• Title/Summary/Keyword: Security and Safety

Search Result 2,133, Processing Time 0.045 seconds

Establishment of a public safety network app security system (재난안전망 앱 보안 체계 구축)

  • Baik, Nam-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1375-1380
    • /
    • 2021
  • Korea's security response to application service app is still insufficient due to the initial opening of the public safety network. Therefore, preemptive security measures are essential. In this study, we proposed to establish a 'public safety network app security system' to prevent potential vulnerabilities to the app store that distributes app in public safety network and android operating system that operate app on dedicated terminal devices. In order for an application service app to be listed on the public safety network mobile app store, a dataset of malicious and normal app is first established to extract characteristics and select the most effective AI model to perform static and dynamic analysis. According to the analysis results, 'Safety App Certificate' is certified for non-malicious app to secure reliability for listed apps. Ultimately, it minimizes the security blind spots of public safety network app. In addition, the safety of the network can be secured by supporting public safety application service of certified apps.

A Study on Integrated Airworthiness Certification Criteria for Avionics Software Safety and Security (항공소프트웨어 안전과 보안을 위한 통합 감항 인증기준 개발 연구)

  • Han, Man-Goon;Park, Tae-Kyou
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.1
    • /
    • pp.86-94
    • /
    • 2018
  • As the use of software is increasing in aircraft system, an exposure to the threat of safety and security also continues to grow. Although certification criteria for software safety such as DO-178C have already been established, specific certification criteria for software security have not yet been included. Recently DO-326A, DO-356 and DO-355 have been published separately for aircraft and system airworthiness security certification criteria. However, to comply individual certification criteria and procedures, it requires the additional cost and effort. Therefore, this paper proposes the efficient integrated certification criteria saving cost, effort and time by combining the certification criteria for software safety and security.

A study on the Safety Monitoring Theory and Application for the Human Security (인간보호를 위한 안전모니터링 이론과 적용에 관한 연구)

  • Lee, Tae Shik;Seo, Jung Pyo;Seok, Geum Cheol;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.29-36
    • /
    • 2012
  • This paper focused on the new theory and algorithm improving the citizen's safety which they experience to change from the developing country to the developed country, and analyzed the gained and applicate results, and show the theories and application's evidence for the incident prevention of citizen's life and house. The Safety Monitoring Theory for human security, show the six theories for which they are analyzed and reduced the accident's death, as is the priority of the disaster prevention activity, its decision, continuous minimization of the accident's death number, the environment security, the personal security, the community security. This study is applied to educate and exercise the disaster prevention and safety management's program which applied the seven step's model of the safety monitoring, show on continuously improvement effects through the case study of the personal's and team's monitoring during five years.

A Study on Introduction Plan of the Private Security Guard System (신변보호사(경호사) 자격제도 도입방안)

  • Kim Twe-Hwan;Park Dae-Woo
    • Journal of the Korean Society of Safety
    • /
    • v.20 no.2 s.70
    • /
    • pp.146-150
    • /
    • 2005
  • According to the current record of Private Security in Korea, more than 110,231 private security guards and around 2,213 security guard associations are engaged in the private security industries. However, there is no a professional license for the private security. In order to be provided a high quality service from private security industries, the security guard should be required his/her professional qualification which can be upgraded by establishing a professional license system. For introducing the license system the government and security guard associations need to support the suitable training program including curriculum and method, and all associations related to the private security have to require people involved in any kinds of private security matters to complete obligatorily some educational training programs. And also, to complete a college should be the minimum requirement.

A Study on Performance Evaluation and Security Measures of U-IT Electrical Safety Integrated Management System's Module (U-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dea-Woo;Choi, Choung-Moon;Kim, Eung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.307-310
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. U-City in order to prevent the disaster of U-IT Power Equipment Performance Module and the security for the safety of the U-City is necessary. In this paper, the power unit of U-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation and security measures will be studied. U-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as U-IT integrated management system for electrical safety and strengthen the security, safety and security with a U-City will contribute to the construction and operation.

