• Title/Summary/Keyword: Security Evaluation Standards

Search Result 90, Processing Time 0.022 seconds

Study on the Methods of Security and Quality Evaluation of smart Healthcare System (스마트 헬스케어 시스템의 보안성 품질평가 방법에 대한 연구)

  • Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.11
    • /
    • pp.251-259
    • /
    • 2017
  • Recently, the smart healthcare industry that grafted the Internet of Things (IoT) onto the healthcare and medical services is being highlighted. Smart healthcare refers to the healthcare and medical services offered on the basis of information communication technologies including application, wearable devices and platforms, etc. The number of next generation smart healthcare devices are increasing in the smart healthcare industry through the combination of information technology (IT) and Bio Technology (BT), which are the most active areas among the 6T, which are the areas of the next generation industry. With the emergence of a diverse range of smart healthcare systems or devices, whether the smart healthcare system can be linked with other systems organically and the security and quality of the system have become important elements of evaluation. In this Study, the characteristics and service types of smart healthcare systems were examined, and the trends in the technology and industry of the smart healthcare system were analyzed. Moreover, this Study aims to develop the evaluation method for security and standards for quality evaluation by deducing the factors for the evaluation of smart healthcare system on the basis of the results of aforementioned examination. It is anticipated that this can induce improvement of quality and development of highly reliable products of a smart healthcare system, and will become the core technology to substitute the technology protection barrier.

A Study on Activating Disaster Management Standard Implementation (재난관리기준 이행 활성화 연구)

  • Lee, Young Jai;Jo, In Sung
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.21-26
    • /
    • 2012
  • Disaster management standard has not been invigorated because it usually has documented qualities. Since its enactment and notification, there has been a lack of continual education and publicity that lead to poor awareness on disaster management. The purpose of this study investigates on activating the use of disaster management standards by disaster related agencies and organization during their work. It proposes details on how to distribute and promote disaster management standards, develop textbook, evaluation and feedback. Furthermore, it also developed an organizational structure and legal framework as measure for disaster management.

A strategic Approach for Establishing Korea's Cyber Terrorism Policy : Focusing on the UK's cyber terrorism policy (국내 사이버테러 정책수립을 위한 전략적 접근방안 : 영국의 사이버테러 정책을 중심으로)

  • Kim, Byung-Hwa
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.173-195
    • /
    • 2017
  • Recently, in South Korea, security management has been strengthened, but there have been an increasing number of cases where the main infrastructure of the country is hacked in the cyber space. South Korea is equipped with sophisticated information and communication technologies, such as Internet, but is threatened by cyber terrorism of North Korea and terrorist organizations. Nevertheless, there is a limit to how to develop a policy and strategic plan for the country, which is related to domestic terrorism and lacks legal and regulatory facilities, and therefore, in this study, proposed suggestions for building adaptive and efficient policy formulation. Based on the theoretical analysis framework of the Strategic Plan for achieving the objectives of the research, we compared the UK 's security strategy with the national security policy of the domestic government. As a result, several problems were derived: First, the domestic security strategy did not take into account the external environment. Secondly, lack of coordination with domestic cyber security goals setting and strategy is causing ambiguity and confusion. Third, the detailed plan of implementation of national security in each province is designed to ensure that there is a possibility that a mixed side effect between ministries and agencies will arise. Fourth, it was found that there was a limit to prepare the evaluation standards for the evaluation and return of domestic security policies in the country. Therefore, in order to establish a policy for the response of domestic cyber terrorism, we set up a vision from long-term perspectives and concrete targets based on the strategic approach of the security policy, It is necessary to present an assignment and formulate an efficient execution plan. It is necessary to maintain and improve the domestic safeguards in order to be able to complement the problems through evaluation and feedback.

  • PDF

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF

A Study on the Improvement Plan for the Establishing an Advanced Aviation Security System in Korea (첨단 항공보안체계 국내 도입을 위한 개선방안 연구)

  • Yosik Kim;Donghwan Yoon;YongHun Choi;Insu Jung;Keumjin Lee
    • Journal of Aerospace System Engineering
    • /
    • v.18 no.2
    • /
    • pp.87-94
    • /
    • 2024
  • The International Civil Aviation Organization (ICAO) has set up the Global Aviation Security Plan (GASeP), which urges member states to transition to more advanced security systems. This paper examines advanced aviation security policies and technologies at both domestic and international levels, and also investigates the underlying reasons for the challenges faced in establishing an advanced security system in the Republic of Korea. Based on this analysis, we propose effective strategies for deploying advanced security equipment at domestic airports, taking into consideration their respective classifications. Additionally, we identify the need for establishing new technological standards to introduce an advanced aviation security system, and provide evaluation criteria for the maintenance and management of technology to ensure the smooth operation of advanced security equipment.

