• Title/Summary/Keyword: Security service

Search Result 3,741, Processing Time 0.028 seconds

Introduction to IPSEC(Internet Protocol Security) (인터넷 보안 프로토콜 IPSEC)

  • Choi, Y.B.;Hwang, S.O.;Lee, J.S.;Yoon, K.S.;Kim, M.J.
    • Electronics and Telecommunications Trends
    • /
    • v.14 no.6 s.60
    • /
    • pp.51-63
    • /
    • 1999
  • IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security among hosts rather than users unlike the other security protocols. Recently, IPSEC is emphasized as one of the important security infrastructures in the NGI (Next Generation Internet). It also has suitable features to implement VPN (Virtual Private Network) efficiently and its application areas are expected to grow rapidly. In this paper, the basic concepts and related standard documents of IPSEC will be introduced.

Study for academic establishment of phase of Department of Security Service (경호학의 학문적 위상정립을 위한 고찰)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.197-205
    • /
    • 2013
  • Security Service is the study for social safety and maintenance of order. Compared with the industrial circle, it has only been 18 years, though, many-sided scholars have been interested in this field and tried. The present Security Service, however, has several problems, so it is difficult to gain recognition as the value of learning. To achieve this, several kinds of prior tasks should get solved. First, Preparation for agreement between Industry and University about the academic concept and establishment of range. Second, Set up the School Register System for the academic establishment of identity. Third, Preparation of the plan for the organization of education system. Fourth, Study Direction different from the industrial world. (Unconcern) Therefore, the alternatives centered on some prior tasks will be suggested to enhance the identity and value of Security Service as the study.

A Study for the Perception of Job Identity, Public Service Motivation and Organizational Committment focusing on Airport Security Agents (고용형태에 따른 직무정체성, 공직봉사동기 및 조직충성도에 대한 연구 : 공항 특수경비원들의 인식을 중심으로)

  • Park, Sung-Sik;Cho, Sung-Hwan;Kim, Kwang-Ok;Jung, Ju-Yong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.4
    • /
    • pp.31-43
    • /
    • 2017
  • Airport security staff are outsourced workers, whose status is a special security agent under the security service law in Republic of Korea, who are subject to persuing both profitability and public concern at the same time. This paper has chosen the sample of security staff working at Incheon airport. This is because airport security staff is being outsourced, this paper had made an empirical research such areas as the perception of job identity, public service motivation and organizational commitment through job satisfaction. According to statistical research, it was found the perception on job identity by airport security staff had a significant negative effect on both job satisfaction and organizational commitment. The more they have perceived their status as non-permanent status, the less they had job satisfaction and commitment at the same time as a special security agent at airport. Their perception of job identity had a significant effect on such public service motivation factors as 'absorbing public concern' and 'a solicitude'. Lastly, their motivation factors had also significant positive effect on job satisfaction and organizational commitment.

An Empirical Approach to the Influence of IT Assets and Information Security Service on Information Security Quality and Satisfaction (IT자산과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Gwon, Sun-Jae;Lee, Geon-Chang;Kim, Chang-Hyeon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.467-481
    • /
    • 2006
  • In the era of the Internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security qualty positively, leading to users' satisfaction eventually To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets and Information Security Service influence informations security quality positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets and Information Security Service helped great improve the information security quality and user satisfaction.

  • PDF

A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services (신규 IT 서비스에 대한 정보보호 등급 인증 타당성 연구)

  • Chang, Hang Bae;Joe, Tae Hee;Kim, Hyo Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.113-119
    • /
    • 2009
  • In this study we analyzed and gauged the information security needs for the new IT service which will be proceeding. Then we designed Information Security Rank Authentication System to raise the level of information security. To achieve this study, we analyzed rank authentication system of the inside and outside of the country and developed the practical propulsive system and the evaluation model which reflects IT service's own feature differing from the general evaluation of IS information security. The result of this study can be utilized to assess the level of domestic IT service information security objectively, and it can be applied as the means of rational decisionmaking for establishing a policy to raise degree of information security of corporations providing IT service.

