• Title/Summary/Keyword: Security strategy

Search Result 984, Processing Time 0.031 seconds

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

A Study of The ROK's Defense Exporting Strategies (한국의 방산수출 전략 연구)

  • Lee, Pil-Jung
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.141-190
    • /
    • 2011
  • Defense industry as 'a new dynamics of economic growth' policy implies driving policy of defense products' export. The purpose of this study is to suggest suitable strategies to meet with such policy in terms of region and individual nation. The strategies towards advanced region are joint sale strategy for the third countries, extension strategy of trade-off and development strategy of products to exploit niche markets. The strategies towards non-advanced regions are package strategy including exchange of economic development know-how, strengthening strategy of relationships to leading groups in national decision-making processes, exploit strategy of sales market through transfer discard and surplus equipments to other nations, government to government sale strategy towards countries holding low leveled equipment maintaining and management abilities. Finally, successive strategies require leaders' will, active sales diplomacy and active international cooperations of defense industry.

  • PDF

Business Strategies for Korean Private Security-Guard Companies Utilizing Resource-based Theory and AHP Method (자원기반 이론과 AHP 방법을 활용한 민간 경호경비 기업의 전략 연구)

  • Kim, Heung-Ki;Lee, Jong-Won
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.177-200
    • /
    • 2013
  • As we enter a high industrial society that widens the gap between the rich and poor, demand for the security services has grown explosively. With the growth in quantitative expansion of security services, people have also placed increased requirements on more sophisticated and diversified security services. Consequently, market outlook for private security services industry is positive. However, Korea's private security services companies are experiencing difficulties in finding a direction to capture this new market opportunity due to their small sizes and lack of management-strategic thinking skills. Therefore, we intend to offer a direction of development for our private security services industry using a management-strategy theory and the Analytic Hierarchy Process(AHP), a structured decision-making method. A resource-based theory is one of the important management strategy theories. It explains that a company's overall performance is primarily determined by its competitive resources. Using this theory, we could analyze a company's unique resources and core competencies and set a strategic direction for the company accordingly. The usefulness and validity of this theory has been demonstrated as it has often been subject to empirical verification since 1990s. Based on this theory, we outlined a set of basic procedures to establish a management strategy for the private security services companies. We also used the AHP method to identify competitive resources, core competencies, and strategies from private security services companies in contrast with public companies. The AHP method is a technique that can be used in the decision making process by quantifying experts' knowledge and unstructured problems. This is a verified method that has been used in the management decision making in the corporate environment as well as for the various academic studies. In order to perform this method, we gathered data from 11 experts from academic, industrial, and research sectors and drew distinctive resources, competencies, and strategic direction for private security services companies vis-a-vis public organizations. Through this process, we came to the conclusion that private security services companies generally have intangible resources as their distinctive resources compared with public organization. Among those intangible resources, relational resources, customer information, and technologies were analyzed as important. In contrast, tangible resources such as equipment, funds, distribution channels are found to be relatively scarce. We also found the competencies in sales and marketing and new product development as core competencies. We chose a concentration strategy focusing on a particular market segment as a strategic direction considering these resources and competencies of private security services companies. A concentration strategy is the right fit for smaller companies as a strategy to allow them to focus all of their efforts on target customers in a single segment. Thus, private security services companies would face the important tasks such as developing a new market and appropriate products for such market segment and continuing marketing activities to manage their customers. Additionally, continuous recruitment is required to facilitate the effective use of human resources in order to strengthen their marketing competency in a long term.

