• Title/Summary/Keyword: Security Planning

Search Result 461, Processing Time 0.027 seconds

Security planning for digital modbile communications (디지털 이동 통신을 위한 안전 대책)

  • 박춘식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.3
    • /
    • pp.698-712
    • /
    • 1996
  • This paper deals with the security planning for digital mobile communications provided in CDMA and GSM security standards and the public key crytosystem security methods. In this paper, we provide a comparison of these methods with repect to security services and key managment. Based upon this analysis, we also present a secunity planning which is applicable to the domestic digital mobile communications.

  • PDF

Information Security Activity of Analysis Phase in Information Security Model in Accordance with SDLC

  • Shin, Seong-Yoon;Lee, Tae-Wuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.11
    • /
    • pp.79-83
    • /
    • 2016
  • In this paper, we define four levels of analysis, design, implementation, and testing of the configuration of the development phase by S/W development life cycle. In particular, it dealt with the stage of the analysis phase to prepare an information system developed intensively. Details of the derivation of the information security requirements, it can be seen that comes from the perspective of confidentiality, integrity, availability and accountability, etc. It dealt with from the first manifestations of the projects planning to final planning to establish information security in activities of the Information Security requirements. As an example exhibited by assessing the information security analysis phase activities of S corporations, it can be seen that the improved sales rise in information security activities.

A Combined Bulk Electric System Reliability Framework Using Adequacy and Static Security Indices

  • Billinton, Roy;Wangdee, Wijarn
    • Journal of Electrical Engineering and Technology
    • /
    • v.1 no.4
    • /
    • pp.414-422
    • /
    • 2006
  • Deterministic techniques have been applied in power system planning for many years and there is a growing interest in combining these techniques with probabilistic considerations to assess the increased system stress due to the restructured electricity environment. The overall reliability framework proposed in this paper incorporates the deterministic N-1 criterion in a probabilistic framework, and results in the joint inclusion of both adequacy and security considerations in system planning. The combined framework is achieved using system well-being analysis and traditional adequacy assessment. System well-being analysis is used to quantify the degree of N-1 security and N-1 insecurity in terms of probabilities and frequencies. Traditional adequacy assessment is Incorporated to quantify the magnitude of the severity and consequences associated with system failure. The concepts are illustrated by application to two test systems. The results based on the overall reliability analysis framework indicate that adequacy indices are adversely affected by a generation deficient environment and security indices are adversely affected by a transmission deficient environment. The combined adequacy and security framework presented in this paper can assist system planners to realize the overall benefits associated with system modifications based on the degree of adequacy and security, and therefore facilitate the decision making process.

A Study on U-Service for Security in U-City Newtown Planning (신도시계획의 계획지표를 반영한 U-City의 U-방범서비스 개선방안 연구)

  • Yoon, Hyo Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.5D
    • /
    • pp.645-654
    • /
    • 2009
  • This study started with necessity of historical spatial planning skills in U-city planning. Though U-city technology and information are very important, U-city development should be considered on the base of various experience of spatial planning. This study explored spatial planning indexes change in the recent newtown plans. In particular, safety and security were intensively analyzed. In addition, many theories on safe urban space, ubiquitous technology, traditional defensible space, and CPTED (Crime Prevention through Environmental Design) are compared. The findings are as follows. First, each planning is not integrated and there is lack of network among each planning. Specifically, from the crime prevention perspective, there is only mechanical monitoring such as CCTV without architectural approach. Even though CCTV is social needs, it is necessary to adopt it with architectural environment in order to improve the synergy effect of spatial planning and non-spatial planning.

An Analysis of the Case Study on Fashion Show Planning and Production (패션쇼 연출기획의 사례분석연구)

  • 오현남;김현주
    • Journal of the Korean Home Economics Association
    • /
    • v.41 no.11
    • /
    • pp.11-20
    • /
    • 2003
  • The purpose of this study is : first, to examine factors of fashion show planning and production and to classify types of fashion show planning and production: second, to compare and analyze the factors through a case analysis to defined their differences. For the purpose, data are collected to compare and analyze from literature as well as the interview with fashion show planning and production companies in Korea. The result shows that all the factors are considered on a practical level except security and publicity among 15 factors presented in literature : the purpose of the show, target spectators, product selection, product prices, type of show, size, location, models, time of show, duration, theme, security, budget, and publicity. Show types are divided into national brands, designer brands, imported brands, and collections. The result of the comparison and analysis of the factors of the planning and production by type shows that factors vary greatly depending on the purpose of the show, target spectators, and form of the show and products. By analyzing the case study on fashion show planning and production on a practical level, the study recognizing the need of specialized development of fashion show planning in Korea's fashion industry, is a basic process of theory systematization for the planning and production in its marketing aspects, and will provide relevant theories in such aspects for those who want to enter into the field.