A Block Cipher Algorithm based on Cellular Automata (셀룰라 오토마타를 이용한 블록 암호 알고리즘)

  • 이준석;장화식;이경현
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.665-673
    • /
    • 2002
  • In this paper, we introduce cellular automata and propose a new block cipher algorithm based on cellular automata. For the evaluation of performance and security, we compare the results of the proposed algorithm with them of the standard block ciphers such as DES, Rijndael regarding on avalanche effects and processing time, and analyze the differential cryptanalysis for a reduction version of the proposed algorithm. In addition, we perform the statistical tests in FIPS PUB 140-2(Federal Information Processing Standards Publication 140-2) for the output bit sequences of proposed algorithm to guarantee the randomness property.

  • PDF

A Study on the Inner Window & Floor Materials of Educational Facilities According to the Environmental Variation of Future Education (미래교육 환경변화에 따른 학교시설의 실내 바닥재 및 창호재에 관한 연구)

  • Yoo, Tack-Dong;Cho, Jin-Il;Lee, Ho-Chin
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.3 no.1
    • /
    • pp.46-59
    • /
    • 2003
  • In this study, analyzing class method, curriculum and demand performance of materials and user according to the 7th educational curriculum which, it is surveyed that materials design performance standards of floor and window suitable to future educational environment. Based on this study, It is needed for development of special materials suitable educational facilities, making standards fitting demand, study of variable and special field for educational facilities, study for security of objective data of materials, study of performance evaluation method subdivided, and desirable positive use of intimate environmental materials.

  • PDF

A Measure for Improving the Systematic Evaluation of the Life Cycle Cost in Technical Proposal Tendering (기술제안입찰에서의 계적인 생애주기비용 평가를 위한 개선방안)

  • Son, Myung-Jin;Hyun, Chang-Taek
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.6
    • /
    • pp.71-83
    • /
    • 2012
  • The use of technical proposal tendering has been expanding recently with the aim of effecting cost reduction, quality enhancement, technological development and value realization centered on multifunctional administrative cities, innovation cities, and the Yongsan relocation project. In line with the increasing interest towards life cycle cost improvement measures as an important evaluation category concerning technical proposal tendering, efforts in preparing measures that can execute the security of credibility and objective evaluation concerning architectural life cycle cost are being made. However, problems such as lack of applicable cases of design development and detail design, distortion of initial construction costs concerning the original plan, combination of constant price and current price, the ambiguity of the calculation standards between tendering corporations, inaccuracy of terms, and insufficient compositional formats concerning life cycle improvement measures are being cited. Accordingly, this study sought to propose a measure to improve the compositional guidelines, format, and standards so that a systematic life cycle cost evaluation can be executed for the reliable distinction of each participating corporation, enhanced credibility and objective evaluation of the life cycle cost improvement measure for technical proposals.

Evaluation of Aggregates Properties Depending on Producing Sectors and Regions in Korea (전국 골재산지 권역별 콘크리트용 골재의 물성 평가)

  • Han, Min-Cheol;Lee, Jun-Seok
    • Journal of the Korea Institute of Building Construction
    • /
    • v.17 no.6
    • /
    • pp.499-506
    • /
    • 2017
  • This study is to present empirical data about the needs for quality security of aggregate by randomly selecting aggregate from 4 major locations including A, B, C, D province in Korea, by investigating its quality status in terms of physical properties and particle distribution based on Korean industrial standards(KS). The test results indicated that wide variance in quality, and some of aggregate samples were far below the standard, still many of them are not satisfying KS standards. In addition, the current aggregate manufacturing process that does not include inspection of particle size distribution by sieving and fineness modulus, can induce a possibility of non-KS aggregate's distribution; this provide that the current status of aggregate quality security of Korea is seriously threatened. Thus, it is important to secure each aggregate's quality level under KS standards.

A Study on Protection Profile for Multi-function Devices (다기능 주변기기에 대한 보호프로파일에 관한 연구)

  • Lee, Dongubm
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1257-1268
    • /
    • 2015
  • Multi-functional devices was originally an equipment performing image processing, but function transmitting image data digitized by combining fax function and function of network are added and it was rapidly developed. Also, functions of internet application, application expansion, remote sharing and image treatment were added to multi-functional devices. But, multi-functional devices can cause security vulnerability such as data exposure, eavesdropping, etc. because of the threatening by network connection. Therefore, common criteria of multi-functional devices are necessary, but there is no protection profile for multi-functional devices now. Therefore, concrete standards of evaluation are not applied to evaluate secure for products, so it was difficult to maintain uniformity of evaluation quality. Therefore, this paper developed protection profile for multi-functional devices based on common criteria of evaluation so as to analyze threats of multi-functional devices and use secure multi-functional devices.