• 제목/요약/키워드: Security Manager

검색결과 243건 처리시간 0.022초

An Automatic Network Vulnerability Analysis System using Multiple Vulnerability Scanners (다양한 취약점 점검 도구를 이용한 자동화된 네트워크 취약점 통합 분석 시스템 설계)

  • Yoon, Jun;Sim, Won-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제14권2호
    • /
    • pp.246-250
    • /
    • 2008
  • This paper presents the design of network vulnerability analysis system which can integrate various vulnerability assessment tools to improve the preciseness of the vulnerability scan result. Manual checking method performed by a security expert is the most precise and safe way. But this is not appropriate for the large-scale network which has a lot of systems and network devices. Therefore automatic scanning tool is recommended for fast and convenient use. The scanning targets may be different according to the kind of vulnerability scanners, or otherwise even for the same scanning target, the scanning items and the scanning results may be different by each vulnerability scanner, Accordingly, there are the cases in which various scanners, instead of a single scanner, are simultaneously utilized with the purpose of complementing each other. However, in the case of simultaneously utilizing various scanners on the large-scale network, the integrative analysis and relevance analysis on vulnerability information by a security manager becomes time-consumable or impossible. The network vulnerability analysis system suggested in this paper provides interface which allows various vulnerability assessment tools to easily be integrated, common policy which can be applied for various tools at the same time, and automated integrative process.

2-Layered Group Key Management Structure and Protocols using Multi-Core Based Tree (다중 코어 기반 트리를 이용한 2계층 그룹키 관리 구조 및 프로토콜)

  • Cho, Tac-Nam;Kim, Sang-Hee;Eun, Sang-A;Lee, Sang-Ho;Chae, Ki-Joon;Park, Won-Joo;Nah, Jae-Hoon
    • Journal of KIISE:Information Networking
    • /
    • 제29권5호
    • /
    • pp.583-594
    • /
    • 2002
  • Assuring the security of group communications such as tole-conference and software distribution requires a common group key be shared among the legal members in a secure manner. Especially for large groups with frequent membership change, efficient rekey mechanism is essential for scalability. One of the most popular ways to provide sealable rekey is to partition the group into several subgroups. In this paper, we propose a two-layered key management scheme which combines DEP and CBT, a protocol in which subgroup manager cannot access the multicast data and another that has a multi-core, respectively. We also select sub-group key management protocols suitable for our structure and design new rekey protocols to exclude the subgroup managers from the multicast data. Compared to previous protocols based on CBT, our scheme provides forward secrecy, backward secrecy and scalability. This would reduce the number of encryption and decryption for a rekey message and would improve the efficiency number of rekey messages and the amount of information related to group members that group managers must maintain compared to DEP.

A Study on the Importance of the Assessment of Records Management Metadata Elements Related to the Electronic Medical Records Management System for Medical Records Managers (전자의무기록 관리시스템 관련 기록관리 메타데이터 요소들에 대한 의무기록 관리자의 중요도 평가 연구)

  • Lee, Eun-Mi;Kim, Myeong;Yim, Jin Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • 제13권3호
    • /
    • pp.151-171
    • /
    • 2013
  • To comprehend the importance and necessity of record management metadata standard implemented in an electronic medical records system, a survey was undertaken to 50 medical records managers in charge of 5 major hospitals in Seoul. Analysis of the survey results was performed by averaging the responses given by those who answered the survey. SPSS was utilized for statistical analysis. Managers of medical records placed importance on metadata that are related to security of records, such as "levels of security", "types of access to medical records", "levels of authorization granted to personnel", and "users accessing medical records". It shows that these managers need the functions of privacy protection in ERMS. Metadata on "external disclosure" had the lowest level but those surveyed with more than 7 years of experience placed greater importance in this area more those surveyed with less than 7 years of experience in a hospital. This shows that managers need the functions of external disclosure to meet the needs of third partiesfor medical research and medical education.

A Study on the improvement for response manual of chemical terror incident using the service design analysis (서비스디자인 접근법을 활용한 화학테러현장 대응매뉴얼의 개선방안 연구)

  • Ham, Seung Hee;Park, Namkwun;Lee, Jun
    • Journal of the Society of Disaster Information
    • /
    • 제14권3호
    • /
    • pp.325-333
    • /
    • 2018
  • Purpose: There have been terrorist attacks all over the world, causing massive damage. In Korea, there are few cases of terrorist damage, but the lack of the on-site response experience lead to constraints on the opportunity to verify capabilities against terrorism. Therefore, in this study, the chemical terrorism on-site countermeasures is considered as a concept of service, it was possible to draw up improvement alternatives for each element by reviewing at once the interactions between the concerned organizations and citizens in the field and the utilization of the equipment and facilities in the invisible area. Results: It had been evaluated the service process of the counterpart manager from the viewpoint of the victim citizen, who is the beneficiary of the final security service. It has found out the waiting point(W.P) between the victim's civilian incident management, and the element of failure(F.P). Conclusion: In this way, comparing chemical terror incident response manuals belonged to each related organization by fusion of service design approach and scenario technique, It is expected that it will be able to find out more specific problems and to find improvement alternatives.

