• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.026 seconds

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

Comparative Study on Social Integration of Immigrants: Based on Immigration Regime (이민자의 사회통합에 대한 국가간 비교: 이민국가 레짐을 기초로)

  • Choi, Hyeji
    • 한국사회정책
    • /
    • v.24 no.2
    • /
    • pp.217-244
    • /
    • 2017
  • This study was initiated based on the notion that the logic regarding case selection and a perspective for case analysis has never been discussed in previous studies on immigration policy despite its significance. Given the idea, this study investigated levels of integration of immigrants which were operationalized as 1) differences in general conditions of economic, labor, social, and political life between native born and foreign born and 2) level of quality of economic, labor, social life for immigrants. For that purpose, this study analyzed the secondary data set which was a combination of several secondary data sets. Results showed that the countries that belong to traditional immigration regime including Australia, Canada, and US showed higher levels of immigrant integration at various sub categories of integration. Countries that belong to new immigration regime such as Ireland revealed relatively high levels of immigrant integration. The findings from this study implied that integration of immigrants needs to be analyzed with consideration on characteristics of social security policy of each country along with immigration policy and cultural diversity of each country.

Role based XML Encryption for Enforcing Access Control Policy (접근제어 정책구현을 위한 역할기반 XML 암호화)

  • Choi Dong-Hee;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.3-15
    • /
    • 2005
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Research area or n security is about Encryption Digital signature, Key management and Access control. until now research on U security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex XML security comes to involve not only network security but also managerial security. Managerial security is guaranteed through access control. But XML Encryption supports simple network security. So it can't support multiple users and multiple access control policies. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can supper multiple authorizations of multiple users with integrating access control. And this can reduce the cost of evaluation process of the existing complicated access authorization with pre-processing.

The Observational Study on Researcher Security Design Direction by R&D Security Accident Case (연구보안 사고사례분석을 통한 연구자 보안대책 설계방향 관찰연구 )

  • Youngkwon Kim;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.91-96
    • /
    • 2022
  • Recently, the importance of Research and Development(R&D) security as well as R&D investment is emphasized in the flow of technology hegemony competition, where technology is directly related to national competitiveness.However, despite the enormous impact of the R&D security failure results, research output leakage accidents continue to occur.To solve this problem, this study analyzed leakage accidents and cases of R&D output and concluded that it is priory to develop regulations to raise security awareness at the field researcher level rather than the macroscopic security management system. In addition, in order to design the direction of the researcher security measures, observational study was conducted at the university research site, and four directions were presented, including case analysis and integration. The direction for designing researcher security measures will be used as a basis for developing security regulations specialized in future research sites and security management systems for research institutes.

Assessment of Perspective Development of Transport and Logistics Systems at Macro and Micro Level under the Conditions of Industry 4.0 Integration

  • Maiboroda, Olha;Bezuhla, Liudmyla S.;Gukaliuk, Andrii F.;Shymanska, Viktoriia;Momont, Tetiana;Ilchenko, Tetiana V.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.235-244
    • /
    • 2021
  • The change of the development of transport and logistics systems occurs with the active change of technology and the advent of the era of Industry 4.0. It requires modernization of approaches to the development of transport and logistics systems at the macro and micro levels. The present study aims to identify perspective directions of development and evolution, find out the existing obstacles in the integration of technological solutions of transport and logistics systems at the macro and micro levels. This study is based on a quantitative and qualitative methodology for assessing the level of integration of technologies into transport and logistics systems to study the prospects for their development at the micro level. Macroeconomic indicators of transport and logistics in the context of different regions of the world were used to quantify the development prospects. For a qualitative assessment of the development of the transport and logistics system, the case study method was used. The object of the study was selected logistics company Sensco Logistics Inc., Austin TX. At the macro level, countries with more innovative logistics sectors have stronger mechanisms for coordinating private sector activities. Simplification of administrative procedures of control and regulation by the public sector in order to facilitate trade between countries is a promising direction for the development of transport and logistics systems. Such reforms are more effective in developing a "rigid" transport infrastructure. The integration of Industry 4.0 technology solutions into the international logistics sector is defined by political and legal barriers, especially in developing countries. In low-income countries, hard and soft infrastructure reforms are hindering the development of logistics companies that provide transport services. This determines the national level of development of transport and logistics systems, and in general the global level of development of transport and logistics. In developed countries, the legal barriers to the development of new technological logistics are environmental requirements for the integration of technologies into the transport system. These trends are slowing down the development of International Logistics, which, compared to other industries, is slower to integrate Industry 4.0 technologies. This study combines macroeconomic factors that determine the prospects for the development of transport and logistics systems at the micro level.

