• Title/Summary/Keyword: Security agencies

Search Result 241, Processing Time 0.031 seconds

A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies (공공기관 정보보호 거버넌스 수준에 영향을 미치는 요인에 관한 연구)

  • Song, Jeong-Seok;Jeon, Min-Jun;Choi, Myeong-Gil
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.133-151
    • /
    • 2011
  • To solidate information security, Korea government introduces information security governance. The public institutions and agencies in korea have begun to recognize the importance of information security governance. For solidating information security governance, the government has tried to establish and solidate an information security policy and information security systems. This study suggests factors affecting the level of information security governance in the public agencies and institutions through the factor analysis and the linear regression analysis. The results of this study show that the CEO's support is able to elevate the level of information security governance. The level of information security governance has relation with the number of the staff in information departments, and the budget in the public agencies and the institutions. This study provides directions for the public agencies and the institution for elevating the levels of information security governance.

A Comparative study of Korea and US Intelligence Systems: Focusing on Environment, Intelligence Organizations and Activities (한국과 미국의 정보체계 비교연구 - 환경, 정보조직 및 활동을 중심으로 -)

  • Seok, Jaewang
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.107-135
    • /
    • 2019
  • The purpose of this paper is to compare and analyze the similarities and differences between the security environment, information organization and information activities of Korea and the United States. The comparison will provide insight into Korea and other national intelligence agencies, as well as methodological advances in information research, by providing insight into the overall information and a broad understanding As the history, culture and national power of Korea and the U.S. are different, the organization and activities of intelligence agencies are also different. First of all, in terms of environment, the U.S. carries out intelligence activities for national interest and security in a wide range of areas ranging from North American continental countries to South America, the Middle East, Asia and Asia, while South Korea's intelligence activities are mainly aimed at North Korea and neighboring countries around the Korean Peninsula. In terms of information organization, U.S. intelligence agencies are separate, whereas domestic and foreign intelligence agencies are separate, whereas Korean intelligence agencies are a type of integrated intelligence agency that combines information and investigation, unlike the U.S. In the U.S., the U.S. also operates as an intelligence community, and there are many flexible organizations such as non-tier organizations and centers. Intelligence activities by U.S. intelligence agencies are mainly focused on analysis and overseas processing activities, while Korean intelligence agencies still account for a large portion of domestic information activities. Despite these differences, Korea's intelligence agency was created by imitating U.S. intelligence agencies, and thus has similar aspects in terms of evaluation of security, organization and activities. However, this similarity is shared by all intelligence agencies, so the article will focus on analyzing differences. Finally, for the development of Korean intelligence agencies, the establishment of an intelligence community and efficient control of the National Assembly will be proposed.

A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority (입법기관의 보안강화를 위한 Cloud 네트워크 분석 및 보안 시스템 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1320-1326
    • /
    • 2011
  • National institutions on the importance of information security is being recognized, information security laws are being discussed in Congress 3.4 DDoS incident and Nonghyup hacking, etc. However, National Assembly Secretariat when the results of the Information Security Consulting has been assessed very low 61.2 points, evaluation of hardware and software in secure areas were vulnerable. This paper, the legislative support agencies National Assembly and National Assembly Secretariat on the network and computer systems, and managerial, technical and physical security elements are analyzed for the status. And network should have the legislative support agencies and system for the physical network separation, DDoS attack response, Virus attack response, hacking attacks response, and Cyber Emergency Response Team/Coordination Center for Cyber infringing design and research through the confidentiality, integrity, availability, access control, authentication and security analysis is based on the evaluation criteria. Through this study, the legislative support agencies to strengthen the security of data and security laws enacted to provide the basis for.

Study on the Security Officials in the Study of the Working Environment and Education (경호공무원의 근무환경과 교육에 관한 연구)

  • Jo, Sung-Gu;Kim, Dong-Je;Choi, Jong-Gwang;Park, Ju-Hyeon
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.247-268
    • /
    • 2013
  • Country is security agencies with the launch of the Park Chung Hee government president security service act was enacted since installed successfully now undergoing a large-scale international events reborn professional Security agencies, including the North and the Northeast, but the conflict continues because of the national reduce the threat to the security without a destination. However countermeasures against these threats is emphasized, but in an effort to raise the country is security officials security agencies working environment and training for these studies have not performed in this study was started. In order to achieve this purpose, president security service and the seoul police agency personnel working in the field for 45 people who were interviewed, recently developed by utilizing Nvivo 8 program to improve working conditions in the analysis of organizational culture 51(78.46%), Image 7(10.93%), physical and mental 6(9.37%) were categorized, educational institutions in the direction of a police constable 56(76.71%), educational psychology 12(16.43%), theory of education 5(6.84%) were categorized as high. We look at the research results suggest that the authority of the president security service president security service officials in tissue culture officials were struggling to belong to an organization, you need to induce a change in culture has been raised, the current president of the Security Service, as well as specialized police constable training within the organization establish the necessary institutions respectively.