  • PDF

India's Maritime-Security Strategy: Pretext, Context and Subtext (인도의 해상 안보 전략: 구실, 맥락 및 숨은 의미)

  • Khurana, Gurpreet S
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.1-56
    • /
    • 2022
  • Why has India become a key actor in the maritime-configured Indo-Pacific region? There are some external factors, but for India, its geo-strategic frontier encompassing its geopolitical and maritime interests is expanding rapidly beyond its territorial space across both the Indian and Pacific oceans amidst an increasingly arduous geopolitical and security environment. India must, therefore, acquire the ability to influence events within this strategic arena using all facets of national power, including maritime-military power. Lately, therefore, New Delhi has invested much intellectual capital to review its maritime-security strategy. India's new strategy is premised on the concept of holistic security involving the 'softer' aspects of maritime-security, and a rekindling of maritime consciousness in India, a nation that has traditionally been beset by 'sea-blindness'. The strategy adopts a region-wide, inclusive, and a more proactive approach than hitherto, as is evident in its title 'Ensuring Secure Seas: Indian Maritime Security Strategy'. While it deals with the growing concern of new non-traditional threats in the Indian littoral and the need for military deterrence and preparedness, it also addresses the imperatives for India to seek a favorable and rules-based benign environment in its immediate and extended maritime periphery, including through multi-vectored strategic partnerships dictated by its enduring principle of strategic autonomy. For a more profound and comprehensive understanding of India's maritime-security strategy, this paper examines the key unstated and implicit factors that underpin the strategy. These include India's historical and cultural evolution as a nation; its strategic geography; its geopolitical and security perceptions; and the political directions to its security forces. The paper deals specifically with India's response to maritime threats ranging from natural disasters, crime and state-sponsored terrorism to those posed by Pakistan and China, as well as the Indian Navy's envisaged security role East of the Malacca Straits. It also analyzes the aspects of organizational restructuring and force planning of India's maritime-security forces.

  • PDF

China's recent establishment of its ADIZ and its implications for regional security (중국의 방공식별구역(ADIZ) 선포와 역내 안보적 함의)

  • SHIN, Chang-Hoon
    • Strategy21
    • /
    • s.33
    • /
    • pp.148-177
    • /
    • 2014
  • The regional security and stability in Northeast Asia has become more complicated because of a sudden establishment of China's Air Defense Identification Zone (ADIZ) on 23 November 2013. One dimensional conflicts on the territorial sovereignty over the islands between the regional States has developed into the two dimensional conflicts like maritime delimitations among the States concerned since they have all ratified the 1982 United Nations Convention on the Law of the Sea which adopts the 200 nautical mile Exclusive Economic Zone regime. Moreover, due to the notion of the outer limit of the continental shelf, the conflicts have developed into three dimensional ones in order to acquire more natural resources even in the seabed. To make matters worse, such three dimensional conflicts have expanded to the airspace as well. The paper will analyze what implications the sudden declaration of China's ADIZ have for the regional security in Northeast Asia from the perspectives of public international law. To this end, the paper 1) starts with the debates on the legal nature of the ADIZ, 2) identifies the Chinese government's political motives for the establishment of the ADIZ over the East China Sea, 3) assesses the responses of the regional States and the USA to the China's establishment of the ADIZ, and then 4) discuss what implications the overlapped ADIZ of the three key States in the region have for the regional security and stability.

Defense Strategy of Network Security based on Dynamic Classification

  • Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5116-5134
    • /
    • 2015
  • In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.

A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET

  • Xu, Guoai;Liu, Boya;Xu, Guosheng;Zuo, Peiliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3104-3123
    • /
    • 2022
  • The development of Vehicular Ad hoc Network (VANET) has greatly improved the efficiency and safety of social transportation, and the routing strategy for VANET has also received high attention from both academia and industry. However, studies on dynamic matching of routing policies with the message types of VANET are in short supply, which affects the operational efficiency and security of VANET to a certain extent. This paper studies the message types in VANET and fully considers the urgency and reliability requirements of message forwarding under various types. Based on the diversified types of messages to be transmitted, and taking the diversified message forwarding strategies suitable for VANET scenarios as behavioral candidates, an adaptive routing method for the VANET message types based on reinforcement learning (RL) is proposed. The key parameters of the method, such as state, action and reward, are reasonably designed. Simulation and analysis show that the proposed method could converge quickly, and the comprehensive performance of the proposed method is obviously better than the comparison methods in terms of timeliness and reliability.

