• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.029 seconds

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

A Study on the Preservation Policy for Maintaining the Integrity of Digital Contents (디지털 콘텐츠의 무결성 유지를 위한 장기적인 보존 정책에 관한 연구)

  • Jung, Young-Mi;Yoon, Hwa-Mook;Kim, Jeong-Taek
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.205-226
    • /
    • 2010
  • Assuring that the integrity of digital contents is reliably maintained is an important component of long-term digital preservation. The purpose of this study was to examine and analysis the best practices of digital preservation policy and provide the basis theory for establishing a preservation policy for maintaining the integrity of digital contents. In order to achieve the purpose of the study, we examined the digital archiving practices for maintaining the integrity of digital contents. Especially, we focused on the storage media and file formats, the media and format conversion, disaster prevention and recovery, management and handling, inspection and monitoring, and security policies.

The Improvement Measures for the Establishment of Emergency Management System in Private Security (위험사회의 전개에 따른 민간경비 산업의 대응과제 - 위기관리를 중심으로)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.103-125
    • /
    • 2005
  • Hazard are defined here as threat to life, well-being, material goods and environmental from the extremes of natural processes or technology. The challenges of natural and technology in increasing the exposure of people and property to risk pose a dilemma for any government seeking the fullest protection for its people and their property. As society progresses and as technology improves and becomes ever more intricate and far reaching, the human species is confronted with increasingly diverse and numerous catastrophic events. Not so infrequently, unfortunately, the impact of either a man-made or natural disaster is compounded by the fact that policy makers have neither prepared themselves or the public to respond appropriately to a disaster once the tragedy has struck. Many concerns have been raised for importance of emergency management after 1990's numerous urban disasters in Korea. Emergency management is the discipline and profession of applying science, technology, planning, and management to deal with extreme events that can injure or kill large numbers of people, cause extensive damage to property, and disrupt community life. When the primary function of private security is to protect lives and property of clients, emergency management should be included in the security service and many countermeasures should be carried out for that purpose. The purpose of this study is to establish ways and means needed to improve the private security emergency management system in Korea. This study is spilt into four chapters. Chapter I is the introduction part. Chapter II introduces the reader to a private security and emergency management theory, and Chapter III deals with the establishment of an effective emergency management system in Korea private security, Chapter IV is a conclusion. Policy makers and private security industry employers in Korea has not concerned with the importance of training and education by lack of recognition and has been passive about qualified guards. And the authorities supervising and the administrating the guards has not recognized the importance of private security and has neglected the training of the guards. In theses contexts, private security should develop and maintain a educational program of emergency management to meet their responsibilities to provide the protection and safety of the clients. Today's modern corporate security director, is, first of all, a competent, well-rounded business executive and, second, a 'service expert'. And, emergency management personnel in private security industry need continuous training.

  • PDF

Security Issues on Smart Grid (스마트 그리드 보안 이슈)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.279-284
    • /
    • 2013
  • Improve the global environment for low carbon emissions and green energy, and the growing interest in IT technology, combined with the existing power grid to achieve this, to achieve more efficient and environment-friendly smart grid smart grid projects around the world actively being deployed. A smart grid is expected to be a modernization of the legacy electricity network. Therefore, this research provides a secure smart grid model so that it provides better monitoring, protecting and optimizing automatically to operation of the interconnected elements.

Analysis of Security Overhead in Secure Operating System (보안 운영체제의 오버헤드 분석)

  • Ko Young-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.11-19
    • /
    • 2005
  • The importance of this Paper is to develop a standard Performance evaluation model and scenario for the secure OS. According to the scenario that was conducted for Performance evaluation, benchmarking was Performed. All the benchmarking result was thoroughly analyzed. Our result contribute to evaluating Secure 05 that contains various security policy affecting system Performance. In this paper, it is expected to Provide guidelines of secure operating system for the consumer, developer and evaluator. It will also contribute to the systematic basis for evaluation of security 05 and the promotion of domestic information security industry by retaining basic technology for international trends.

