• Title/Summary/Keyword: Security operation

Search Result 1,546, Processing Time 0.028 seconds

Security Operation Dashboard Design by Blockade-Detection-Response (봉쇄-탐지-대응 기반 보안관제 대시보드 설계)

  • Han, Choong-Hee
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.39-47
    • /
    • 2021
  • Standardization of the security operation dashboard is essential for efficient operation of security operation center. The security operation dashboard should be configured so that it is widely used by security operation workers who have to live together 24 hours a day, 365 days a year. In addition, it must be able to comprehensively express the business activities of the security operation center. In addition, it should be possible to easily explain the business activities of the security operation center. Therefore, in this paper, we would like to explain the design of a security control dashboard based on blockade, detection, and response that is actually applied to case organizations in the power sector. Through this, it is intended to reduce the effort and time required for configuring a custom dashboard for VIPs, and contribute to the efficient operation of the security operation center.

Secure and Energy-Efficient Join-Leave Operations in ZigBee Network

  • Kim, Bong-Whan;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2874-2892
    • /
    • 2013
  • Since security plays an important role in several ZigBee applications, such as Smart Energy and medical sensor applications, ZigBee Specification includes various security mechanisms to protect ZigBee frames and infrastructure. Among them, the Join and Leave operations of ZigBee are investigated in this paper. The current Join-Leave operation is protected by the network key (a kind of group key). We claim it is not adequate to employ the network key for such purpose, and propose a new Join-Leave operation protected by the application link key (a kind of pairwise key), which is based on a more efficient key management scheme than that of ZigBee. Hence, the original Join operation consists of a total of 12 command frames, while the new Join operation consists of only 6 command frames. In particular, the security of the proposed Join-Leave operation is equivalent to or better than that of the original Join-Leave operation. The new Join-Leave operation is extensively analyzed in terms of security and efficiency, and compared with the original Join-Leave operation of ZigBee.

Optimizing method of smart card atomic operation (스마트카드 Atomic operation의 최적화 방안)

  • Jun Eun-A;Lee Jung-Youp;Ji Jae-Deok;Jung Seok-Won
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.529-532
    • /
    • 2006
  • 스마트카드의 EEPROM은 갱신, 삭제가 가능한 프로그램 및 데이터가 저장되는 저장장치로서, 호스트 환경(PC환경)의 하드디스크와 같은 역할을 한다. 스마트카드의 EEPROM에 데이터를 저장하는 과정은 먼저 EEPROM의 데이터를 지우고, 새로운 데이터를 쓰는 두 단계로 이루어져 있기 때문에 중요 데이터에 대한 무결성을 보장하기 위해서 atomic operation은 하드웨어로서 지원하지 못할 경우 반드시 소프트웨어적으로 지원되어져야한다. 스마트카드 운영체제의 Atomic operation이 수행되는 과정에서 EEPROM의 버퍼 구조의 설계는 스마트카드의 수명과 밀접한 관계가 있으며, 파일에 접근하여 데이터를 처리하는 시간에 대하여 의존도가 매우 높다. 이에 본 논문에서는 스마트카드의 atomic operation 메커니즘에 대하여 알아보고, atomic operations 메커니즘을 지원하는 EEPROM의 Capabilities 증가 구조 제안과 효율적으로 파일의 접근 속도를 최소화하는 구조를 제안 한다.

  • PDF

Improvement of Physical security System Operation (물리적 보안시스템 운용수준 분석)

  • Chung, Taehwang
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.282-286
    • /
    • 2014
  • This study is to present an improvement of physical security system operation by survey on the install and operation of physical security system of 90 facilities. The level of CCTV operation is higher than Access Control system and Intrusion Detection System. But the level of maintenance and management of physical security system is low. The rate of install of X-ray Inspection device show the concern on material detection, although the rate is low. The level of install and operation for the Integration of physical security system is low, so integration of security personnel and security system is necessary for the effective operation. For reinforcement of access control management, security gate and preparing of some obstacles are required with RFID.

UPFC Operation Strategy for Enhancement of System Security (안전도 향상을 위한 UPFC 운전 전략)

  • Lee, Dong-Woo;Ahn, Seon-Ju;Moon, Seung-Il;Yoon, J.S.;Chang, B.H.;Kim, S.Y.;Moon, S.P.
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.177-178
    • /
    • 2006
  • The enhancement of system security is one of the most important objectives of UPFC operation. To describe the system security, the index related to line flows and bus voltages are used. For the enhancement of security, the operation point of UPFC is set to minimize the index. This paper proposes the minimization algorithm using the Marquardt method. Moreover, the coefficients minimizing iteration number will be derived. For verification of the proposed operation scheme, numerical simulations have been performed on power system in Kwanju area, Korea with a UPFC.

