• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.024 seconds

Unification of the Korean Peninsula and Military Integration Focusing on the Military Tasks (한반도 통일과 군사통합 (군사적 과제를 중심으로))

  • Han, Kwan Soo
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.125-134
    • /
    • 2015
  • This study aims to investigate what to be prepared and implemented for the military integration when South and North Korea are making progress toward unification. Although we can not exactly predict when the unification will be completed at this time, preparations for the military integration should be ready ahead of time. Since the failure of the military integration can threat the unification, elaborated and practical solutions are required. Therefore, the study tries to answer the following questions : 1) What types of the military integration are desirable and what are the prerequisites for the unification of Korean Peninsular? ; 2) What potential military tasks could be caused by military integration? ; 3) What are the core and major tasks among them and how could they be solved in practical aspects?

A Detection Rule Exchange Mechanism for the Collaborative Intrusion Detection in Defense-ESM (국방통합보안관제체계에서의 협업 침입탐지를 위한 탐지규칙 교환 기법)

  • Lee, Yun-Hwan;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.57-69
    • /
    • 2011
  • Many heterogeneous Intrusion Detection Systems(IDSs) based in misuse detection technique including the self-developed IDS are now operating in Defense-ESM(Enterprise Security Management System). IDS based on misuse detection may have different capability in the intrusion detection process according to the frequency and quality of its signature update. This makes the integration and collaboration with other IDSs more difficult. In this paper, with the purpose of creating the proper foundation for integration and collaboration between heterogeneous IDSs being operated in Defense-ESM, we propose an effective mechanism that can enable one IDS to propagate its new detection rules to other IDSs and receive updated rules from others. We also prove the performance of rule exchange and application possibility to defense environment through the implementation and experiment.

Influence on Information Security Behavior of Members of Organizations: Based on Integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM) (조직구성원들의 정보보안행동에 미치는 영향: 보호동기이론(PMT)과 계획된 행동이론(TPB) 통합을 중심으로)

  • Jeong, hye in;Kim, seong jun
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.145-163
    • /
    • 2018
  • Recently, security behavior of members of organizations has been recognized as a critical part of information security at the corporate level. Leakage of customers' information brings more attention to information security behavior of organizations and the importance of a task force. Research on information breach and information security is actively conducted of personal behavior toward security threats or members of organizations who use security technology. This study aims to identify factors of influence on information security behavior of members of organizations and to empirically find out how these factors affect information security behavior through behavior toward attitude, subjective norm and perceived behavior control. On the basis of the research, this study will present effective and efficient ways to foster information security activities of members of organizations. To this end, the study presented a research model that applied significant variables based on integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM). To empirically verify this research model, the study conducted a survey of members of organizations who had security-related work experience at companies. So, it is critical for members of organizations to encourage positive word of mouth (WOM) about information security behavior. Results show that based on the integration of TPM and TPB, perceived vulnerability, perceived severity, perceived efficiency and perceived barriers of information security behavior of members of organizations had significant influences on mediating variables such as behavior toward attitude, subjective norm, perceived behavior control and intention. They also had significant influences on organization information security behavior which is a dependent variable. This study indicates companies should introduce various security solutions so that members of the organizations can prevent and respond to potential internal and external security risks. In addition, they will have to take actions to inspect vulnerability of information system and to meet security requirements such as security patches.

Security Evaluation Criteria of Electronic Payment System (전자 지불 시스템의 보안 평가 기준)

  • 신장균;황재준
    • Proceedings of the CALSEC Conference
    • /
    • 1999.07b
    • /
    • pp.491-500
    • /
    • 1999
  • Recent increase of commercial network Integration to World Wide Web(WWW) shifts an ordinary commerce to electronic environment. This draws more people to examine re-assurance of their secure transaction. This study investigates current status of security methodology for Electronic Payment System and extracts important axis of security level for electronic payment. Using these axis as security evaluation criteria, the research proposes a security matrix which consists of four different level of security granularity, hence allowing evaluation of a nation-wide credit card based payment system. Feasible usage of this matrix contributes to security analysis of the electronic system as whole, hence providing better secured electronic environment.

