• Title/Summary/Keyword: Security Measures

Search Result 1,137, Processing Time 0.035 seconds

A Study on The Step-by-step Security Measures of Project through Cases (사례를 통한 프로젝트 단계별 보안 방안에 대한 연구)

  • Shin, Seong-Yoon;Jang, Dai-Hyun;Kim, Hyung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.44-46
    • /
    • 2012
  • Leading companies has led to the victimization being leaked to accept personal information by the cyber attack. Also planned hacking cases on purpose such as acquiring monetary gain or social distracting is constantly increasing. In this paper, we identify examples of the project step-by-step leading IT services companies to perform security activities. Real-world projects step-by-step through security measures that can be applied are presented.

  • PDF

Study on the Terror with Laser Weapons (레이저무기의 테러위협에 관한 연구)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.385-405
    • /
    • 2000
  • In the Present thesis, at temps were to study with the study on the terror with laser weapons. Chapter I which sets out purpose, scope and method. Chapter II concerns the general definition of laser weapons. Chapter III explain at length overview about development of laser weapons. Chapter IV suggest the terror with laser weapons and the counterplan against it. It is followed by concluding observation made in chapter V. To we operated security systems effectively, these need to be regulated according to a security measures organizations, laser facilities and equipments, laser plan and protective force, laser operations and so forth.

  • PDF

The Influence of Information Security Behaviors on Information Security Performance in Shipping and Port Organization (해운항만조직의 정보보안이행이 정보보안성과에 미치는 영향)

  • Kang, Da-Yeon;Chang, Myung-Hee
    • Journal of Navigation and Port Research
    • /
    • v.40 no.4
    • /
    • pp.213-222
    • /
    • 2016
  • Recently, as cases of organizations' information disclosure occur continuously, it is urgent to manage security of information and establish measures to enhance security of information by an organization itself. Especially, members of an organization should be prepared with measures for information security, and an organization should do its efforts to raise its members' awareness toward information security. I set a research model to verify what effects an organization's fulfillment of regulations to secure information brings to performance of information security and selected members from maritime and port organizations and financial and insurance institutes as sample. Results of the analysis to identify factors affecting information security performance among members of maritime and port organizations are as follows. Firstly, I found that the factors affecting information security awareness are information security attitude and information security standards. Secondly, the factor giving influence on information security policy of an organization was found to be information security standards. In contrast, information security punishments and information security training were verified not to give influence on compliance of information security policy. Thirdly, information security awareness was identified to give significant influence on compliance of information security policy, information security competence and information security behavior. Fourthly, compliance of information security policy was verified to be those factors that give influence on information security competence and information security behavior. Lastly, information security competence and information security behavior were found to be such factors that give influence on information security performance.

For the financial institution computer system security, research (금융기관 전산시스템 보안 강화에 대한 연구)

  • Kim, Myung-Soo;Choi, Dae-Young;Seo, Won-Woo;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.67-70
    • /
    • 2014
  • Last was the main issue of financial security in the future will be more emphasis on security. Such as March 20, 2013 Computational crisis, June 25 Cyber terrorism information to credit card companies and customers due to carrier spill in Financial computational security measures 'released in 2014 and the financial authorities' customer information leakage prevention measures "were published the efforts to protect customers' information assets and ensure the stability of the financial transactions carried out by financial institutions protected status check "the information annually authorities This study business operations for the protection of information technology services for IT systems security equipment, data security operating services, security management services operations, operational management of IT systems security requirements from the point to the need for information security, IT systems administrator it would be great help.

  • PDF

Security Measures against Assembly and Demonstration during International Conference - the Case of the Nuclear Security Summit - (국제회의 시 집회시위에 관한 안전관리 방안 - 핵 안보정상회의 개최를 중심으로 -)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.193-222
    • /
    • 2011
  • Our country successfully hosted the G20 summit in Seoul in November, 2010. Afterwards, however, the Yeonpyungdo shelling incident took place by the North, and the North Korean nuclear issue have strained interKorean relations. Our country is going to host the nuclear security summit, which is of great significance at this point of time. The nuclear security summit is to be attended by 47 countries. The participant countries of this summit is larger in number than those of the ASEM, APEC and the G20 summit that our country has ever hosted. That is a large-scale international conference that invites the UN, the IAEA and the EU, which are three major nuclear-related international organizations. A successful hosting of the nuclear security summit will serve as an opportunity to boost our country's national prestige, and is likely be beneficial to the settlement of the North Korean nuclear issue. Like other international submits in foreign countries, however, violent anti-globalization demonstrations are expected to occur when the nuclear security summit is held in April next year. The purpose of this study was to make a case analysis of demonstrations during multilateral international conferences hosted by foreign countries over ten years between 1999 and 2009, to examine the controversial points over the demonstrations, and ultimately to seek ways of ensuring safety against possible assemblies and demonstrations during the forthcoming nuclear security summit, which is scheduled to be held in April next year. The findings of the study on feasible security measures are as follows: First, information and intelligence gathering should be reinforced, and the inspection should be stepped up. Second, pacification among domestic NGOs and the supplementation of the existing legal devices are required. Third, publicity should be strengthened. Fourth, riot police officers should be selected as early as possible to bolster their education and training, and more reinforced emergency measures should be taken. It's needed to seek assistance from the military as one of emergency measures, and national defense readiness should be bolstered across the nation in collaboration with the Ministry of National Defense when the summit is near at hand. Finally, CBR countermeasures should be taken in preparation for CBR terrorism.