Abnormal Crowd Behavior Detection via H.264 Compression and SVDD in Video Surveillance System (H.264 압축과 SVDD를 이용한 영상 감시 시스템에서의 비정상 집단행동 탐지)

  • Oh, Seung-Geun;Lee, Jong-Uk;Chung, Yongw-Ha;Park, Dai-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제21권6호
    • /
    • pp.183-190
    • /
    • 2011
  • In this paper, we propose a prototype system for abnormal sound detection and identification which detects and recognizes the abnormal situations by means of analyzing audio information coming in real time from CCTV cameras under surveillance environment. The proposed system is composed of two layers: The first layer is an one-class support vector machine, i.e., support vector data description (SVDD) that performs rapid detection of abnormal situations and alerts to the manager. The second layer classifies the detected abnormal sound into predefined class such as 'gun', 'scream', 'siren', 'crash', 'bomb' via a sparse representation classifier (SRC) to cope with emergency situations. The proposed system is designed in a hierarchical manner via a mixture of SVDD and SRC, which has desired characteristics as follows: 1) By fast detecting abnormal sound using SVDD trained with only normal sound, it does not perform the unnecessary classification for normal sound. 2) It ensures a reliable system performance via a SRC that has been successfully applied in the field of face recognition. 3) With the intrinsic incremental learning capability of SRC, it can actively adapt itself to the change of a sound database. The experimental results with the qualitative analysis illustrate the efficiency of the proposed method.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • 제21호
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Development Plan of Guard Service According to the LBS Introduction (경호경비 발전전략에 따른 위치기반서비스(LBS) 도입)

  • Kim, Chang-Ho;Chang, Ye-Chin
    • Korean Security Journal
    • /
    • 제13호
    • /
    • pp.145-168
    • /
    • 2007
  • Like to change to the information-oriented society, the guard service needs to be changed. The communication and hardware technology develop rapidly and according to the internet environment change from cable to wireless, modern person can approach every kinds of information service using wireless communication machinery which can be moved such as laptop, computer, PDA, mobile phone and so on, LBS field which presents the needing information and service at anytime, anywhere, and which kinds of device expands it's territory all the more together with the appearance of ubiquitous concept. LBS use the chip in the mobile phone and make to confirm the position of the joining member anytime within several tens centimeters to hundreds meters. LBS can be divided by the service method which use mobile communication base station and apply satellite. Also each service type can be divided by location chase service, public safe service, location based information service and so on, and it is the part which will plan with guard service development. It will be prospected 8.460 hundred million in 2005 years and 16.561 hundred million in 2007 years scale of market. Like this situation, it can be guessed that the guard service has to change rapidly according to the LBS application. Study method chooses documentary review basically, and at first theory method mainly uses the second documentary examination which depends on learned journal and independent volume which published in the inside and the outside of the country, internet searching, other kinds of all study report, statute book, thesis which published at public order research institute of the Regional Police Headquarter, police operation data, data which related with statute, documents and statistical data which depend on private guard company and so on. So the purpose of the study gropes in accordance with the LBS application, and present the problems and improvement method to analyze indirect of manager side of operate guard adaptation service of LBS, government side which has to activate LBS, systematical, operation management, manpower management and education training which related with guard course side which has to study and educate in accordance with application of the new guard service, as well as intents to excellent quality service of guard.

  • PDF

The Level of Job Satisfaction and Organizational Commitment of Medical Record Technicians (의무기록사의 직무만족도 및 조직몰입도)

