• Title/Summary/Keyword: Security efficiency

Search Result 1,621, Processing Time 0.024 seconds

A Study on Applied Orientations of Management Science Technique in Police Audit Planning Process (경찰감사 기획과정시 관리과학기법 응용방안)

  • Kim, Jeong-Heon;Song, Keon-Sup
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.109-130
    • /
    • 2002
  • As proceeding Munmin and Kukmin's government, it is to bring in regionalism of genernal public administration and police administration, specialization, efficiency issue, demand inventing of audit technique to meet this trends. Especially, according to supporting qualitative improvement of the audit, its environment faced that orienting performance audit emphasis on not the legality but the efficiency more systematic and scientific theory or technique. In order to attain police audit's efficiency through performance audit, this study discussed that scientific management techniques should be applied police audit. Accordingly, the primary purpose of this study is to apply public audit to scientific management technique, bring to light limits in public sector(especially, police sector). To be efficiency audit(namely, performance audit), 1) OR techniques are explained linear programming, network modeling, PERT/CPM, queuing matrix model, simulation, 2) Statistical analysis methods are argued delphi technique, data envelopment analysis(DEA), analytic hierarchical process(AHP), time series analysis models etc.

  • PDF

Improving the Efficiency of the EWF-file Imaging Time from a Cryptographic Perspective (암호학적 관점에서의 EWF 파일 이미징 효율성 개선 방안 연구)

  • Shin, Yonghak;Kim, Dowon;Lee, Changhoon;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.911-919
    • /
    • 2016
  • Compared to the past, the current disk storages have dramatically increased and extremely many data are transferred on the network everyday. In spite of the anticipation that such development will be continued, there have been lack of studies for improving the data-imaging time in terms of the digital forensics. In this paper, we firstly investigate the time due to hash functions during the data Imaging and secondly propose a method for improving the efficiency of the EWF-File imaging time from a cryptographic perspective.

Design of serializability Algorithm for Concurrency Control of Multi Transaction in Database (데이터베이스에서 다중 트랜잭션의 동시성 제어를 위한 직렬성 알고리즘 설계)

  • 김홍진;오상엽;김영선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.1-7
    • /
    • 2001
  • The database development is in need or transaction management composed of operations about data, efficiency database management and security of information data in necessity of as well as the new thinking about data security. When users approach data, transaction concurrency is controlled by the users security authentication and security level of data. So, existing secure algorithm occurred the problems which don't satisfy serializability of high level transaction which is delayed high level transaction repeatedly by the low level transaction, because existing secure algorithm is focused on the part which removes the security channel. Therefore this proposed algorithm which prevents waste of resource from the high level transaction reexecution and delay by stopping serializability offense problem by the increase of efficiency of concurrency control.

A Network Transport System Using Next Generation CCN Technology

  • Lee, Hyung-Su;Park, Jae-Pyo;Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.93-100
    • /
    • 2017
  • Current internet has evolved from the sharing and efficiency aspects of information, it is still vulnerable to the fact that the Internet is not secure in terms of security and is not safe to secure of security mechanism. Repeating patches on continuous hacking are continuously demanding additional resources for network or system equipment, and consequently the costs continue to increase. Businesses and individuals alike are speeding up the damage caused by crime like of ransomware, not jusy simple attacks, and businesses and individuals need to respond to cyber security. In addition, the ongoing introduce of security device, and separate of networks for secure transmission of contents in the existing TCP/IP system, but it is still lacking in security. To complement the security implications of this existing TCP/IP Internet Protocol, we intend to propose a Secure Contents Transport System (SCTS) on the network using the CCN concept.

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

Personnel Security System in the Context of Public Administration

  • Kryshtanovych, Myroslav;Dragan, Ivan;Chubinska, Nataliia;Arkhireiska, Natalia;Storozhev, Roman
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.248-254
    • /
    • 2022
  • The main purpose of the study is to analyze the main aspects of personnel security in the context of the public administration system. Today the civil service is the central link in increasing the efficiency of the public administration system. One of the most important directions of reforming the civil service is strengthening personnel security, since the level of formation and implementation of managerial decisions depends on the staff of professional employees with the necessary qualities, competencies and competencies. As a result, the main aspects of personnel security in the context of public administration were analyzed.

