• Title/Summary/Keyword: Security Service Agency

Search Result 173, Processing Time 0.027 seconds

Changes in the Paradigm of Future International Order and Prospects for Security on the Korean Peninsula (미래 국제질서 패러다임 변화와 한반도 안보전망)

  • Lee, Woong;Jung, Min-Sub;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.39-43
    • /
    • 2020
  • Currently, the nation's military is facing a real threat due to a reduction in military service resources and shorter service periods. Based on the military view that puts security first, the military tried to draw its impact and implications on the future army by reflecting the general objective content that the Ministry of National Defense and other government agencies and international agencies share. In other words, this study looks at the direction of the perception of mainstream perspectives (realism, liberalism) on international order, and presents the direction and framework for establishing future security strategies for the Korean Peninsula on the basis of military relevance that reflects the essential characteristics of military organizations contributing to national security on the theory and prospects of international order.

The Effect Where the Service Quality of Civil Expense Goes Mad to a Customer Satisfaction (민간경비 서비스 질이 고객만족에 미치는 영향)

  • Kim, Myung-Hyun;An, Hwang-Kwon;Kim, Jong-lyur
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.35-52
    • /
    • 2005
  • This study is focused on the service quality and customer satisfaction. The survey on the service quality and customer satisfaction has the follows; First, man group compared to female group provision was receiving the service of good quality and also the customer satisfactory degree appeared highly. Also, the quality of the group one recording service where the age is many appeared customer satisfactory boat song highly. Second, the customer satisfaction regarding a high educational background one recording service quality did not appear highly and not to be with the thing recording where the educational background will be high provision to receive a more many serviceit is satisfied it appeared. It follows, consequently in member of society nine statistics quality and service quality of civil expense and the customer satisfaction is a difference and the recording customer where the service quality of civil expense will be high it goes round satisfactorily and there is possibility of saying that. Third, in service quality empathy characteristic of subordinate result, with the fact that static effect it will be going mad to a shedding of corporeal service satisfaction and a security facility satisfaction. The security facility satisfaction where the empathy characteristic and shedding of corporeal service quality will be good is high reflects a fact and it is giving. Fourth, market segment anger strategy and there is a necessity which will form the customer layer which is various. Also, the site for the service of good quality the operation of development and strategy elder brother system of the elder brother system which it fixes is necessary.

  • PDF

Enhancing Security Gaps in Smart Grid Communication

  • Lee, Sang-Hyun;Jeong, Heon;Moon, Kyung-Il
    • International Journal of Advanced Culture Technology
    • /
    • v.2 no.2
    • /
    • pp.7-10
    • /
    • 2014
  • In order to develop smart grid communications infrastructure, a high level of interconnectivity and reliability among its nodes is required. Sensors, advanced metering devices, electrical appliances, and monitoring devices, just to mention a few, will be highly interconnected allowing for the seamless flow of data. Reliability and security in this flow of data between nodes is crucial due to the low latency and cyber-attacks resilience requirements of the Smart Grid. In particular, Artificial Intelligence techniques such as Fuzzy Logic, Bayesian Inference, Neural Networks, and other methods can be employed to enhance the security gaps in conventional IDSs. A distributed FPGA-based network with adaptive and cooperative capabilities can be used to study several security and communication aspects of the smart grid infrastructure both from the attackers and defensive point of view. In this paper, the vital issue of security in the smart grid is discussed, along with a possible approach to achieve this by employing FPGA based Radial Basis Function (RBF) network intrusion.

Employing SNMP to Manage Ubiquitous Environments

  • Murtaza Syed Shariyar;Amin Syed Obaid;Hong Choong Seon;Choi Sang Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.196-198
    • /
    • 2005
  • The vision of ubiquitous computing is becoming a reality now .Service discovery in ubiquitous environment, as well as adding semantics to the data is quite established. But, not many researchers have thought about the management of these devices. We envisage that by integrating SNMP with service discovery protocols, we could leverage the use of management factors (like performance, fault and security management etc) in the business, organizations, and other multi-user environments.

  • PDF

Proposal for Service Model for Internet Identity Management (인터넷 ID관리를 위한 서비스 모델 제안)

  • Song, Jung-Hwan;Kang, Yeon-Jung;Jang, Hwan-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.143-152
    • /
    • 2008
  • The incredible progress of information and communication technology has allowed various information and communication services to emerge in the Web environment. Such a service is initiated when the user provides his/her personal information to the service provider and is then given an identifier and authentication data. A series of the processes is inconvenient as it requires authentication by the service provider each time that the user requests the service. Furthermore, as the user subscribes to more services, the volume of ID and authentication information increases. This compels the users to use an ID that is easy to remember or to register the same ID over and over, increasing the risk of ID hacking. It is clear that such threats will become more serious as our lives become more dependent upon the Internet and as the Internet service environment advances. With the introduction of different services, the need to efficiently manage ID has been raised. In this paper, a Internet Identity Management Service that enables the control of the flow of the user’s personal information, which is used and stored for the Internet service, is proposed from the user's perspective.

