• Title/Summary/Keyword: Security operation

Search Result 1,555, Processing Time 0.028 seconds

A Study on the Policy Development for Activation of Industrial Security Professional Qualifications (산업보안 전문자격 활성화를 위한 정책개발 연구)

  • Kim, Hwayoung;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.3-9
    • /
    • 2019
  • The importance of Industrial Security is continuously growing along with the rapid development of convergence technologies. Accordingly, it is expected for the gap between the supply and demand of industrial security professional personnel to grow every year. In order to reduce the supply and demand of industrial security, it is important to not only train professional qualifications but at the same time, secure a professional qualification acquisitor. In this regard, South Korea has introduced the Industrial Security Expert qualification as a non-governmental qualifications ince 2010. From 2017, promoted as nation-certified qualification and has supported activities as expert in industrials ecurity field. However, it is reality that Industrial Security Expert qualification has not yet to be recognized as professional qualification in the field of industry, have low rate of utilization as academic research is also shown the sign of stagnation. Based on these background, this research set goal in deducing a activation method for industrial security professional qualification concentrating on Industrial Security Expert qualification. The analysis on operation condition of Industrial Security Expert qualification and related precedent research was conducted and raised four types of activation method, which are organizational aspect, certification system improvement and operation aspect, certification acquisitors' utilization aspect and professionalism enhancement aspect.

Study on the improvement of mechanical security system (기계경비 취약점에 대한 개선방안 연구)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.45-52
    • /
    • 2014
  • Up to now, the security system in Korea has been developed from the human security system to more efficient mechanical security system. The mechanical security system has its advantages over the human security system in terms of economy and operation. However, as there are weaknesses in the use of mechanical security equipment such as erroneous alarm sounds, the studies have been done to improve them. This paper tries to suggest how to improve the mechanical security system based on the results of the study on the weakness of the mechanical security obtained through AHP technique.

Study on RFID Mutual Authentication Protocol Using Finite Field (유한체를 사용한 RFID 상호인증 프로토콜 연구)

  • Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.31-37
    • /
    • 2007
  • There are many investigations about the security on RFID system to protect privacy. It is important to mutual authentication of the security on RFID system. The protocol for mutual authentication use light-weight operation such as XOR operation, hash function and re-encryption. However, the protocol for authentication and privacy is required more complicated cryptography system. In this paper, we propose a mutual authentication protocol using finite field GF($2^n$) for a authentication and are a safety analysis about various attacks.

  • PDF

A Study on Confrontation a Plan of Policing Policy with the Development Globalization (세계화의 진전에 따른 치안정책의 대응방안)

  • Lee, Jin-Moon
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.251-272
    • /
    • 2000
  • Attempts have also been made to locate security in the so-called 'policingdivision of labour' In order to understand this, it is necessary to identify some of the links which exist between public police organizations and the private security sector. Such links can be divided into six types : 1) Interpersonal links, 2) Joint operations, 3) Exchange of services, 4) Granting of special powers, 5) Public bodies hiring private personnel, 6) New organizational. Van Reenen provides a useful outline of the different dimensions of future Glibalization of policing. Developments, he suggests, are likely to proceed in four directions : 1) Co-operation : at this level, the nature and powers of national police systems are not required to change, co-operation occurring between self-standing forces. 2) Horizontal integration : this arises when officers obtain authority to operate in another country, or where government officials from one country get authority over the police in another country. 3) Vertical integration : this exists when a police organization is created which can operate within the area of the EC as a whole. 4) Competition : the internationalization of policing in Europe presents itself, more and more, as a market in which different policing systems trade their products.

  • PDF

A Study on the Development of the Korean Mobilization Operations Including National Emergency Provision (한국적 비상대비 동원업무 발전방안)

  • Lee Dong-Hun
    • Journal of the military operations research society of Korea
    • /
    • v.18 no.1
    • /
    • pp.15-31
    • /
    • 1992
  • Developments toward a 'the end of the Cold War' are the main factor determining the situation in the Korean Peninsula. While all the combat resources of North Korea are systematically controlled and kept available for instant mobilization even in peacetime. South Korea is inferior to North Korea in terms of mobilization system and efficiency, exercise intensity and equipments. In sum, the South faces far greater restraints in wartime conversion capability than does the North. Mobilization refers to a nation's compulsory control, management and operation of its human and material resources for the purpose of national security. The total capability for safeguarding national security must be pursued by the continuous examination and complementation of our mobilization system and capability. This paper proposes an efficient management of national mobilization system that can be instantly operated on the whole in time of national emergency. Therefore, the actual operation of National Security Council is suggested to prepare operations against the emergencies and establish the foundation for national security.

  • PDF

The Efficient Operations of the Guard - Instructor's System in Korea (한국 경비지도사제도의 발전방안)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.131-156
    • /
    • 2002
  • Private security industry employers in Korea has not concerned with the importance of training and education by lack of recognition and has been passive about qualified guards. And the authorities supervising and the administrating the guards has not recognized the importance of private security and has neglected the training of the guards. Korea has been operated the guard-instructor system for the acquiring the specialization of the security personnel since 1997, but there has been many problems. This study reviews the guard-instructor system in Korea comprehensively and suggests the efficient operation method of that system.

  • PDF

Implementation of Instruction-Level Disassembler Based on Power Consumption Traces Using CNN (CNN을 이용한 소비 전력 파형 기반 명령어 수준 역어셈블러 구현)

  • Bae, Daehyeon;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.527-536
    • /
    • 2020
  • It has been found that an attacker can extract the secret key embedded in a security device and recover the operation instruction using power consumption traces which are some kind of side channel information. Many profiling-based side channel attacks based on a deep learning model such as MLP(Multi-Layer Perceptron) method are recently researched. In this paper, we implemented a disassembler for operation instruction set used in the micro-controller AVR XMEGA128-D4. After measuring the template traces on each instruction, we automatically made the pre-processing process and classified the operation instruction set using a deep learning model CNN. As an experimental result, we showed that all instructions are classified with 87.5% accuracy and some core instructions used frequently in device operation are with 99.6% respectively.

A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain (온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구)

  • Yoo, Dong-Young;Seo, Dong-Nam;Kim, Huy-Kang;Choi, Jin-Young
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.293-308
    • /
    • 2011
  • The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

On-Line/Off-Line Signature Schemes with Tight Security Reduction to the RSA Problem (RSA 문제와 동등한 안전성을 갖는 온라인/오프라인 서명 기법)

  • Choi, Kyung-yong;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.327-338
    • /
    • 2018
  • On-line/off-line signature is a technique for performing heavy computations required for signature generation in the off-line stage and completing the final signature by a simple operation in the online stage. This is suitable for application environments that require immediate signing responses to multiple users. In this paper, we propose two new on-line/off-line signature schemes based on RSA problem. The first technique can generate a signature with a fixed base exponentiation when signing online, and the second technique can complete an online signature with a very simple calculation such as a hash operation. The security of both signatures is based on the RSA problem, which is proven to be tightly secure without security loss in the random oracle model.