Guideline on Security Measures and Implementation of Power System Utilizing AI Technology (인공지능을 적용한 전력 시스템을 위한 보안 가이드라인)

  • Choi, Inji;Jang, Minhae;Choi, Moonsuk
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.4
    • /
    • pp.399-404
    • /
    • 2020
  • There are many attempts to apply AI technology to diagnose facilities or improve the work efficiency of the power industry. The emergence of new machine learning technologies, such as deep learning, is accelerating the digital transformation of the power sector. The problem is that traditional power systems face security risks when adopting state-of-the-art AI systems. This adoption has convergence characteristics and reveals new cybersecurity threats and vulnerabilities to the power system. This paper deals with the security measures and implementations of the power system using machine learning. Through building a commercial facility operations forecasting system using machine learning technology utilizing power big data, this paper identifies and addresses security vulnerabilities that must compensated to protect customer information and power system safety. Furthermore, it provides security guidelines by generalizing security measures to be considered when applying AI.

Asynchronous Key Management for Energy Efficiency over Wireless Sensor Network (유비쿼터스 센서네트워크에서 에너지효율을 고려하는 비동기적인 키관리 기법)

  • Yoon, Mi-Youn
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10C
    • /
    • pp.1011-1022
    • /
    • 2006
  • WSN(Wireless Sensor Network) performs to detect and collect environmental information for one purpose. The WSN is composed of a sink node and several sensor nodes and has a constraint in an aspect of energy consumption caused by limited battery resource. So many required mechanisms in WSN should consider the remaining energy condition. To deploy WSN, tile collected information is required to protect from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. we propose asynchronized key management considering energy efficiency over WSN. The proposed key management is focused on independence and difference of the keys used to deliver the information over several routes over the network, so disclosure of any key does not results in exposure of total key information over the overall WSN. Also, we use hash function to update key information for energy efficiency Periodically. We define the insecurity for requested security Properties and Proof that the security properties are guaranteed. Also, we evaluate and analyze the energy efficiency for the proposed mechanism.

Efficiency Evaluation Convergence Model of Virtual Private Network based on CC and ISO Standard (CC와 ISO 표준을 기반으로 한 가상사설망의 효율성 평가 융합 모델)

  • Lee, Ha-Young;Kim, Jung-Gyu
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.169-176
    • /
    • 2015
  • Virtual Private Network is a method which can use as a private network using private line. The quality of security of virtual private network is influenced by security auditability, cryptographic support, user data protection, access control, etc., and efficiency is influenced by throughput, latency, the number of cession, etc. In this paper, we constructed a evaluation model based on CC(ISO/IEC 15408) and the quality evaluation standard ISO/IEC 25000 series to evaluate the quality level about efficiency with security performance of virtual private network. We think that this study will contribute to construct the system which can evaluate the quality of virtual private network based on CC and ISO quality evaluation standard.

A Study on the Revision of Regulations to Reinforce Security for National Assembly (국회보안강화를 위한 법규개정방안에 관한 연구)

  • Kim, Doo-Hyun;Chung, Tae-Hwang;Choi, Byung-Kwon
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.7-28
    • /
    • 2011
  • This study is to propose the improvement of security related regulations to reinforce security activity and actualize constitutionalism in the National Assembly. For the purpose, some improvements could be considered as followings; First, legislating of regulations including some articles on the scope of security activity such as order preservation at assembly hall, facility security, security agents' right and protection of personal is necessary. Second, changing the organization and command system of security management is necessary for the unification of security activity and efficiency of the job. Also clear definition of terminology on the security job is need. For the shake of above object, one officer in charge of situation management and three section such as the personal protection section, facility security section and order preservation section could be substructured under security department. Third, elimination of unnecessary article on the arrest of red handed criminal in the assembly hall and on the physical checkup of audience by security agent is need. Also legislating of regulations on the hoarding of person who could disorder is necessary. Forth, legislating of regulations on the cooperation with government branch, judicial police power, carry and use of weapon and uniform and equipment to reinforce practical efficiency of security activity. For the proper legislating of the regulations, comparition with other public organizations such as presidential security Service, police, private security could be considered.

  • PDF