  • PDF

Analysis on Cyber Security and Its Challenges to Society

  • Shashank Mishra;Raghav Sandhane
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.141-152
    • /
    • 2024
  • Cyber security plays an important role in the field of IT industry and other industry too. Whenever we talk about cyber security, the word cybercrime pops out. Cybercrime is the biggest issues we are facing right now. Every 39 seconds an attacker is hacking something. Since 2008 to 2019 there are more than 8800 data breach cases is being found or filed. Even as we are aware of cybercrime and its stats, only 5% organization are fully secured and other 95% are not fully secured. According to survey 56% organization have weak controls. Basically they are not secured. Apart from taking measures cyber security are facing huge challenges or disturbs to many. This paper mainly focuses on dare to cyber security and also center of attraction is cyber security expertise, morals with changing in technology with time. [1]

Study on the Association between Personal Information Protection Legislation and Information Security Product (개인정보보호 관련 법령의 내용과 보안제품 분포간의 연관성 분석)

  • Kim, Min-Jeong;Lee, Jung Won;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1549-1560
    • /
    • 2015
  • For the past few years, personal information breach incidents, great and small, occurred constantly. Accordingly, the Personal Information Protection related Ordinances are enacted and amended persistently, and the information security products also keep advancing and developing in the same way. There are the certification systems such as Common Criteria Evaluation and Validation(CC) and Korea Cryptographic Module Validation Program(KCMVP) for the information security products. These are also strictly carried out. This paper analyzes and categorizes the 5 Personal Information Protection related Ordinances in the aspects of technical protection measures by using key words. Here are the 5 related ordinances; 'the Personal Information Protection Act', 'the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc', 'the Act on the Protection, Use, Etc, of Location Information', 'the Use and Protection of Credit Information Act', and 'the Electronic Financial Transactions Act.' Moreover, this study analyzes the association between the technical protection measures in the 5 relevant laws and the information security products that are obtaining the CC Evaluation & Validation(CC) and the products that are now produced at KISIA's member companies.

Validation of Food Security Measures for the Korean National Health and Nutrition Examination Survey (국민건강영양조사 식품안정성 측정 도구의 타당도 조사)

  • Kim, Ki-Rang;Hong, Seo-Ah;Kwon, Sung-Ok;Choi, Bo-Youl;Kim, Ga-Young;Oh, Se-Young
    • Korean Journal of Community Nutrition
    • /
    • v.16 no.6
    • /
    • pp.771-781
    • /
    • 2011
  • The objective of this study was to assess the reliability and validity of food security measures, which was developed based on the US household food security survey module (US HFSSM) with content validity in the Korean population. The reliability and validity were assessed by internal consistency, construct validity and criterion-related validity. The study included 446 households. Among those, 46.2% were households with children. The proportion of food insecure households was 33.3%. Among those, 35.4% and 64.6% households were food insecure with hunger and without hunger, respectively. The Cronbach's alpha coefficients were 0.84 and the infit value by the Rasch model analysis ranged from 0.68 to 1.43. The scale item response curves by food insecurity severity explained well the nature and characteristics of food security, indicating the highest proportion of "yes" for the items on diet quality, followed by those with diet quantity. The result of criterion-related validity showed that food insecurity status was significantly related in a dose-response manner with the household income level, food expenditure, subjective health state, subjects' educational level. Household food security status was also related to dietary diversity regarding protein foods, fruits and fruit juice, and milk and dairy product. These findings suggest that the food security instrument is reliable and valid and would be used to assess food security status in the Korean population.

Research on Effective Security Control Measures Against DDoS Attacks (DDoS 공격에 대한 효과적인 보안 관제 방안)

  • Jung, Il-Kwon;Kim, Jeom-Gu;Kim, Kiu-Nam;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.7-12
    • /
    • 2009
  • It is very difficult to completely block the DDoS attack, which paralyzes services by depleting resources or occupying the network bandwidth by transmitting a vast amount of traffic to the specific website or server from normal users' PCs that have been already infected by an outside attacker. In order to defense or endure the DDoS attack, we usually use various solutions such as IDS (Intrusion Detection System), IPS (Intrusion Prevention System), ITS (Intrusion Tolerance System), FW (Firewall), and the dedicated security equipment against DDoS attack. However, diverse types of security appliances cause the cost problem, besides, the full function of the equipments are not performed well owing to the unproper setting without considering connectivity among systems. In this paper, we present the effective connectivity of security equipments and countermeasure methodology against DDoS attack. In practice, it is approved by experimentation that this designed methdology is better than existing network structure in the efficiency of block and endurance. Therefore, we would like to propose the effective security control measures responding and enduring against discriminated DDoS attacks through this research.

  • PDF

A Study on the hacking countermeasures in Military security (군보안상 해킹대응방안에 관한 연구)

  • Kim, Doo Hwan;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.133-142
    • /
    • 2017
  • Breaking away from the blind faith of internal military security network, current military security demands strengthening measure on the H/W, controlling measure against information communications within the military, strengthening measure on the linkage point of the military and universal internal networks, legal supplementation, sucurity management ofn the military facilities from outsourcing services supporting the military. By analyzing the danger of military organizations hacking and real hacking cases, policy establishment for strengthening the security on military network hacking, legal supplementation and controlling measure for the outsourcing services are the pragmatic counter measures against military security hacking considering the peculiarities of military rather than the application of physical containment linked with information communications technology on the H/W safety measures.