  • PDF

Empirical analysis on Information Management Performance Impact of Information Security activities (정보보호 활동이 정보경영성과에 미치는 영향에 관한 실증분석)

  • Son, Tae Hyun;Park, Jung Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.3
    • /
    • pp.205-213
    • /
    • 2015
  • This study aims to verify the structural correlation empirically between information security performance and information management performance. To verify the correlation, three factors such as managerial controlled activity, technical controlled activity, and physical controlled activity are divided for the information security activities variable. the security performance are divided into accident prevention and accident response variables. As a result, security organization activity is a unique factor being positively significant to information security and management performance. And three activities such as human security, security training, development security do not affect at all on both information security and management performance.

The Impact of Organizational Information Security Climate on Employees' Information Security Participation Behavior (조직의 정보보안 분위기가 조직 구성원의 정보보안 참여 행동에 미치는 영향)

  • Park, Jaeyoung;Kim, Beomsoo
    • The Journal of Information Systems
    • /
    • v.29 no.4
    • /
    • pp.57-76
    • /
    • 2020
  • Purpose Although examining the antecedents of employees' extra-role behavior (i.e. information security participation behavior) in the information security context is significant for researchers and practitioners, most behavioral security studies have focused on employees' in-role behavior (i.e. information security policy compliance). Thus, this research addresses this gap by investigating how organizational information security climate influences information security participation behavior based on social information processing theory and Griffin and Neal's safety model. Design/methodology/approach We developed a research model by applying Griffin and Neal's safety model to the information security context and then tested our research model by conducting an online survey for employees of organizations with information security policies. Structural equation modeling (SEM) with SmartPLS 3.3.2 is used to test the corresponding hypothesis. Findings Our results show that organizational information security climate, information security knowledge, information security motivation are effective in motivating information security participation behavior. Also, we find that organizational information security climate positively influences both information security knowledge and information security motivation. Our findings emphasize the importance of organizational information security climate because it is capable of affecting employees on information security participation behavior. Our study contributes to the literature on information security by exploring the role of organizational information security climate in enhancing employees' information security participation behavior.

A Study on the Video Privacy Protective Mechanism (영상 프라이버시 보호 메커니즘에 관한 연구)

  • Kim, Minsu;Kim, Jongmin;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.49-55
    • /
    • 2017
  • In case of security of IoT-based areas in ICBM industry, the anxiety about safety goes to extremes in public and national safety area, so that the demand for security service related to disaster/safety management is increasing. Like this, as a security service for safety, CCTVs are installed/operated for the purpose of maintenance of public order and crime prevention. Especially, as the recorded images are presented as crucial evidences of crimes, they are rapidly increasing. However, as adverse effects of CCTVs, it is highly possible to unintentionally leak personal information in the process of performing the original purpose, or to violate someone's privacy in case when such technologies are abused. Therefore, it would be necessary to have researches on the multilaterally-combined mechanism for the protection of image privacy.

Digital Tourism Security System for Nepal

  • Shrestha, Deepanjal;Wenan, Tan;Khadka, Adesh;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4331-4354
    • /
    • 2020
  • Nepal is a sensitive and disaster-prone country where safety and security risk are of high concern for travelers. Digital technologies can play a vital role in addressing safety and security issues in the country. This research work proposes a Digital tourism security system design for addressing the safety and security issues in tourism industry of Nepal. The study uses Design science research methodology to identify artifacts, interactions, information flow and dependencies between them which are then mapped with existing prevalent technology to provide design solutions. Data is obtained from interview of tourist and experts as a primary source and technical documents/draft, software documentations, surveys as secondary source. Generalized information model, Use cases model, Network architecture model, Layered taxonomy model and Digital tourism technology reference model are the outcomes of the study. The work is very important as it talks specifically about implementation and integration of digital technologies in tourism security governance at federal, provincial, municipal and rural level. The research supplements as a knowledge document for design and implementation of digital tourism security system in practice. As there is very less work on digital systems in tourism security of Nepal, this work is a pioneer and first of its kind.