  • PDF

A Study on Confrontation a Plan of Policing Policy with the Development Globalization (세계화의 진전에 따른 치안정책의 대응방안)

  • Lee, Jin-Moon
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.251-272
    • /
    • 2000
  • Attempts have also been made to locate security in the so-called 'policingdivision of labour' In order to understand this, it is necessary to identify some of the links which exist between public police organizations and the private security sector. Such links can be divided into six types : 1) Interpersonal links, 2) Joint operations, 3) Exchange of services, 4) Granting of special powers, 5) Public bodies hiring private personnel, 6) New organizational. Van Reenen provides a useful outline of the different dimensions of future Glibalization of policing. Developments, he suggests, are likely to proceed in four directions : 1) Co-operation : at this level, the nature and powers of national police systems are not required to change, co-operation occurring between self-standing forces. 2) Horizontal integration : this arises when officers obtain authority to operate in another country, or where government officials from one country get authority over the police in another country. 3) Vertical integration : this exists when a police organization is created which can operate within the area of the EC as a whole. 4) Competition : the internationalization of policing in Europe presents itself, more and more, as a market in which different policing systems trade their products.

  • PDF

Next-Gen IoT Security: ARIA Cryptography within Hardware Secure Modules - A Comparative Analysis of MQTT and LwM2M Integration (차세대 IoT 보안: 하드웨어 보안모듈 내 ARIA 암호화 - MQTT 와 LwM2M 통합의 비교 분석)

  • Iqbal Muhammad;Laksmono Agus Mahardika Ari;Derry Pratama;Howon kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.235-238
    • /
    • 2024
  • This paper investigates the integration of ARIA cryptography within hardware secure modules to bolster IoT security. We present a comparative analysis of two prominent IoT communication protocols, MQTT and LwM2M, augmented with ARIA cryptography. The study evaluates their performance, security, and scalability in practical IoT applications. Our experimental setup comprises FPGA-enabled hardware secure modules interfaced with Raspberry Pi acting as an MQTT and LwM2M client. We utilize the Mosquitto MQTT server and an LwM2M server deployed on AWS IoT. Through rigorous experimentation, we measure various performance metrics, including latency, throughput, and resource utilization. Additionally, security aspects are scrutinized, assessing the resilience of each protocol against common IoT security threats. Our findings highlight the efficacy of ARIA cryptography in bolstering IoT security and reveal insights into the comparative strengths and weaknesses of MQTT and LwM2M protocols. These results contribute to the development of robust and secure IoT systems, paving the way for future research in this domain.

Integration of Logistics Systems of Developing Countries into International Logistics Channels

  • Hassan Ali Al-Ababneh;Ilona Yu. Dumanska;Ella M. Derkach;Anna V. Sokhetska;Liliia H. Kemarska
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.87-100
    • /
    • 2024
  • Modern logistics significantly influences the globalization and internationalization processes. Logistics systems are becoming increasingly important in today's rapidly changing environment. On the other hand, the development of global economic integration, business globalization contributes to the creation and development of international logistics systems and global supply chains towards the international market. The aim of the article was to investigate the national logistics systems of developing countries in the context of their integration capabilities. The main methods used in this study are statistical analysis, index, graphical and analytical methods, methods for estimating structural dynamic shifts, comparisons. Commonly used methods of economic research, as well as statistical analysis and interstate comparisons, economic modelling (trend analysis to determine the forecast level of LPI for Ukraine), etc. were also involved. It is noted that the problem of development of logistics systems in developing countries was insufficiently covered in scientific research. The study suggests that the integration capabilities of national logistics systems are determined by the logistics performance of each country and the favourable logistics environment for integration transformations. This allowed analysing the state of the logistics systems of Poland, Bulgaria, India and Ukraine, and identifying the factors that determine it. The logistics environment of Poland, Bulgaria, India and Ukraine, as well as the factors of its formation are evaluated. The components of the logistic portrait of the country in the context of integration capabilities of the logistic system are offered. Trend analysis of LPI was carried out on the example of Ukraine, which showed positive trends in the logistics system and allowed drawing conclusions about increasing integration into international logistics channels based on its geopolitical location, improving the characteristics of the logistics environment, including customs regulation, and improving the efficiency of the national logistics system. Prospects for further research involve studies of the impact of pandemics, globalization, digitalization on logistics systems, including that of developing countries.

