• Title/Summary/Keyword: Security Environment Contents

Search Result 209, Processing Time 0.023 seconds

A Study for Key Generation and Access Control Protocol in BYOD Environments (BYOD환경에서 키 생성 및 접근 제어 프로토콜에 관한 연구)

  • Min, So-Yeon;Jin, Byung-Wook;Lee, Kwang-Hyoung;Lee, Keun-Wang
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.27-35
    • /
    • 2015
  • Depending on the smart device user growth and development of communication technology, the area about working environment was extended without constraints of time and places. It is introducing to work using user's devices and this environment is called 'BYOD(Bring Your On Device)'. But it is vulnerable to security threat that happened in existing wireless environment and its security threat issue which is caused by inside information leak by an inside job and lost or stolen terminal which is caused by careless user is getting heated. So we studied about access control protocol by user rights under the BYOD situation make a session key based on the user information. We make a session key based on the user information and user device information, after that we design an access control protocol. The protocol we suggest can protect from attack under the BYOD situation and wireless communication situation and also safety and security requirement from inside information leak because it controls user rights.

Comparison & Analysis of Intrusion Detection System System Protection Profile of NSA and MIC (NSA IDS System PP와 국가기관용 IDS PP 가정사항 비교분석)

  • 김남기;박종오;김지영
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.57-65
    • /
    • 2003
  • A protection profile is the required specification document by consumer groups to specify what security purpose they would like to have in their specialized products. A protection profile assumption is the document that specifies consumer environment in the physical, artificial, network perspective and the contents of intended usage which include usage limitation, the value of latent asset, and additional applications for a TOE (Target of Evaluation). In this paper, we compare the assumptions of the NSA IDS PP and the IDS PP for government.

  • PDF

Measuring Inventory of Korean Housing Quality Related to Mental Health through Foreign Literature Reviews (국외 문헌고찰을 기초로 정신건강의 측면에서 본 한국주거의 질 측정요소에 관한 연구)

  • Park, Jung-A;Choi, Byungsook
    • Journal of the Korean housing association
    • /
    • v.23 no.6
    • /
    • pp.1-9
    • /
    • 2012
  • This study is to organize the frame of measuring inventory for housing quality related to mental health in foreign literature reviews. In the first step, many housing quality contents or items are extracted from empirical studies, including housing environment quality and mental health. In the next step, extracted contents and items are classified by space scope (house and neighborhood unit) and WHO housing properties (safety & security, health & sanitation, efficiency/convenience, comfort/amenity). Almost all housing properties follow the WHO standard, but some properties, sustainability and economic characteristics, do not follow the standard. These reflect on current Korean housing environment. They are energy saving and environment friendly effort, property value and economic burden, identity expression, and school district. So they need to be added to the Korean housing quality measurement related to mental health.

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control (데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Kim, Mi-Kyoung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.

Analyses of Total Information Security Infrastructure of School Affairs Information System for Secure Ubiquitous-Campus (안전한 Ubiquitous-Campus를 위한 학사정보시스템의 종합정보보안 체계 구축에 관한 분석)

  • Kim, Jung-Tae;Lee, Jun-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.287-291
    • /
    • 2006
  • E-learning has increased on importance as people realize that the use of technology can improve the teaming process. Consequently, new learning environments have been developed. However, in general they are oriented to address a specific e-learning functionality. Therefore, in most of the cases, they are not developed to interoperate with other e-learning tools, which makes the creation of a fully functional e-learning environment more difficult. We analyses of total information security infrastructure of school affairs information system for secure ubiquitous campus.

  • PDF

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF

The Effect of Education Program for Security Personnel on Job Satisfaction (일반경비원 교육이 직무만족에 미치는 영향 - 시설경비원 신임 교육을 중심으로 -)

  • Lee, Young-Seok
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.277-300
    • /
    • 2008
  • The effect of satisfaction through job performance competency on management performance is enormous, for private security industry depends upon human resources generally till quite recently and often makes contact with clients. Although high-quality personnel who were taught professional education are held in high repute in private security industry, the studies of job satisfaction and recruit education for private security guards are insufficient. Consequently, this investigation analyzes the effect of recruit education program on job satisfaction searchingly for incumbent facility guards. The effect of recruit education program for facility personnel on job satisfaction is as follows. First of all, the differences of personal characteristics, training characteristics, work environment, job satisfaction are inspected in accordance with sociodemographic characteristics. After then, there is a remarkable contrast. Secondly, the former from among of learning expectation and self efficacy as personal characteristics has a positive effect on job satisfaction statistically. Thirdly, educational facility and contents as training characteristics have a positive effect on job satisfaction statistically. Finally, work environment including supervisor's support and maintenance has a positive effect on job satisfaction statistically.

  • PDF

A Study on Licence Management Model for Contents Circulation which Ubiquitous Environment is Safe (유비쿼터스 환경의 안전한 콘텐츠 유통을 위한 라이센스 관리 모델 연구)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05a
    • /
    • pp.366-370
    • /
    • 2011
  • This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

Multimedia Data Security of Video Conferencing System (영상회의 시스템에서의 멀티미디어 데이터 보안)

  • 이원호;한군희
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.231-236
    • /
    • 2003
  • Video conferencing system it is various at internet and uses the reading is become accomplished. Research of like this portion synchronization of audio, the video compression technique and multimedia data, supports the video conference the research of the Mbone of the If multicast for being active, being become accomplished the multimedia service which is various an video from internet, the line speed of communication becomes high-speed anger and to follow leads is become accomplished. The video conference from opening elder brother dispersion internet network environment the problem against the image which is an image conference data and a voice security is serious and it raises its head. To sleep it presents the security method which from the video conference it follows in quality of multimedia data from the dissertation which it sees and it does.

  • PDF

Intrusion Detection System based on Cluster (클러스터를 기반으로 한 침입탐지시스템)

  • Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.10 no.3
    • /
    • pp.479-484
    • /
    • 2009
  • Security system of wireless network take on importance as use of wireless network increases. Detection and opposition about that is difficult even if attack happens because MANET is composed of only moving node. And it is difficult that existing security system is applied as it is because of migratory nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system using cluster head in order to detect malicious attack and use resources efficiently. we used method that gathering of rules is defined and it judges whether it corresponds or not to detect intrusion more exactly. In order to evaluate performance of proposed method, we used blackhole, message negligence, jamming attack.

  • PDF