• Title/Summary/Keyword: Security Technology Policy

Search Result 690, Processing Time 0.023 seconds

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

Biomass Energy in the USA: A Literature Review (II) - Marketing and Policies for Green Power Production with Environmental Attributes - (미국 에너지 시장에 공급되는 바이오에너지에 관한 연구(II) - 환경친화적 녹색전기의 마케팅 및 정부지원책에 대하여 -)

  • Kim, Yeong-Suk;Gorman, Thomas
    • Journal of the Korean Wood Science and Technology
    • /
    • v.33 no.1 s.129
    • /
    • pp.97-110
    • /
    • 2005
  • This paper is the second part of a literature review describing the current status of biomass energy use in the USA. The bioenergy technologies that convert biomass resources to a form of energy were presented, in particular focused on existing coal fired boiler, high efficiency gasification combined cycle. We presented latest biomass power energy supply, economic issues such as its production and plant investment cost in the Part I. In the Part II, our review summarized policy and market issues for electricity consumers, benefits from biomass power which could offer an alternative to conventional energy sources in the form of environmental, rural economic growth, and national energy security in the USA.

A Study on the Factors Affecting Drone Use Intention -Comparative analysis of Korea and United Kingdom

  • Park, Seo Youn
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.6
    • /
    • pp.33-41
    • /
    • 2021
  • As interest in drones controlled by remote technology rapidly increases worldwide, drones are used in many fields such as military, rescue, and transportation as future innovations in many countries. In particular, as the drone has been spotlighted as a new future strategic industry, it is also used for public purposes such as disaster relief and crime investigation. However, security concerns such as the penetration of major national facilities, collisions with aircraft, and the possibility of privacy infringement due to aerial photography are also being raised. Unlike the increased interest in drones, there have been few studies on drone use, drone safety, and public attitudes toward drone use. This paper analyzed the perceptions of drone attitudes, drone stability and policy support for drones for Korean and United Kingdom.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.

A Study on the Development Factors and Development Strategies of National Crisis Management Based on Artificial Intelligence by SPRO-PEST-SWOT Analysis (SPRO-PEST-SWOT 분석에 의한 인공지능 기반의 국가위기관리정책 발전요인과 발전전략에 관한 연구)

  • Choi, Won-sang;Shin, Jin
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.169-175
    • /
    • 2021
  • In the era of the Fourth Industrial Revolution, where the concept of comprehensive security is applied, the most remarkable ICT is believed to be artificial intelligence (AI). Therefore, The purpose of this study is to explore the factors and to establish a development strategy for the development of national crisis management policies based on artificial intelligence (AI). To this end, Analyze the internal capabilities of the Korean government through SPRO analysis to derive strengths and weaknesses. And the external environment through PEST analysis to derive opportunities and threats. The various factors that have been derived through SWOT analysis to derive SWOT factors with consultation from experts who studied and worked for long-term information and communication technology (ICT), security and disaster areas. Focusing on these factors, the Korean government's development of national crisis management policies in the era of the Fourth Industrial Revolution. Focusing on these factors, the Korean government established strategies for the development of national crisis management policies and made policy suggestions during the Fourth Industrial Revolution.

An Assessment and Policy Implication of Information Technology Convergence Programs in Korean Public Service Area (공공부문 IT신기술 적용사업의 추진현황 평가와 정책적 시사점)

  • Kim, SungHyun
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.1-16
    • /
    • 2012
  • Information technology is a useful strategic weapon that can create competitive advantage and new business opportunity by applying it in the organization' value chain. IT convergence can be understood as an attempt of industrial level IT adoption to facilitate the innovation of the industry and the birth of a new industry. This study provides the comprehensive review of the Korean government' three IT assimilation programs, ubiquitous technology diffusion program of the Ministry of Knowledge Economy, u-service program of the Ministry of Public Administration and Security, and u-Defence cooperation program of the Department of Defense. The analysis is done through the interpretation of the existing literature and the logic model. The result proposes inter-agency cooperation and building of new technology road-map in the planning stage, flexible management in the execution phase, and failure tolerant evaluation system. The proposal for developing competencies and institutional foundations for IT convergence also presented.