Extenuating Food Integrity Risk through Supply Chain Integration: The Case of Halal Food

  • Ali, Mohd Helmi;Tan, Kim Hua;Pawar, Kulwant;Makhbul, Zafir Mohd
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.2
    • /
    • pp.154-162
    • /
    • 2014
  • Effects of food scandals on religious belief, human health and even on causes of death indicate that firms and consumers are vulnerable to integrity risks in the global supply chain. Mitigating the integrity risk and maintaining the credence quality products like halal food is very challenging, if not impossible. Our aim in this research is to show that supply chain integration can mitigate the halal food integrity risk. To illustrate this idea, we have conducted case studies and interviews in seven Malaysian chicken supply chain focal firms. We unpack the halal integrity risks along the supply chain, such as production risk, raw material risk, food security risk, outsourcing practices risk, service risk, and logistics risk. The research argues that supply chain integration, such as internal integration and external integration practices, could minimize the halal integrity risk. The advantages of supply chain integration in mitigating the halal integrity risk are also highlighted in this paper.

A Study on Integration Security Management Model in Cloud Environment (클라우드 환경에서의 통합 보안관제 모델 연구)

  • Byun, Yun Sang;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.407-415
    • /
    • 2013
  • Recently, Interest variety of IT services and computing resources are increasing. As a result, the interest in the security of cloud environments is also increasing. Cloud environment is stored that to provide services to a large amount of IT resources on the Cloud. Therefore, Cloud is integrity of the stored data and resources that such as data leakage, forgery, etc. security incidents that the ability to quickly process is required. However, the existing developed various solutions or studies without considering their cloud environment for development and research to graft in a cloud environment because it has been difficult. Therefore, we proposed wire-wireless integrated Security management Model in cloud environment.

European Integration Processes for the Development of Future Foreign Language Specialists in the Information Society

  • Lazarenko, Natalia;Zadorozhna, Olga;Prybora, Tetiana;Shevchuk, Аndrii;Sulym, Volodymyr;Rudnytska, Nataliya
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.427-436
    • /
    • 2021
  • The article reveals and theoretically substantiates the trends of foreign language teachers' professional training in universities of Ukraine in terms of European integration, which are systematized in three areas: macro-level (system of education), meso-level (universities) and micro-level (subjects of educational process). The article aims to substantiate the trends of foreign language teacher training in the context of European integration and the main directions of creative use of constructive ideas of European experience in the innovative development of education. The article lights up the system for improving foreign language teacher training in universities, which is based on updated goals, content and approaches to the implementation of basic concepts, principles and features of teacher training in European experience, enable us to improve the quality of teacher training, its competitiveness in the European labor market. In the article developed the conceptual model of strategic development of the university in the conditions of European integration. It is emphasized that information technologies provide great opportunities for the development of professional skills and intellectual potential of future professionals. At present, the computerization of the educational process in higher education institutions is considered as one of the first and most promising areas for improving the quality of education. The article offered directions of internationalization of educational activity of university in the conditions of European integration. Diagnostic tools for the development of the university in terms of integration into the European educational space, individual rating and ranking of structural units of the university have been developed; main directions of activity of the laboratory of the skill of the teacher of higher school and methodical recommendations on the creation and the organization of work of scientific laboratories.