  • PDF

Perceptions of the Relationship between Port Security Level, Resilience, Cargo Operational Performance, and Sustainability Performance among Korean Port Operators and Shipping Companies

  • Chan-Ho Kim;Sang-Gyun Choi;Sung-Ki Kim
    • Journal of Korea Trade
    • /
    • v.27 no.3
    • /
    • pp.65-86
    • /
    • 2023
  • Purpose - As globalization progresses, complexity also increases, and various factors that threaten port functions are emerging. Accordingly, the demand for port security to prevent the crisis and resilience that quickly recovers its original function after the crisis is also increasing in port operations. However, few studies have examined how to ensure the port security and how the resilience affects operation performance of port and sustainability performance as well. So the study aims to find out how port security affects port resilience and port operational performance, and consequently, this two factors affect socioeconomic and environmental sustainability performance respectively and synthetically. Design/methodology - Confirmatory Factor Analysis (CFA) was first performed to determine the validity of the factors of model and hypothesis test was performed using Structural Equation Model (SEM) to analyze the Port Performance Model, which show the perception logic among port security level, port resilience, operation performance, and sustainability performance. In order to empirically analyze this model, total 264 respondents from port security operators, shipping companies in South Korea were surveyed. Findings - As result of SEM, First, port security level positively affected the resilience (H1) and cargo operational performance (H2) but not in both of the sustainability performances (H3, H4). Second, resilience positively affected only cargo operational performance (H5) and socio-economic sustainability performance (H7). Last, cargo operation performance positively affects the both of sustainability performances (H8, H9). Originality/value - It was confirmed that port security could improve cargo operational performance through ensuring port resilience and eventually increase the socio-economic sustainability. Therefore the study implies that careful integration and management of port security, port resilience, and sustainability are required, along with compromise on sustainable development goals in the social, economic, and environmental area among all stakeholders.

A Study on The United States Secret Service (미국 대통령경호제도에 관한 고찰)

  • Jang, Ki-Boong
    • Korean Security Journal
    • /
    • no.4
    • /
    • pp.299-317
    • /
    • 2001
  • The United States Secret Service is the strongest presidential protective organization in the world. Almost every country's security organization in the world is benchmarking its organization, protective operation system, security equipments and etc. In this paper, I study largely on the protective operation system of the U.S Secret Chapter I is the introduction part. Chapter II introduces the establishment and the background of its development of the U.S Secret Service. Chapter III deals with the organization and ranking system of the U.S SS. Chapter IV consider the protective operation system of the 5.5. The main theory of the protective operation is the 'Protective Envelope Philosophy' which emphasizes the "Cover and Evacuate". Also the protective operation system is developed with the principle of the democracy and in the history of continuing assassination attempt against president. Chapter V describes the legal basis and missions of the S.S. Every protective operational mission of the U.S SS is peformed by the legal basis and democratic procedure. It is followed by concluding observation made in Chapter VI.

  • PDF

Study on the Efficient Operation of Private Security Guarding System (한국 민간경호시스템의 효율적 운영방안)

  • Kim, Tae-Min;Kim, Dong-Je
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.117-147
    • /
    • 2006
  • This study aims to propose efficient way to operate the security guarding system from the perspective of administration, policy, law, institution and operation as to the private security guarding system as the Korean security guarding system needs multifaced analysis and measure to ensure efficient operation. The growth strategy has to be restructured and segmentation market needs to be driven in order to cope with the changing conditions of company from the perspective of administration. And private security guarding service companies must refrain from excessive competition while improving the contracting method such as minimum price bidding, etc. From the perspective of policy, the functions of relevant organizations such as the National Police Agency, security association, etc, and mutual cooperation must expand. Also, the profit generation event needs to be privatized and the more positive perception toward the private security guarding service is necessary. In addition, security exhibition and seminar can be expanded to lay the groundwork for the advancement of private security system. From the legal and institutional perspective, the security guarding service related law must be revised and the certification system must b introduced to cope with the changing requirement. The security guarding instructor system must be strengthened to ensure a faithful and earnest implementation of duty to instruct, supervise and educate security guarding personnel. From the perspective of security guarding system's operation, professional security technique must be introduced and applied, and the volunteer application system must be established. In addition, standard 'security guarding manual' must be crafted, and the equipment for security guarding must be modernized to ensure an efficient operation of private security guarding services.

  • PDF

Trends of SOC & SIEM Technology for Cybersecurity (Cybersecurity를 위한 SOC & SIEM 기술의 동향)

  • Cha, ByungRae;Choi, MyeongSoo;Kang, EunJu;Park, Sun;Kim, JongWon
    • Smart Media Journal
    • /
    • v.6 no.4
    • /
    • pp.41-49
    • /
    • 2017
  • According to the occurrence of many security incidents, the SOC(Security Operation Center) and SIEM(Security Information & Event Management) are concentrated recently. The various studies and commercial products of the information security industry are being released. As reflected in this situation, NIST in the US is publishing and revising the document about the Cybersecurity Framework. In this study, we investigated the NIST's Cyberseurity Framework, trends in SOC and SIEM security technologies and solutions, and also introduce the open source Apache Metron of a real-time Bigdata security tool.

The Transmission Performance Analysis and Security Policy in Tactical Communication Environment (전술통신 환경에서 전송 성능 분석 및 보안 정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.303-309
    • /
    • 2013
  • This paper analyzed about operation environment and policy for US military tactical communication, and security policy and transmission performance of tactical link. It is presented operation communication message and framework, which is supported semi automated force, SINCGARS specification of link layer in operation environment, and analyzed COMSEC policy and application layer security in tactical security policy. Also it analyzed in respect to transmission performance and crypto synchronization detection. Security policy of tactical link and COMSEC is analyzed in respect of crypto device such as AFKDMS, AKMS, RBECS, KIV-7/HSB.