• Title/Summary/Keyword: Security major

Search Result 1,282, Processing Time 0.025 seconds

A Study on the Factors that affect the Recognition of Policy Effectiveness in the Security Management : Focused on the Hotel Employee (재난위기관리 단계에 따른 보안관리 정책의 효과성 - 호텔 종사자를 중심으로 -)

  • Lee, Sang Dong;Joo, Seong Bhin
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.33-38
    • /
    • 2016
  • The study is intended to examine awareness of safety as a differentiated service strategy and t to induce offer of more competitive services to the internal and external consumers in service industry of the South Korea. In the pursuit of this purpose, the typical occupations of the service industry targeted hotel employees and this study investigate the policy effectiveness of security management in Korea hotels. Specifically, this study was conducted by survey and involved major hotel(Seoul, Busan, Gyeongsangnam-do, Gyeongsangbuk-do) across the country. This survey went through feasibility study by major hotels managers. The results were as follows: Findings of the study suggested that most of disaster management stages did not have a statistically significant relationship with the policy effectiveness of security management. Only, repair stage have significant impact on the policy effectiveness of security management. This finding was found to be attributable to the fact that hotel employee would be concentrated in the tangible results of security management.

A Study on Change of Aviation Law and System to Aviation Security for Major Countries after 9. 11 Aviation Terror (주요국가의 항공보안 관련 법 및 제도의 변화 연구)

  • Lee, Kang-Seok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.21 no.2
    • /
    • pp.123-155
    • /
    • 2006
  • 2001. 9. 11 aviation terror showed us that there are lots of problems in aviation security and we need efficient counter-plans. According to this event, many countries are coming up with various countermeasures. After first hijacking in 1950, the aviation terror is occurring with more various methods until these days. And the scale is bigger than former so they're making much bigger damages. Especially, the case of 9.11 terror attracted people's eye of the world because of enormous casualties and damages. It aroused many people's self-awakening therefore as an important factor the security is given much weight in the aviation safety. In order to keep the step like this tendency and the development of aviation security, beginning with America lots of countries of the world are pursuing diverse aviation security's counter-plans of new side. At this point of time, for our development in aviation industry we should make efficient aviation security countermeasures. In this study, We compared our aviation security activities with major countries after 9.11 terror.

  • PDF

Analysis of Domestic and Foreign Financial Security Research Activities and Trends through Topic Modeling Analysis (토픽모델링 분석 기법을 활용한 국내외 금융보안 분야 연구동향 분석)

  • Chae, Ho-Geun;Lee, Gi-Hyun;Lee, Joo-Yeoun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.1
    • /
    • pp.83-95
    • /
    • 2021
  • In this study, major research trends at home and abroad were compared and analyzed in order to derive key research fields in the financial security field and to suggest directions. To this end, 689 domestic and 20,736 foreign data were collected from domestic and international academic journal DB, and major research fields related to financial security were extracted through LDA analysis. After that, hot & cold topics were derived through time series linear regression analysis. As a result of the analysis, studies related to government policy issues, personal information, and accredited certification were derived as promising research fields in Korea. In the case of foreign countries, related studies were drawn to develop advanced security systems such as cryptographic protocols and quantum security. Recently, it has become possible to apply various security technologies in Korea through the abolition of public certification. Accordingly, as changes in promising research fields are expected, the results of this study are expected to contribute to the establishment and development of a successful roadmap for domestic financial security.

Analysis of trends in information security using LDA topic modeling

  • Se Young Yuk;Hyun-Jong Cha;Ah Reum Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.99-107
    • /
    • 2024
  • In an environment where computer-related technologies are rapidly changing, cyber threats continue to emerge as they are advanced and diversified along with new technologies. Therefore, in this study, we would like to collect security-related news articles, conduct LDA topic modeling, and examine trends. To that end, news articles from January 2020 to August 2023 were collected and major topics were derived through LDA analysis. After that, the flow by topic was grasped and the main origin was analyzed. The analysis results show that ransomware attacks in 2021 and hacking of virtual asset exchanges in 2023 are major issues in the recent security sector. This allows you to check trends in security issues and see what research should be focused on in the future. It is also expected to be able to recognize the latest threats and support appropriate response strategies, contributing to the development of effective security measures.

An Analysis of Structural Changes on the Linux Pseudo Random Number Generator (리눅스 의사난수발생기의 구조 변화 분석)

  • Taeill Yoo;Dongyoung Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.365-378
    • /
    • 2024
  • The operating system (OS) of mobiles or embedded devices is based on the Linux kernel. These OSs request random numbers from the Linux kernel for system operation, such as encryption keys and security features. To provide random numbers reliably, the Linux kernel has a dedicated random number generator (Linux Pseudo Random Number Generator, LPRNG). Recently, LPRNG has undergone a major structural changes. However, despite the major changes, no security analysis has been published on the structure of the new LPRNG. Therefore, we analyze these structural changes as a preliminary study to utilize the security analysis of the new LPRNG. Furthermore, the differences between before and after the changes are divided into cryptographic and performance perspectives to identify elements that require security analysis. This result will help us understand the new LPRNG and serve as a base for security analysis.

