have been studied. In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.