  • PDF

A Design and Implementation of Information Security Management and Audit System for Government Agencies (공공기관의 정보보호관리체계 감사시스템의 설계 및 구현)

  • Jun, Yong-Joon;Cho, Gi-Hwan;Kim, Won-Kyu
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.81-93
    • /
    • 2006
  • Recently, information technology is considered as a basement of management for industries as well as administrations. Especially, government agencies deal with more high sensitive and Important data than other businesses, so, their security managements should be fair and efficient. At present, most government agencies possess and operate their own information security systems, but apply them for the sake of formality only, even do not adapt an audit system for management polices. This paper presents a design and implementation of an automated audit system which is suitable for the operation environment in government agencies, using the audit system based on the BS7799. The. proposed system aims to objectively, numerically and daily control the ISMS (Information Security Management System) for different level of government agencies. In addition, it permits to design and implement an adaptive audit tool, in order to meet a given condition of audit organization and guard the personal relationship between the auditor and its counterpart.

  • PDF

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

Prediction of the Problems from Domestic Introduction of FISMA (FISMA의 국내 도입에 따른 문제점 예측)

  • Kim, Sangkyun
    • Journal of Industrial Technology
    • /
    • v.31 no.A
    • /
    • pp.113-118
    • /
    • 2011
  • Federal Information Security Management Act emphasizes the importance of information security to the economic and national security interests of the United States. This paper provides a brief review on FISMA which is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002, and predicts the possible problems which might be caused from domestic introduction of FISMA. The domestic introduction of FISMA could improve the average level of information security of government agencies. Whereas, the government agencies and the government officials might face with many problems such as the increased government budget, lack of social awareness and security professionals, and the effectiveness of penalty on non-compliance.

  • PDF

How Do We Manage the Information Security Workforce of the Administrative Agencies? (행정기관의 정보보호 담당인력을 어떻게 관리할 것인가?)

  • Jun, Hyo-Jung;Kim, Tae-Sung;Park, Ki Tae
    • Journal of Information Technology Services
    • /
    • v.18 no.4
    • /
    • pp.55-66
    • /
    • 2019
  • The career development of information security workforce affiliated in administrative department is very different from workforce affiliated in private companies. Their career development attempts are made not by voluntary motivation but by involuntary job movement by the principle of internal relocation. So they are not directly linked to monetary compensation or advancement. Due to the nature of the organization, their work attitude is very passive and there is little intention to turnover. They do not need professionalism, but they must be retrained according to the law. In this paper, we investigate and analyze the roles and responsibilities of information security workforce of each administrative department. And we do questionnaire survey to find out current roles and responsibilities of them will not affect the demand for retraining. Through these research, we would like to discuss how to manage information security workforce affiliated in administrative departments.

Issues and Preventions of Insider Information Leakages in Public Agencies for National Security: Cyber Security and Criminal Justice Perspectives (국가안보를 위한 공공기관의 내부자 정보 유출 예방대책: 사이버 안보·형사정책 관점)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.167-172
    • /
    • 2016
  • The purpose of this study is to provide implications for preventing insider information leakages in public agencies for national security. First, the study examined the definitions and current usage of information security systems of public agencies were examined. Second, web-service base information leaks and malware-base information leaks were discussed and three major credit card companies' personal information leakage cases were analyzed. Based on the analysis, four solutions were provided. First, information leakages can be protected by using web filtering solutions based on the user, which make possible to limit frequencies of malware exposures. Second, vaccine programs and vaccine management system should be implemented to prevent information leakages by malware. Third, limit the use of portable devices within local networks to prevent information leakages and vaccines programs for malware should be regularly used. Forth, to prevent information leakages by smartphone malwares, data encryption application should be used to encrypt important information.

A Study on Security Police against Problem of Using Secure USB according to National Assembly Network Separation (국회 네트워크 분리에 따른 보안 USB 메모리의 사용 문제점 및 보안 대책 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.471-474
    • /
    • 2012
  • The administration of government agencies and Law enforcement agencies is utilize. that network separation and Establish CERT for network security. However, the legislature has a basic security system. so a lot of relative vulnerability. In this paper, study for security National Assembly and the National Assembly Secretariat, at Library of National Assembly on legislative National Assembly for information security and network configuration, network and external Internet networks is to divide the internal affairs. Network separation in accordance with the movement of materials to use secure USB memory, the user has the uncomfortable issues. Problem analysis and security vulnerabilities on the use of USB memory is study the problem. User efficiency and enhance security.

  • PDF