Adjustment Effect for Coping Strategy from Fatigue Scale of Security Guard's on Emotional Labor (시큐리티요원의 감정노동이 피로도에 미치는 영향 및 스트레스 대처방식의 조절효과)

  • Kim, Eui Young;Cho, Sung Jin
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.283-302
    • /
    • 2019
  • This study was conducted to provide the basic data for improving the working environment and welfare level of the security guard by identifying the primary effects of stress response on fatigue with emotional labor and identifying the adjustment effects with coping strategy. The data were collected from 214 security personnel using questionnaire and the statistical tests of correlation, heavy return analysis and hierarchical return analysis using the SPSS 18.0 statistics program were used to reach the conclusion that: First, it has been shown that the emotional labor of a security guard affects fatigue Second, the effects of emotional labor on fatigue of a security guard have been shown to have the effect of coping strategy. Based on the above studies, it was concluded that the emotional labor of a security guard was affected by fatigue and could be controlled by a stress coping strategy. Therefore, it is believed that there is a need to seek an autonomous corporate culture based on the organization's performance by changing the management system for employees at the organizational level so that security guards can use an active way of coping.

The Korean Peninsula security and Military Strategy of USA and China (미.중의 군사전략과 한반도 안보)

  • Son, Do-Sim
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.289-350
    • /
    • 2006
  • The world has been rapidly restructured in an agenda of national security from center of military strength to that of economic strength since the post cold-war era China military leadership-division carried out RMA through learning of a lesson from Gulf war in 1990 -1991 and Iraq war in 2003, thus the leadership-division made an attempt to convert the military system to a technical intensive system. The principle based on RMA of China military is (National defense strategy) drafted by the central military committee 1985 and (Four modernization general principles) 1978. China has introduced Russian high-technological arms and equipment in order to build up the military arms greatly thanks to an economical development, and they take pragmatism line as chinese socialism with their strategy to make secure a position as military powers such as they successfully launched a manned spacecraft and are building an air-craft carrie and soon. USA has a theory of dichotomy whether a country is a cooperator for USA, or not. and also enemy or friend since 9.11terror, thus USA is different from their direction of police. This is because USA stands a position as the superpower of the supremacy hegemony of the world. We must be carefully aware that USA considers as important area for Middle east, West south Asia, Central Asia and Northwest Asia to meet the demands of 2lcentury. Accordingly, the focus of USA's military strategy will be probably concentrated at the above mentioned four areas. On the other hand, USA enjoys such a superpower position due to collapse of USSR which was the past main enemy since the post cold war era. We could give an conclusive example as fact that USA has recurred to unilateralism But USA carry on the military operations to the terror groups at global around by converting thje military strike strategy to pre-emptive strike strategy since9.11 terror, 2001. USA seeks for transformation to the mobile military forces with light-quantity oriented in order to carry on such the military operations and makes progress GPR, And the USA forces in Korea makes progress a military renovation as part of such a military strategy. On the other hand, USA promotes the measures of choose for the countries standing at the crossroads of strategy and carries forward a main scheme of provision for four priority aims that the leaders of a hostile country and mis-country shall be prohibited from use and obtainment of weapons of mass destruction. Accordingly, this treatise found out a significant meaning to have an effect on the national security in the korean peninsula.

  • PDF

A Comparative Study on the Information Security Strategy of Korean I-Government with Defense-in-Depth Strategy of DoD (미 국방성의 종심방어전략과 전자정부의 정보보호전략에 관한 비교 연구)

  • Song Woon-ho;Jeong Wook-jae;Kim Joon-bum;Kang Han-seung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.659-664
    • /
    • 2005
  • Advanced countries overhaul government workflows using IT, which not only enhances efficiency and productivity, but paves the way to a 'e-Government' offering prompt, quality service for citizens. This research analyzes the DiD(Defense-in-Depth Strategy) and compares the information protection strategy of Korean e-Government with DiD for reliable and safe e-Government's build.