  • Choei, Eun-Mi;Kim, Young-Hoon
    • Korea Journal of Hospital Management
    • /
    • 제8권3호
    • /
    • pp.72-91
    • /
    • 2003
  • The purpose of this study is to investigate the recognition of health information managers, and to analyze the level of job satisfaction and organizational commitment of medical record technicians. The data for this study were collected through a self-administered survey with a structured questionnaire to 172 subjects from medical record technicians working in hospitals in Seoul and Gyeonggi Province as well as the faculty of medical schools across South Korea. In this analysis frequency, t-test, ANOVA, factor analysis and structural equation model were used. The main findings of this study are as follows: 1. As for recognition of the seven dimensions in the role of health information managers, the role as clinical data specialist received the most positive feedback, followed by document & repository managers, patient information coordinators, health information managers, data quality managers, security officers and research & decision support analyst. 2. The level of job satisfaction among medical information handlers and managers averaged 3.14. In terms of the factors in the work environment concerned with job satisfaction, being able to work independently and as team players reached the top among 6 factors with the average of 3.39, followed by professional position, salary & rewards, expectations for job performance and administration. 3. The average rate of organizational commitment stood at 3.09. Respondents tend to be focused on present tasks rather than future-oriented tasks. 4. The result of the analysis based on the relationship between recognition as health information managers, job satisfaction and organizational commitment found that all analysis are statistically meaningful. The more the respondents were aware of their roles as health information managers, the more they tended to be committed to their work and satisfied with their work. The more the respondents were committed to their work, the more satisfaction was seen. The effects of recognition as health information managers on organizational commitment measured 0.27 and for job satisfaction it was 0.17. The effects of organizational commitment on job satisfaction stood at 0.71. The feasibility of the model meets the standard at Chi-square value of 66.755 and the P value of 0.057. The Normed Fit Index (NFI) of 0.930 was in compliance with the standard for model feasibility and the squared multiple correlation coefficient of this model was 8% in organizational commitment and 60% in job satisfaction.

  • PDF

Corporate Governance and Shareholder Wealth Maximization : An Analysis of Convertible Bond Issues (전환사채 발행과 주주 부의 극대화 : 기업지배구조와의 관계를 중심으로)

  • Park, Jin-Woo;Baek, Jae-Seung
    • The Korean Journal of Financial Management
    • /
    • 제20권2호
    • /
    • pp.1-39
    • /
    • 2003
  • Using a comprehensive sample of convertible security offerings by Korean firms from 1981 to 1999, we examine the effect of convertible bond issues on firm value. We find that the announcement of convertible bond issues has a positive effect on firm value. However, the announcement of private convertible bond issues by chaebol firms has a significant negative effect on their market values. This result is different from that in Japan, suggesting that the efficiency of the financing decision by Korean chaebol is different from that by Japanese keiretsu. In addition, we find that the announcement effect of private convertible bond issues by chaebol firms has a significant relation with the corporate governance variables such as ownership structure, bank relationship. These results indicate that convertible bond issues can be used as a mechanism for chaebol owner-manager to give rise agency problems at the expense of the wealth of minority shareholders.

  • PDF

A Study on the Method of Rural Rental Housing Management by Analysis of Rural-Fishing New Town Rental Housing (농어촌 뉴타운 공공임대주택 관리 분석을 통한 농촌형 임대주택 관리방안에 관한 연구)

  • Park, Mi-Lan;Park, Heon-Choon;Kim, Jin-Wook;Ryoo, Yeon-Su
    • Journal of the Korean Institute of Rural Architecture
    • /
    • 제17권3호
    • /
    • pp.55-62
    • /
    • 2015
  • Recently as return farmers has been increased rapidly, the introduction of a system of rental housing is being considerated in order to induce regional fixation. It was examined organizational management, business scope of rural type rental housing, management role, through the analysis about the management realities of the business of similar form Rural-Fishing New Town project. Jangseonggun and Hwasungun have maneged rental housing 280ho in Rural-Fishing New Town project. It is large village among Rural Rental Housing. And these counties have organized the complex on a large scale among the rental housing. Local governments have managed and operated directly, also these governments have two different methods for the co-management, and the way of making payment. Rental housing management services are divided into rental management, housing management, tenant management. Rental management services such as residents of recruitment, tenants and retreat, rent collection and the storage, management and leasing promotion of the cantilever, surveys of residents. Housing management services such as check of various facilities, maintenance and maintenance work, security and cleaning and daily facility management. Tenant management is life management in connection with housing welfare. In the rural type of rental housing, there are few cases to operate a management office. It is often supplied by rental housing to buy a house or vacant land within the existing village. In this case, by utilizing community facilities within the existing village instead of establishment of extra facilities,It doesn't need to make payment for maintenance fee. In the smaller complex than No. 20, it is self-managed by the tenants in order to reduce the administrative costs and specify the necessary municipal manager. Organization form can be maneged directly from local governments and part of for the management of the building can be employed a mixed management system to delegate management to private organizations such as non-profit organizations or neighborhood association. Tenant management helps people who move in a rental house live on stable circumstance in there area by connection with the program of life support.