Understanding the Trilemma in Inter-Korea Economic Cooperation (남북한 경제협력의 불가능 삼각정리와 실천적 협력방안)

  • Han, Hongyul
    • Analyses & Alternatives
    • /
    • v.2 no.1
    • /
    • pp.5-29
    • /
    • 2018
  • Models of South-North Korean economic integration have the problem of circular reasoning. While many studies argue that South-North Korean economic integration would contribute to alleviate security risks in the Korean peninsular, they emphasize the success of any economic model of inter-Korean economic integration is subject to favorable geo-political and security environment. It is a failure in distinguishing between goals and constraints. After identifying three major goals of South-North Korean economic cooperation, this study shows the trilemma among the goals; they are 1) formation of a complete economic community, 2) maintaining independent sovereignty of the two Koreas, 3) promotion of mutual economic interests. The trilemma suggests that it is theoretically impossible to achieve the above three goals at the same time. Only two goals are achievable simultaneously. This study argues that the most practical option is to pursue the combination of goals 2) and 3) considering the complex political and security environment around the Korean peninsular. Recognizing that North Korea is the least developed country in the Northeast Asia region, South Korea's initiatives for inter-Korean economic cooperation should focus on assisting industrialization and integration of the North Korea economy into the Northeast Asian regional production sharing structure. In view of the 'flying geese model' of the sequential industrialization in the region, the least developed economic status of North Korea can partially be explained by its failure to participate in the production network in the region as well as lack of effective implementation of appropriate industrial policy. Therefore, promotion of industrialization of North Korea should be the immediate goal of economic cooperation between North and South Korea. It is an interesting fact that North Korea has rapidly expanded its apparel exports in recent years. It could mean that the North Korean economy is actively responding to the dynamics of international comparative advantage structure, although the production activities are limited to exports to China since the closure of the Gaesung Industrial Complex. The recent increase in apparel export is a starting point for incorporating the Easy Import Substitution fulfilling both domestic and neighboring regional demand of North Korea. It could help integrate North Korea's industry into the production network of Northeast Asia. An immediate policy implication is that the economic cooperation between the two Koreas should focus on facilitating this process and supporting North Korea's industrial policy through South Korea's contribution of capital, technology, and service intermediary inputs.

  • PDF

A Research and development of integrated Platform for data security between different smart home devices (안드로이드 기반 스마트 홈 디바이스의 통신 데이터 보안 및 통합 관리 플랫폼 연구개발)

  • Lee, Jeong-Gi;Yang, Chul-Seung;Kim, Jun-Ha;Kim, Kang-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1173-1179
    • /
    • 2015
  • In this paper is given to implements the Android-based integration platform to provide convenience for gender development and scalability , easy access for the user. Sensor-based smart home-related products have a different way of the data exchange so platform can be integrated easily and connect heterogeneous network products and external data transmission security processing for data communication and supported to enable the integration

A Study on Relationships between Perceived Services and Satisfaction of SaaS(Software as a Service) (SaaS(Software as a Service)의 서비스 인지 및 만족도간의 상호관계성에 관한 연구)

  • Kim, Yong-Gu;Kim, Jun-Woo
    • Journal of Digital Convergence
    • /
    • v.7 no.4
    • /
    • pp.81-90
    • /
    • 2009
  • SaaS (Software as a Service) provides software in the form of service via internet rather than software package. Thus a large number of users could use the service of new type of software service as long as they connect to internet. SaaS, as a delivery model attracted in the software industry, grows with impelling force. SaaS has been adopted as an information spreading strategy of small and medium corporate so that its effect has been recognized in both academic and practical areas. However, there are not much researches about it because SaaS is still in the introductory stage. This study focused on the success model of SaaS to find out the factors that affect usability and the satisfaction of users. The sample is based on the on-line survey for the 549 government officials who are using SaaS. At last, the number of the employed answers are 157 after unqualified ones are removed. The result shows that Security, Service quality, Price and System Integration significantly affect the usefulness and the satisfactions of users.

  • PDF

Principles of War under the NCW environment (네트워크 중심전(NCW)하에서의 군사작전 원칙)

  • Choi, Seong-Su
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.311-350
    • /
    • 2010
  • War has been existing with human history. There seems to be two approaches of war study. One is to deter war among politicians, the other is to get victory in a war among soldiers. Many scholars and soldiers tried to find out the way of victory at war, that is, the major factors of victory at war. They found out some factors that dominate the victory of war through numerous experiences of war, and we call it 'principles of war'. The principles of war which we are using has been shaped during past three centuries. But, nowadays rapid change in the environment of war has brought the change of features of warfare and method of waging war. NCW may be the most typical example of new environment of war. The Iraque War may be the most recent modem war performed under the NCW environment. And the Iraque War brought up the need of new principles of war adaptable to the NCW environment. This article is focusing on new principles of war that comprehends future wars. I suggest that some principles of war which we are using should be supplemented to be understood its own conception, and new principles are needed such as principle of paralysis, principle of synchronization & Integration.

  • PDF

A Study on the model of CCTV Image Information Integration portal (CCTV 영상자료 통합포털 구축 모델에 관한 연구)

  • Kang, Poo-Reum;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.43-51
    • /
    • 2012
  • CCTV would be the effective way in the prevention of abuse, as well as recorded image information evidence of the crime as a significant legal effect. But recorded image information As evidence by utilizing the Complaint/complaint handling, and administrative business processes that are currently operating offline procedural complexity and unnecessary time appear costly, privacy remains an issue to be solved, etc. Runoff. In this paper, incidence rate of offline business processing phase to solve the problems proposed to build unified portal for CCTV image information and the existing studies on the effectiveness of electronic civil service system, previous studies by analyzing e-government in accordance with laws and privacy laws, CCTV image information portal deployment model is applied to data integration occurs are trying to solve the problem effectively.