Ubiquitous Home Security Robot System based on Sensor Network (센서 네트워크 기반의 홈 보안로봇 시스템 구현)

  • Kim, Yoon-Gu;Lee, Ki-Dong
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.1
    • /
    • pp.71-79
    • /
    • 2007
  • We propose and develop Home Security robot system based on Sensor Network (HSSN) configured by sensor nodes including radio frequency (RF), ultrasonic, temperature, light and sound sensors. Our system can acknowledge security alarm events that are acquired by sensor nodes and relayed in the hop-by-hop transmission way. There are sensor network, Home Security Mobile Robot (HSMR) and Home Server(HS) in this system. In the experimental results of this system, we presented that our system has more enhanced performance of response to emergency context and more speedy and accurate path planning to target position for arriving an alarm zone with obstacle avoidance and acquiring the context-aware information.

  • PDF

Developing Information Security Management Model for SMEs: An Empirical Study (중소기업 정보보호관리 모델의 개발: 실증 연구)

  • Lee, Jung-Woo;Park, Jun-Gi;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.15 no.1
    • /
    • pp.115-133
    • /
    • 2005
  • This study is to develop an information security management model(ISMM) for small and medium sized enterprises(SMEs). Based on extensive literature review, a five-pillar twelve-component reference ISMM is developed. The five pillars of SME's information security are: centralized decision making, ease of management, flexibility, agility and expandability. Twelve components are: scope & organization, security policy, resource assessment, risk assessment, implementation planning, control development, awareness training, monitoring, change management, auditing, maintenance and accident management. Subsequent survey designed and administered to expose experts' perception on the importance of these twelve components revealed that five out of tweleve components require relatively immediate attention than others, especially in SME's context. These five components are: scope and organization, resource assessment, auditing, change management, and incident management. Other seven components are policy, risk assessment, implementation planning, control development, awareness training, monitoring, and maintenance. It seems that resource limitation of SMEs directs their attention to ISMM activities that may not require a lot of resources. On the basis of these findings, a three-phase approach is developed and proposed here as an SME ISMM. Three phases are (1) foundation and promotion, (2) management and expansion, and (3) maturity. Implications of the model are discussed and suggestions are made for further research.

Functional and Process Model for Traffic Engineering in Multimedia Internet (멀티미디어 인터넷 망에서의 트래픽 엔지니어링을 위한 기능 및 프로세스 모델)

  • 장희선;김경수;신현철
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.9-17
    • /
    • 2002
  • Traffic engineering function consists of traffic management, capacity management and network planning. In this paper, we present the requirements for each functional traffic management, and also present functional and process model to efficiently to handle the traffic engineering for multimedia internet services. Finally, the traffic management methods for each step are described in detail.

  • PDF

Connection/Bearer-Path Routing Technology (인터넷 트래픽 관리를 위한 연결/베어러-패스 라우팅 기술)

  • 신현철;장희선
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.89-97
    • /
    • 2002
  • We use the call routing to interpret the number or name for routing address in multimedia internet. The routing address is used for connection setup. The traffic engineering consists of traffic management, capacity management and network planning. In this paper, in the traffic management function, the basic functions for call routing and connection/bearer-path routing will be presented.

  • PDF

A Study on Establishment of Small and Medium Business Information Security Plan under Resource Restrictions (자원 제약하의 중소기업 정보보안계획 수립방안 연구)

  • Kwon, Jang-Kee;Kim, kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.119-124
    • /
    • 2017
  • Information is a valuable asset regardless of the size of the enterprise and information security is an essential element for the survival and prosperity of the enterprise. However, in the case of large corporations, Security is ensured through rapid introduction of information security management system. but In the case of SMEs, security systems are not built or construction is delayed due to complex factors such as budget constraints, insufficient security guidelines, lack of security awareness. In this paper, we analyze the actual situation of information security management of SMEs through questionnaires, and We would like to suggest a comprehensive security plan for SMEs in free or inexpensive ways. We believe that by applying the method presented in this paper, SMEs will be able to implement the lowest cost basic information security and will benefit SMEs who plan to establish an information security plan.