• Title/Summary/Keyword: Security budget management

Search Result 94, Processing Time 0.019 seconds

A Study on Establishment of Small and Medium Business Information Security Plan under Resource Restrictions (자원 제약하의 중소기업 정보보안계획 수립방안 연구)

  • Kwon, Jang-Kee;Kim, kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.119-124
    • /
    • 2017
  • Information is a valuable asset regardless of the size of the enterprise and information security is an essential element for the survival and prosperity of the enterprise. However, in the case of large corporations, Security is ensured through rapid introduction of information security management system. but In the case of SMEs, security systems are not built or construction is delayed due to complex factors such as budget constraints, insufficient security guidelines, lack of security awareness. In this paper, we analyze the actual situation of information security management of SMEs through questionnaires, and We would like to suggest a comprehensive security plan for SMEs in free or inexpensive ways. We believe that by applying the method presented in this paper, SMEs will be able to implement the lowest cost basic information security and will benefit SMEs who plan to establish an information security plan.

A Study on the Effective Countermeasures for Preventing Computer Security Incidents (기업의 침해사고 예방을 위한 관리 모델)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.107-115
    • /
    • 2012
  • The level of information protection is relatively low, in comparison with the informatisation in this country. The budget for information protection is also quite marginal at 5% of the entire information-related policy budget. The passive information protection practices by companies, which focus more on the aftermaths, lead to repeated expenses for risk management. The responses to the violation of information protection should be changed from the current aftermaths-oriented focus to prevention and early detection of possible violations. We should also realize that the response to a violation of protected information is not a responsibility of an individual but a joint responsibility of the nation and the industry. South Korea has been working towards to building a systematic foundation since 2004 when guidelines were announced regarding the information protection policy and the safety diagnosis. The current level of safety policies cannot provide a perfect protection against actual violation cases in administrative, technological and physical ways. This research evaluates the level of prevention that the current systematic protection policy offers, and discusses its limitation and possible ways for improvement. It also recommends a list effective measures for protection against information violation that companies can employ to maintain the actual target safety level.

A Comparative Study on Information Security Management Activity of Public Sector in USA & Korea (미국과 우리나라의 정보보안관리 활동 비교연구)

  • Kim So-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.69-74
    • /
    • 2006
  • USA is strengthening the information sanity by managing federal agency's information and information system systematically. For this purpose, US government put the Federal Information Security Management Act into the E-Government Act of 2002. According to the FISMA, it is required to have information security management plan for ail federal agencies. In addition that, Inspector Generals of these agencies should assess the status of their agency and report the result to the office of Management and Budget. Collecting all the reports from each agency, OMB should report to GAO on general status of information security of federal agency. It is helpful to provoke the information security as a necessary activity to realize the E-government. Comparing these efforts with our system will give us good implications to get more idea to secure our information system.

An Anti-Virus Vaccine Selection Model Based on Stackelberg Game (슈타켈버그 게임 기반 Anti-virus 백신 선택 모형)

  • Sung, Si-Il;Choi, In-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.135-144
    • /
    • 2009
  • This paper deals with an information security problem that involves the strategies of both an attacker and an administrator of a web-based system. A game-theoretic model for the problem, based on an Stackelberg game environment, is presented. In the model, the administrator selects a set of anti-virus vaccines to cope with potential system attackers and the intruder chooses attacking modes that are most effective against the administrator's chosen set of vaccines. Moreover, the model considers a number of practical constraints, such as a budget limit on the vaccine purchase and a limit on the system performance. In addition, two different scenario analyses are provided, based on the results of the proposed model applied to a simulated pseudo-real-world data.

Evaluation the Childcarer(IDOLBOMI) Demonstration Service and Policy Direction (아이돌보미 시범사업평가 및 정책방향)

  • Byun, Mi-Hee;Kang, Ki-Jung;Chung, Hee-Jung
    • Journal of Family Resource Management and Policy Review
    • /
    • v.11 no.2
    • /
    • pp.67-83
    • /
    • 2007
  • The purpose of this study was to evaluate the childcare support demonstration services and direct policy. The participants for the study were three childcare (IDOLBOMI), three parents who were provided with IDOLBOMI, two practitioners, and three professors related to IDOLBOMI. The data was collected by interview and a phone survey and analyzed qualitatively. The results and several suggestions were follows: First, IDOLBOMI loved to take care of children, felt proud of the job, and thought the work was worthy. The result can help future IDOLBOMI when they are recruited and trained; Second, IDOLBOMI wanted income security at least, which means that the basic activity fee for the IDOLBOMI should be compensated by government; Third, most of the parents who experienced the service were generally satisfied with that, but they wanted the quality of nutrition, hygiene and the quality of play to be developed for children. Therefore, the management of the center and maintenance of education are needed constantly for the IDOLBOMI system; Fourth, the parents who needed the service thought the cost of IDOLBOMI was expensive. Expenditure support should be sought for the parents; Finally, the group of professionals had difficulty in securing the quality of childcare support services. For the future, it is necessary to increase the educational budget, manpower resources, and PR budget for IDOLBOMI.