  • PDF

A Study on the Improvement of Information Security Management Condition Evaluation in Public Sector through the SCAP Analysis by NIST in U.S. (미(美) NIST 보안성 자동평가프로토콜(SCAP)분석을 통한 공공기관의 정보보안관리실태 평가제도 개선방안 연구)

  • Jee, Yoon Seok;Lee, Yong Suk;Yoon, Duck Jung;Shin, Yong Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.4
    • /
    • pp.31-39
    • /
    • 2019
  • The 129 public institutions in Korea are subject to Information Security Management Condition Evaluation (ISMCE) as a part of the government management evaluation system by the Ministry of Economy and Finance. ISMCE is started in 2006 with the central government institutions, and applied to the all public institutions in 2009. This evaluation is annually conducted by the National Intelligence Service through the site visits, and the number of the evaluated institutions is increasing year by year. However, the process of ISMCE - identifying existing vulnerabilities in the information system - is conducted manually. To improve this inconvenience, this paper introduces the various evaluation system in the major countries, especially in the United States, and analyzes the Security Content Automation Protocol (SCAP) by NIST. SCAP is automation protocol for the system vulnerability management (in technical fields) and security policy compliance evaluation. Based on SCAP, this paper suggests an improvement plan for the ISMCE of Korea.

The Main Substance and Some Problems of 24 hours Advance Cargo Manifest Declaration Rule (선적 24시간전 적하목록전송규칙(24 Hours Rules)의 주요내용과 문제점)

  • Han, Sang-Hyun;Eom, Kwang-Yeol
    • The Journal of Information Technology
    • /
    • v.8 no.1
    • /
    • pp.95-112
    • /
    • 2005
  • This paper will look into the Main Substance and Some Problems of 24 hours Advance Cargo Manifest Declaration Rule, focuses on the Policy implication of Korea's and counter measures of our parties concerned about 24-hour advance vessel manifest rule. The 24-hour rule requires cargo owners to submit cargo manifest information to U.S. Customs 24 hours before vessel sailing from the final foreign port to a U.S. port. Cargo manifest information must be complete, accurate, and timely. As of February 2, 2003 manifest information can be submitted by paper or electronically. Cargo descriptions must be at a level of detail consistent with Harmonized Tariff Schedule (HTS) codes used by U.S. Customs. HTS codes are 10 digits. Electronic submissions are made via the Automated Manifest System (AMS) run by U.S. Customs.

  • PDF

Assessment Model of Student's Satisfaction in IT Master Programs based on Employment-Contract (IT분야 채용조건형 계약학과의 학생 만족도 평가모형 개발에 관한 연구)

  • Park, Sang-Min;Kim, Tae-Sung;Kwon, Sun-Dong
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.4
    • /
    • pp.83-95
    • /
    • 2013
  • This study aims to analyze factors that affect satisfaction of students in employment-contract information technology master programs, and suggest policy implications to improve management of employment-contract master programs. A survey of students supported by Software master program of National IT Industry Promotion Agency (NIPA) and Knowledge Information Security master program of Korea Internet and Security Agency (KISA) indicates that department administration, department vision, scholarship, adviser, and lecturer affect satisfaction of students in employment-contract master programs in listed order.

Construction of Security Evaluation Criteria for Web Application Firewall (웹방화벽의 보안성 평가 기준의 구축)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.197-205
    • /
    • 2017
  • To achieve web application security goals effectively by providing web security features such as information leakage prevention, web application firewall system must be able to achieve the goal of enhancing web site security and providing secure services. Therefore, it is necessary to study the security evaluation of web application firewall system based on related standards. In this paper, we analyze the requirements of the base technology and security quality of web application firewall, and established the security evaluation criteria based on the international standards for software product evaluation. Through this study, it can be expected that the security quality level of the web application firewall system can be confirmed and the standard for enhancing the quality improvement can be secured. As a future research project, it is necessary to continuously upgrade evaluation standards according to international standards that are continuously changing.

A Study on the countermeasures and drones's threats in Military security (군보안상 드론위협과 대응방안)

  • Kim, Doo-hwan;Lee, Youn-hwan
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.223-233
    • /
    • 2018
  • The forces to protect people's life and property against the enemy attack is an organization which is regulated by the constitutional law. In terms of nature, its security is a significant factor to determine success or failure for the war. However, recently the 4th industrial revolution represents the rapid change in the advancement of civilization and technology. It can influence on the environment of military security which can make various changes. Unless taking proper action againsty these changes, it can inflict a vital harm for the organization of forces and its internal security. In this aspect, this study discuss new threats of the military security, above all, the most technical improvements and harms for the drones in terms of security. In addition, the advantages and disadvantages of drones which can influence on the ragions of military command and control, information operations, maneuvers, firepower, operation sustainment supports are analyzed. Moreover, this study set the purpose of developmental security measure for security threats in the aspects of military security.