A Study on the Method of Security Industrial Classification through the Review of Industrial Special Classification (국내산업 특수분류방법을 고려한 보안산업 분류방향 연구)

  • Shin, Eunhee;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.175-191
    • /
    • 2017
  • The basis of economic statistics for evaluating the security industry's growth and inter-industry impacts is to create a standardized industry classification along with the scope of the security industry. The industrial classification should be written in such a way that it complies with and complies with the standards of the international and domestic standardized standard industrial classifications. Representative classifications of information security, physical security, and convergence security as well as classification of products and services related to security at present are not in line with the criteria of industrial classification based on the characteristics of production activities for products. The results of the convergence security industrial classification study are also consumer-oriented classification, which differs from the supplier-centric classification officially used in statistics, law, and policy enforcement in the present country. In this study, we first summarized the criteria of Korean and international industrial classification, and then examined whether the current classification of security meets these criteria. Next, to examine the classification directions of newly formed industries such as security industry, we reviewed some cases of domestic industrial special classification and types, and proposed the industrial classification criteria and direction of the security industry on the basis of them.

A Study for New Paradigm Settlement on Business Security Management: Focus on Global Business (산업보안관리에 관한 뉴패러다임의 정립: 글로벌 비즈니스를 중심으로)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.355-386
    • /
    • 2014
  • Current business environment asks the fundamental changes about business security. The essences of these changes are that the security management of today's global business is important task of managers and the security practitioner is professional who needs very specialized education and training with business thinking. Rapid process of globalization of global village tore down the business limit that was restricted on the geological areas' limitation. Rapid business environments' change that is driving depends on development of science and technology with globalization needs new paradigm to keep business continuity. With the process of globalization, Korea, which importance is gradually increasing in the national economy, has trade dependent economic system, which keeps power of national economy through trade, so Korean economic tendency is accelerating. To keep competitiveness in global market, new strategy that is different with existing domestic business management is necessary. That is, capacity of coping with outside risk in domestic business management is established in some degree, but business activities in foreign countries faces at numerous unexpected risks that differ from country to country such as difference with the custom, changes of corporate governance etc. To cope with these new risks effectively, new paradigm for business risk is necessary. Especially, flexibility of thinking like new paradigm is necessary to cope with new security risk effectively. To cope with security risk that occurs in the new business environment effectively and competes against international company in global market, company management and members' changes of cognition about security and innovative changes in security policy is necessary. In the basement of these changes, there is expansion of business security tasks, improvement of report line, enhancement of professionalism and status of security officers, variation of hands-on workers and increasing of investment to the security etc.

  • PDF

Quality Evaluation Model for Security of DRM Software (DRM 소프트웨어의 보안성 품질평가 모델)

  • Lee, Ha-Young;Kim, Jung-Gyu
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.1-11
    • /
    • 2013
  • To make the DRM technology protect adequately the copy right of digital contents, DRM software should have high quality and no defects when DRM is added to digital contents. It can be a basis for the effective protection of the copyright of digital contents to develop a quality evaluation model of DRM SW. First of all, the security of DRM SW is the most critical quality characteristic that DRM software must have. In this paper, we conducted research on how to measure the quality of security of DRM SW.

An Entity Attribute-Based Access Control Model in Cloud Environment (클라우드 환경에서 개체 속성 기반 접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.32-39
    • /
    • 2020
  • In the large-scale infrastructure of cloud environment, illegal access rights are frequently caused by sharing applications and devices, so in order to actively respond to such attacks, a strengthened access control system is required to prepare for each situation. We proposed an entity attribute-based access control(EABAC) model based on security level and relation concept. This model has enhanced access control characteristics that give integrity and confidentiality to subjects and objects, and can provide different services to the same role. It has flexibility in authority management by assigning roles and rights to contexts, which are relations and context related to services. In addition, we have shown application cases of this model in multi service environment such as university.