Assessment Model for Industrial Accidents Prevention Policy (산업재해 예방정책에 대한 평가모형)

  • Kim, Youngsun;Jo, Jinnam;Baik, Jaiwook
    • Journal of Applied Reliability
    • /
    • v.17 no.1
    • /
    • pp.38-49
    • /
    • 2017
  • Purpose: The purpose of this study is to introduce the assessment model for industrial accidents prevention policy. Methods: 10 years of industrial accidents data are explored through EDA approach. Case control study is tried in order to assess the effectiveness of the measures taken by Korea Safety and Health Agency, Civilian, and 'Ministry of Employment and Labor'. Propensity score matching is used to match the characteristics of the two groups compared, and then case control study is again conducted. Next, logistic and Poisson regressions are used to assess the risk factors. Results: According to case control study involvement of 'Korea Safety and Health Agency' and 'Ministry of Employment and Labor' were not effective, but Civilian was. Propensity score matching leads to the same conclusion. Poisson regression reveals the impact of the risk factors on the industrial accidents. Industrial accidents occur more often as the number of employees grows. Mining, farming, fishing, 'transportation storage and telecommunication' and forestry have a higher level of industrial accidents but service industry has a lower level. It is odd that more involvement of Korea Safety and Health Agency, Civilian, and Ministry of Employment and Labor means more industrial accidents. Conclusion: 'Korea Safety and Health Agency', Civilian, and 'Ministry of Employment and Labor' seem to visit those industries with more industrial accidents.

An Empirical Study of Relationship between Information Security Investment and Information Security Incidents : A Focus on Information Security Training, Awareness and Education Service Sector (정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석 : 정보보안 교육 서비스 투자를 중심으로)

  • Lee, Hansol;Chai, Sangmi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.269-281
    • /
    • 2018
  • Many organizations are threatened by numerous information security attacks which are resulting in information security incidents. To prevent information security incidents, organizations invest on various information security measures like information security products, monitoring services and security training and educations. However they do not have enough knowledge about measurable utilities of information security investments. Since there is little studies empirically examining the effect of information security investments, this research aims to find out utilities of information security investment. We especially focuse on information security service investments. This study examined the data from the survey on information security for business sector which was conducted by Korean information & security agency. We utilized negative binomial regression model, which is a suitable model for over-dispersed count data. We found out that an investment on information security education and vulnerability testing have direct impact on reducing information security incidents. This research academically contributed to shed light on the utility of information security investments on reducing information security incidents. This research practically contributed to providing information security investment guideline for organizations which want to reduce information security incidents efficiently.

Implementation and Evaluation of Secure VoIP Conference System (DTLS 기반의 안전한 VoIP 컨퍼런스 시스템 구현 및 평가)

  • Kang, Seong-Ku;Kim, Kyou-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.45-57
    • /
    • 2009
  • In this paper, we implemented the conference system based on DTLS for saving securely the VoIP, which is served sprightly in the latest, securely and tested (and also analyzed) the system. As VoIP technology development, demand of conference system is increased and the related technologies are growed. But Security protocol to protect conference service is getting late than conference technology. In this paper, we studied based on DTLS protocol that can provide function of signaling, channel security, media channel security and application of group key and apply to VoIP conference system based UDP unchanged. In this paper, we searched suggested security protocols based on DTLS can apply to conference system and implement and apply the protocol to conference system. And we tested (and also alayzed) overhead of encryption and key management mechanism.

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

A Study on the Security Checklist Improvements to improve the Security in the Mobile Applications Development (모바일 어플리케이션 개발에서의 보안성 향상을 위한 보안 점검항목 개선에 관한 연구)

  • Shin, Jun-Yuop;Kim, Dong-Soo;Han, Ki-Jun;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.113-127
    • /
    • 2014
  • The use of mobile devices offers a variety of services to the individuals and companies. On the other hand, security threats and new mobile security threats that exist in IT infrastructure to build the environment for mobile services are present at the same time. Services such as mobile and vaccine management services, such as MDM (Mobile Device Management) has attracted a great deal of interest in order to minimize the threat of security in mobile environment. These solutions can not protect an application that was developed for the mobile service from the threat of vulnerability of mobile application itself. Under these circumstances, in this paper, we proposed mobile application security checklists based on application security review items in order to prevent security accidents that can occur in a mobile service environment. We collected and analyzed Android applications, we performed a total inspection of the applications for verification of the effectiveness of the check items. And we checked that the check items through a survey of experts suitability was verified.