• Title/Summary/Keyword: Security Technology Policy

Search Result 690, Processing Time 0.033 seconds

A Study on adopting cloud computing in the military (국방 클라우드 컴퓨팅 도입에 관한 보안체계 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.645-654
    • /
    • 2012
  • The South Korean Defense Ministry is planning and pushing forward to conduct a cloud computing pilot project in 2012. Taking into consideration the high-level security necessary in the military as well as wartime duties, if not designed properly, this project may anticipate severe damage to national security and interest. In particular, despite the fact that vulnerability due to inter-Korean confrontation and regular security-related incidents have been triggered, unconditionally conducting a cloud computing pilot project without reviewing not only violates security regulations but also causes various security-related side effects in and outside South Korea. Therefore, this thesis found conditions for conduct of this project by suggesting duties that can apply cloud computing as well as security technology, administration, post-accident matters and conditions for legally solving cloud computing in the military.

A Comparative Analysis of the Germany and Korea's Bilateral Cooperation Strategy to Secure Overseas Clean Hydrogen: Focusing on the Geopolitical Perspective (독일과 한국의 해외 청정수소 확보를 위한 양자협력 전략 비교 분석: 지정학적 관점을 중심으로)

  • JUN, EUNJIN;WOO, AMI;PARK, MIRA;JUNG, HYOUNDUK;SHIN, HYUN WOO
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.33 no.5
    • /
    • pp.470-498
    • /
    • 2022
  • Recently, the world has been considering hydrogen energy as the primary energy transition means to achieve carbon neutrality by 2050. In order to achieve the goal of reducing greenhouse gas emissions, Korea is also promoting a clean hydrogen economy. However, it is necessary to introduce various clean hydrogen from overseas so that the projected demand can not meet the domestically produced. For this study, we conducted the policy comparison approach between countries other than the generally considered technical and economic approaches. The finding proposes the direction of bilateral cooperation for a strategy of securing overseas clean hydrogen from a geopolitical perspective. Germany was a target country for the policy comparison since it has a high proportion of manufacturing, like Korea, and is taking the lead in the renewable-based energy transition policy. According to the survey and analysis of the policy establishment status and new projects of the two countries, Germany is promoting bilateral international cooperation in the hydrogen area with about 33 countries based on 7 types of activities. In comparison, Korea is involved in bilateral cooperation with about 12 countries on relatively few activities. Among the types of bilateral cooperation, R&D cooperation with advanced countries for hydrogen technology was a common activity type. Germany preemptively promotes cooperation for demonstration and commercialization, considering geopolitical means and strengthening manpower training and assistance on policy and regulation to preoccupy the market for the future. Therefore, it is necessary to consider establishing a network of an entire life cycle of supply and demand network that links the future market with securing clean hydrogen considering the geopolitical distribution. To this end, Korea also needs to expand bilateral cooperation countries by activity type, and it seems necessary to seek various geopolitical-based bilateral cooperation and support measures for developing countries to diversify the supply sources of hydrogen.

U.S. Commercial Remote Sensing Regulatory Reform Policy (미국의 상업적 원격탐사활동에 대한 규제개혁 정책)

  • Kwon, Heeseok;Lee, Jinho;Lee, Eunjung
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.2
    • /
    • pp.241-250
    • /
    • 2019
  • The current U.S. remote sensing act was made in 1992 and has been criticized for being outdated and inappropriate in view of the modern technological development. In order to enhance the American competitiveness and leadership in the world, President Trump announced Space Policy Directive (SPD) - 2 on May 24, which is designed to modernize the regulations related to commercial space activities including private remote sensing system operations. It should be noted that the regulatory reform efforts are made within broader terms of the National Security Strategy on Dec. 17, 2017, pursuing the enhancement of national security and economic prosperity as well. A legislative support in Congress has also been added to the Administration's efforts. The proposed regulatory reform on the licensing of commercial remote sensing system operations outlines the features of lessening administrative burden on applicants by simplifying the overall application process and of limiting the operations only when there is an impact upon the national security with clear and convincing evidence. But, due to a different regulatory system of each country, such a movement to expand an individual's freedom to explore and utilize outer space may result in an international dispute or a violation of international obligations, so there should be a merit in paying attention to the U.S. commercial remote sensing regulatory reform, and it is desirable to establish international norms as flexible and appropriate to the level of space technology and space industry.

A Study on Wartime OPCON Transfer Policy Changes Applied Kingdon's Policy Model - Focussing on Administrations of Roh Moo Hyun and Lee Myoung Bak - (Kingdon모형을 적용한 전시 작전통제권 전환 정책변동에 관한 연구 노무현 정부, 이명박 정부를 중심으로-)

  • Lee, JeongHoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.291-295
    • /
    • 2022
  • The transition to wartime operational control during the term of office, which was the promise of the Moon Jae Inn administration, fell through. More than 70 years after it was transferred during the Korean War in 1950, the policy of converting wartime operational control has been repeatedly decided and reversed several times. This conversion of wartime operational control is a national policy directly related to our security, and it is most important to understand the determinants of the administration's conversion to wartime operational control. This paper selects two cases of adjustment of wartime operational control policy during the Lee Myung Bak administration in 2006 and 2010 during the Roh Moo Hyun administration as the subject of the study and expects to gain not only policy predictive power but also successful policy execution at the time of the two administration' policy changes.