  • PDF

Status and Future of Security Techniques in the Internet Banking Service (인터넷 뱅킹 서비스 보안기술의 현황과 미래)

  • Lee, Kyungroul;Yim, Kangbin;Seo, Jungtaek
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.31-42
    • /
    • 2017
  • As Internet banking service became popular, many users can exchange goods by online. Even though this advantage, there are incident cases in the Internet banking service due to security threats. In order to counteract this problem, various security techniques have been applied over whole area in the Internet banking service. Therefore, we described that analyzed results of security techniques applied in the financial institutions area and network communication area in this paper. We consider that this paper will be useful as a reference to protect security threats occurred by insiders and vulnerabilities in implementation.

A Security Reference Model for the Construction of Mobile Banking Services based on Smart Phones

  • Shin, Yong-Nyuo;Shin, Woo-Chang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.229-237
    • /
    • 2011
  • As smart phones have become widely adopted, they have brought about changes in individual lifestyles, as well as significant changes in the industry. As the mobile technology of smart phones has become associated with all areas of industry, it is not only accelerating innovation in other industries such as shopping, healthcare service, education, and finance, but is also creating new markets and business opportunities. The preparation of thorough security measures for smart phones is increasing in demand. While offering excellent mobility and convenience, smart phones can be exposed to a range of violation threats. In particular, it is necessary to make efforts to develop a security system that can preemptively cope with potential security threats in the banking service area, which requires a high level of reliability. This paper suggests a security reference model that is considered for the smart phone-based joint mobile banking development project being undertaken by the Bank of Korea in 2010. The purpose of this study is to make a security reference model for a reliable smart phone-based mobile financial service, by recognizing the specific security threats directed toward smart phones, and providing countermeasures to these security threats. The proposed mobile banking security reference model is useful in improving system security by systematically analyzing information security threats to the mobile financial service, and by presenting the guideline for the preparation of countermeasures.

The Security Life Cycler Energy Service Platform for Universal Middleware (유니버설미들웨어기반 생명주기 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1197-1202
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support start, stop and updating of the security module by applying the security policy module layer concept. It is modular system enabling to design of dyanmic models in the smart grid, the service was intended to be standardized and applied to the security service platform.

A Study on the Key Distribution Protocol for Secure P2P information Security Service (안전한 P2P 정보보호 서비스를 위한 키 분배 프로토콜에 관한 연구)

  • Lee, Jun Seok
    • Journal of Industrial Convergence
    • /
    • v.6 no.1
    • /
    • pp.57-72
    • /
    • 2008
  • In this study, general outline of P2P(peer to peer) application was analyzed dealing with security attacks and threats on the P2P environment. Information security service was studied to provide secure P2P service under the information threats. This study proposes two methods to provide secure information security service. One is a method to use personal firewall software on the peer. The other is a method to use key distribution protocol for confidentiality and integrity.

  • PDF

Development of S-SLA based on the Analyses of Security Functions for Anti-virus System (안티바이러스 시스템 보안기능 분석을 통한 보안SLA 등급화 지표 개발)

  • Yi, Wan-Suck;Lee, Dong-Bum;Won, Dong-Ho;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.237-249
    • /
    • 2010
  • If one analyzes recent cyber incidents including personal information infringement cases, it seems like actual attack is targeting Internet service providers but actually they are targeting Internet service users. For many users, all the services were not provided to them as they have signed for in the contract or personal informations, which users have provided to service providers when signing contracts, were disclosed to public without users' consent causing aftereffect. As a result, importance of S-SLA indexes, which is to be included in the SLA to be signed between a user and a service provider, is ever more increasing. Especially, if there is a S-SLA indexes for anti-virus services, service providers have to provide a high quality of service as they have signed in the SLA. However, there wasn't any researches in the S-SLA area domestically and there are only limited SLA indexes related to system or service maintenances at the moment. Therefore, this paper analyses security functions in anti-virus services and proposes S-SLA indexes for different security level.