A study on Merchant Ship′s Security System for the Correspondence of Maritime Security Threats (해양보안위협 대응을 위한 선박보안시스템에 관한 연구)

  • 이은방
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.9 no.1
    • /
    • pp.17-23
    • /
    • 2003
  • With the terrorist attacks on 11 September 2001, the ships and their crew' safety and security have become a major issue in the maritime industries, In high-risk terrorism, not only ship owners and port authorities but also crew members on board should take precautions in the conduct of their business. In this paper, the vulnerability and essential elements in overall security of merchant ship are analyzed with a discussion in depth of the concept and principles of maritime security of merchant ship are analyzed with a discussion in depth of the concept and principles of maritime security management. And then, ship's security model and security system to reduce security rish and to minimize damage are proposed.

  • PDF

A Study for Influencing Factors of Organizational Performance: The Perspective of the Mediating Effect of Information Security Maturity Level (조직성과에 미치는 영향요인에 관한 연구: 정보보호 성숙도의 매개효과를 중심으로)

  • Park, Jeong Kuk;Kim, Injai
    • The Journal of Information Systems
    • /
    • v.23 no.3
    • /
    • pp.99-125
    • /
    • 2014
  • Internet environment and innovative ICT(information and communication technology) have brought about big changes to our lifestyle and industrial structure. In spite of the convenience of Internet, various cyber incidents such as malicious code infection, personal information leakage, smishing(sms + phishing), and pharming have frequently occurred. Information security must be recognized as a key and compulsory element for surviving in a global economy. Strategic roles of information security have recently been increasing, but effective implementation of information security is still a major challenge to organizations. Our study examines the influencing factors of information security and investigates the causal relationship between information security maturity level and organizational performance through an empirical survey. According to the results of our study, personal, organizational, technical, and social factors affect organizations's information security maturity level altogether. This result suggests that when dealing with security issues, the holistic and multi-disciplinary approaches should be required. In addition, there is a causal relationship between information security maturity level and organizational performance, and organizations aim to establish the efficient and effective ways to enhance information security maturity level on the basis of the results of this study.

Curriculum Development Direction through Content Analysis of the safety security guard (경호·경비분야 연구의 내용분석에 따른 교육과정 개선을 위한 개발방향 탐색)

  • Park, Young-Man
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.253-272
    • /
    • 2017
  • This study analyzes the contents of 1,279 articles related to administrative, management, marketing, and service for private clients among the scholarly research results in the field of security and security, and categorizes the main topic security, private security, The results of this study are as follows. First, the main academic achievements of the security and security sciences were first identified by finding 32 subordinate or related subjects in each category. The situation of the curriculum and the environment which is insufficient compared to the needs of academia and the age was confirmed. The task of improving security and security science analyzed through this study is the expansion of education and training courses related to management and service, which are suitable for the major course of the major. And the analysis of socio-scientific disciplines and job types in the field of security and security In this study, firstly, it is necessary to develop a management and marketing measurement tool suggesting the specificity of security and security business. Second, it is necessary to reconsider learning units of management skill related to management and marketing. Third, In order to improve the curriculum of security related departments, we proposed the necessary preconditions and improvement directions.

  • PDF

Applying Security Algorithms using Authentication Against Cyber Attacks in DAS Communication Network (배전자동화 시스템 통신망에 대한 사이버 공격에 대해 인증의 기법을 이용한 보안 알고리즘 적용방안)

  • Lim, Il-Hyung;Choi, Myeon-Song;Lee, Seung-Jae;Lim, Seong-Il;Lee, Sung-Woo;Ha, Bok-Nam;Hong, Sug-Won
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.3
    • /
    • pp.327-335
    • /
    • 2008
  • As communication is becoming increasingly prevalent and especially communication architecture is more relying on the open standard communication protocols, the security issues become major concerns. In this paper we consider possible cyber attacks in the applications based on the current distribution communication architecture, and then derive the security goals. Next we propose how the security algorithms can be adapted to achieve these security goals. We intend to adapt the most efficient ways of secure message exchange, taking the resource-constrained FRTUs into account Finally we show some experiments to validate the protocols.

A Basic Study on Development of Merchant Ship's Security System in High-Risk Terrorism (고위험 테러시대 선박보안시스템 구축을 위한 기초 연구)

  • 이은방
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2003.05a
    • /
    • pp.17-22
    • /
    • 2003
  • With the terrorist attacks on 11 September 2001, the ships and their crews' safety and security have become a major issue in the maritime industries. In high-risk terrorism. not only ship owners and port authorities but also crew members on board should take precautions in the conduct of their business. In this paper, the vulnerability and essential elements in overall security of merchant ship are analyzed with a discussion in depth of the concept and principles of maritime security management. Author proposes ship's security model to reduce security risk and to minimize damage as a basic study for designing security system for merchant ship.

  • PDF