A Brief Scrutiny of Malawi's Policy on Nuclear Power

  • Katengeza, Estiner Walusungu
    • Journal of Radiation Protection and Research
    • /
    • v.45 no.4
    • /
    • pp.147-153
    • /
    • 2020
  • Background: Malawi's 2018 National Energy Policy includes nuclear power as an energy option with an operational 100 MW targeted for 2035. Materials and Methods: This paper challenges the scope of the policy on nuclear power by reviewing its implementation strategy and comparing it to: the strategy established for coal in the same policy; some experiences from other countries; and documents by the International Atomic Energy Agency (IAEA) relating to establishing a national position on nuclear power and infrastructural requirements for a nuclear power program. Results and Discussion: It is found that the pro-nuclear position is uninformed, and targets are unrealistic owing to a lack of understanding of nature of nuclear power including the requirements for safety, security and safeguards, and nuclear infrastructure. It is apparent that neither consultation nor a proper analysis were comprehensively conducted for nuclear. Though the national energy policy suggests a national position for nuclear energy, the content does not demonstrate that the position was arrived at knowledgeably. Conclusion: Thus, nuclear power may presently be viewed as a potential energy option that is yet to be seriously considered. It is important to build an appropriate level of literacy on nuclear science and technology for policy makers, key stakeholders, and the public to be better positioned for strategizing on nuclear power.

Welfare Policy Visualization Analysis using Big Data -Chungcheong- (빅데이터를 활용한 복지정책 시각화분석 -충청도 중심으로-)

  • Dae-Yu Kim;Won-Shik Na
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.15-20
    • /
    • 2023
  • The purpose of this study is to analyze the changes and importance of welfare policies in Chungcheong Province using big data analysis technology in the era of the Fourth Industrial Revolution, and to propose stable welfare policies for all generations, including the socially underprivileged. Chungcheong-do policy-related big data is coded in Python, and stable government policies are proposed based on the results of visualization analysis. As a result of the study, the keywords of Chungcheong-do government policy were confirmed in the order of region, society, government and support, education, and women, and welfare policy should be strengthened with a focus on improving local health policy and social welfare. For future research direction, it will be necessary to compare overseas cases and make policy proposals on the stable impact of national welfare policies.

A New Approach to the Verification of a Message Protocol : Fuzzy Integral (퍼지적분을 이용한 메시지 프로토콜 검증)

  • Shin, Seung-Jung;Park, In-Kue
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1903-1910
    • /
    • 2000
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

모바일 게임 파트너 선정을 위한 보안 프로토콜 검증

  • Sin, Seung-Jung
    • 한국게임학회지
    • /
    • v.2 no.1
    • /
    • pp.23-30
    • /
    • 2002
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of Public key in Mobile Game using m-Commerce Choquet fuzzy integral compared with fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

A Study on the Linkage and Gap in Personal Information Policy in Cloud Services between Multinational Companies' Human Resource Management and Domestic Companies' Human Resource Management (제조 전문 국제기업 인사관리와 국내 인사관리 클라우드 서비스 운영 개인정보정책과의 연계 및 괴리에 대한 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.639-643
    • /
    • 2018
  • Laws concerning the protection of personal information have been enacted and revised as the legislation on personal information protection on the basis of the Act on the Protection of Personal Information Maintained by Public Institutions. Nevertheless, there have been continuing threats resulting from the fact that restrictions on security subject to laws remain unclear. By proposing protected access utilizing a unique identification key of enterprises, regarding the personal information of various internal and external clients held by international manufacturing companies and attempting to make policy aspect and management access at the same time, there is a change of gradual decline in cloud personnel information management service, which is the domestic ISP service for personnel management as the technology facilitated to reduce the burden on personnel and cost for the protection of personal information and the market is also changing to the direction for companies to directly operate. Therefore, this study intends to examine the convenience of integrated management for ensuring security, while confirming the gap on flexibility and safety on management point regarding the human resources of international manufacturing companies arising from its interactions.

A Study on The Instant Messaging Security Policy in The Organizations (조직 내부에서의 인스턴트 메시징 보안 정책에 대한 연구)

  • Sattarova, Feruza;Kim, Seok-Soo;Choi, Min-Kyu;Cho, Eun-Suk;Kim, Tai-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.280-286
    • /
    • 2009
  • A policy of instant messaging usage is offered in this article. First, a brief introduction of instant messaging system structure is described. The main threats and vulnerabilities of Instant messenger (IM) are described in the second part of the paper. Instant messaging applications offer so many advantages in so many different fields that they're fast becoming the preferred communication tool for a number of different professional scenarios. When properly implemented, instant messaging can be a true asset to the business by making communications easier throughout the organization. If instant messaging is carelessly implemented, though, it can cause problems with privacy and may expose the organization to various forms of malware. The solution offered in this paper is one of the effective ways against threats of IM. However, the system cannot be secured entirely. All we can do is reducing the risks.

  • PDF