  • PDF

A Study on The Leak of Core Business Technologies Using Preventative Security Methods Such as Clustering (군집화를 이용한 기업 핵심기술 유출자 분류에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.23-28
    • /
    • 2010
  • Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and invesment companies. This shows that the source of the leaks are internal personnel. In this manner, we can infer that the management and plan of personnel security has not implemented sound practices to prevent technology leak by people. Therefore, this thesis suggests classifying methods of technology leak through clustering, one of the data mining methods about the information of internal personnel to prevent core technology leak from businesses.

Efficiency Analysis of Government Budget to HRD Program in the field of Information Technology : IT Research Center Case (정보통신분야 HRD사업에 대한 정부예산 지원의 효율성 분석 : 대학의 IT연구센터를 중심으로)

  • Lee, Jung-Mann;Cheon, Won-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.55-62
    • /
    • 2012
  • This paper analyze the DEA(Data Envelopment Analysis) efficiency of government budget to HRD program(ITRC) and correlation and regression between its inputs and outputs in the field of information technology. First, empirical results show that the relationship between the supporting period of government budget and scientific research & HRD outputs is respectively irrelevant. Second, another finding is that the relationship between government budget and HRD output is positive. Finally, DEA efficiency analysis implicates that SW/digital contents, digital TV, information security, intelligence robot, next generation PC, next generation mobile telecommunication, home network, mathematics, IT SoC are more efficient than any other technology fields.

A Study on the Relationship between the Spatial Cluster Patterns of Male Suicide Rate and the Regional Characteristics in South Korea (남성 자살률의 공간 군집패턴 변화와 지역특성요인의 관계 분석)

  • Choi, Soyoung;Lee, Kwang-Soo
    • Health Policy and Management
    • /
    • v.29 no.3
    • /
    • pp.312-322
    • /
    • 2019
  • Background: Since 2003, Korea has consistently shown the highest suicide rate among the Organization for Economic Cooperation and Development countries, and suicide remains the major cause of death. In particular, men are 2-3 times more likely to commit suicide than women, which called the 'gender paradox of suicide.' The areas with frequent suicide have spatially clustered patterns because suicide with a social contagion spreads around the neighborhood. The purpose of this study was twofold. The first was to estimate the hotspot areas of age-standardized male suicide mortality from 2008 to 2015. The second was to analyze the relationship between the hotspot areas and the regional characteristics for study years. Methods: The data was collected through the Korean Statistical Information Service. The study areas were 227 si gun gu administrative districts in Korea. The hotspot area was used as a dependent variable. Socio-demographic variables (number of marriages per 1,000 population, number of divorces per 1,000 population, and urbanization rate), financial variables (financial independence and social security budget), and health behaviors (EuroQol-5 dimension [EQ-5D], and depression experience rate) were used as independents variables. Results: The hotspot areas were commonly located in Gangwon-do, Chungcheongnam-do, Gyeongsangbuk-do, and Chungceongbuk-do. According to the results of panel logit regression, the number of divorces per 1,000 population, social security budget, and EQ-5D were statistically significant variables. Conclusion: The results of hotspot analysis showed the need for establishing a prevention zone of suicide using hotspot areas. Also, medical resources could be considered to be preferentially placed in the prevention zone of suicide. This study could be used as basic data for health policymakers to establish a suicide-related policy.

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies (공공기관 정보보호 거버넌스 수준에 영향을 미치는 요인에 관한 연구)

  • Song, Jeong-Seok;Jeon, Min-Jun;Choi, Myeong-Gil
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.133-151
    • /
    • 2011
  • To solidate information security, Korea government introduces information security governance. The public institutions and agencies in korea have begun to recognize the importance of information security governance. For solidating information security governance, the government has tried to establish and solidate an information security policy and information security systems. This study suggests factors affecting the level of information security governance in the public agencies and institutions through the factor analysis and the linear regression analysis. The results of this study show that the CEO's support is able to elevate the level of information security governance. The level of information security governance has relation with the number of the staff in information departments, and the budget in the public agencies and the institutions. This study provides directions for the public agencies and the institution for elevating the levels of information security governance.