• 제목/요약/키워드: System Security

검색결과 9,655건 처리시간 0.039초

산업보안관리사 자격제도 발전 방안에 대한 고찰 (The Study of a Development Plan of the Industrial Security Expert System)

  • 조용순
    • 시큐리티연구
    • /
    • 제40호
    • /
    • pp.175-207
    • /
    • 2014
  • 산업보안관리사는 현재 민간자격이지만 향후 국가자격화 되어 현장에서 적절하게 활용 가능한 인력인지 여부에 대하여 국가적으로 공신력이 부여될 필요가 있다. 공신력 확보를 위한 운용방안 중 고려할 수 있는 것이 등급제이다. 현재와 같이 단일등급제로 운용할 경우 양적 확산에 초점을 두게 될 가능성이 있다. 따라서 질적 혁신 차원에서 산업보안관리사의 등급제도 활용도를 장기적인 관점에서 검토하여 등급을 구분할 필요가 있다. 한편, 산업보안 현장 실무자의 산업보안관리사 자격시험에 응시할 수 있는 요건, 산업보안 실무연수 과정 이수, 민간자격을 이미 취득한 인력의 경우 국가자격 승계문제도 중요한 고려 사항중 하나이다. 산업보안관리사제도가 활성화 되기 위해서는 국가자격화를 통한 공신력 확보뿐만 아니라 산업보안관리사의 인력의 수요창출이 필요하다. 현재 증가하는 산업기술유출에 대한 우려에도 불구하고 우리기업 등의 보안관리체계의 미비 등 산업보안대응 역량이 상당히 취약한 실정임을 고려할 때, 산업기술 보호에 특화된 산업보안관리체계에 대한 인증을 기존의 정보보호관리체계인증과 별개로 도입할 필요성이 있다. 산업보안 관리체제 인증제도와 산업보안관리사 자격제도가 연동될 때 국가핵심기술 등을 다루는 기업체, 연구기관 등의 산업보안이 실질적으로 이루어져 시너지 효과가 발생할 것이다.

  • PDF

스마트그리드 전력망의 NSM 기반 보안관리시스템 설계 및 구현 (Design and Implementation of NSM based Security Management System in Smart Grid)

  • 장범환
    • 디지털산업정보학회논문지
    • /
    • 제9권3호
    • /
    • pp.107-117
    • /
    • 2013
  • In this paper, we designed the security management system based on IEC 62351-7 in the Smart Grid environment. The scope of IEC 62351-7 focuses on network and system management (NSM) of the information infrastructure as well as end-to-end security through abstract NSM data objects for the power system operational environment. However, it does not exist that security management system based on IEC 62351-7 manages the security of the power system in the Smart Grid environment, because power equipment or SNMP agents providing NSM data do not exist yet. Therefore, we implemented the security management system to manage the information infrastructure as reliably as the power system infrastructure is managed. We expect that this system can perform the security management of IEC 61850 based digital substation and can be a prototype of the security system for the Smart Grid in the future.

기계경비시스템의 변화와 시장전망 (The Trends of Electronic Security System and Prospects of Security Market)

  • 정태황
    • 시큐리티연구
    • /
    • 제6호
    • /
    • pp.147-165
    • /
    • 2003
  • Since Electronic Security System is introduced in Korea in 1981 by foreign technology, Security market has been increasing considerably during short period, and It performs it's security roles well in place of security guards. As electronic and communication technology is highly developed, Electronic Security System and security market structure is changing naturally. Especially high-tech mobile communication technology will change the method of Electronic Security business. Also the pattens of residence and life style, such as the trend toward nuclear family and single life could effect security market. In recent year, new business models that apply the mobile phone and internet is appeared. Although Electronic Security System is changed by the changes of technology, It is very difficult to change the basic elements, such as sensing, alarm signal transfering, and response. The rate of increase of Electronic Security market is expected to matain it's increase pace for the time being. But the development of new system for new protectes such as childeren, old person, vehicle rather than immovable facility is necessary to prepare for the continuous competition.

  • PDF

민간경호업의 질적 발전 방안에 관한 연구 (A Study on the Qualitative Improvement of Private Security Industrial)

  • 송상욱
    • 한국재난정보학회 논문집
    • /
    • 제2권1호
    • /
    • pp.113-127
    • /
    • 2006
  • The suggestions that follow are about the Qualitative Improvement of private security Industrial. First, in legal and institutional policy, new establishment by law for private security and more support from government is asked. Moreover, the restructuring or M&A between petty companies and the pricing for security service should be performed. Second, in the structural aspect of private security industry, the professional education center for private security guards should be established and the terms of payment and welfare should be improved to the level above standard. In addition, it should be achieved to change the public to have a new and correct understanding of private security and develope the specialized parts suited to the characteristic and ability of each companies. Third, the construction of operating system for private security service should be achieved; recruit system for competent security guards, marketing strategy and enforcement system, widely known confidence to client, normal training system for security guards and post management system for client. This is also to be suited to the characteristic of each companies.

  • PDF

Design and Implementation of Security System for War game Simulation System

  • Song Jong Seok;Li Chu Yu;Jin Long;Ryu Keun Ho
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2004년도 Proceedings of ISRS 2004
    • /
    • pp.712-715
    • /
    • 2004
  • War game Simulation System is a simulation system of military operation. In order to ensure all of the data that are running are secure, this system has to emphasize the security policy. In this paper, we analyze the running environment and the weakness of the security about exiting system. For improving the weakness, we design and implement this security system that is consisted of three components: Authentication System, Encryption System and Network Security System. Therefore, we can apply War game Simulation System to security system and improve the secure performance of this one.

  • PDF

클라우드 컴퓨팅 보안 위협에 기반 한 서버 가상화 시스템 보안 요구 사항 제안 (The security requirements suggestion based on cloud computing security threats for server virtualization system)

  • 마승영;주정호;문종섭
    • 정보보호학회논문지
    • /
    • 제25권1호
    • /
    • pp.95-105
    • /
    • 2015
  • 본 논문은 서버 가상화 시스템의 보안 함수를 개발하기 위해 선행해야 할, 보안 요구 사항을 제안하는 것에 그 목적을 두고 있다. 도출된 보안 요구 사항은 서버 가상화 시스템에 대한 보안 위협을 기반으로 하며, 제안 된 요구 사항이 보안 위협 사항을 방어할 수 있는 것을 보임으로써 보안 요구 사항의 타당성을 검증한다. 또한, 클라우드 컴퓨팅 보안 위협에서 서버 가상화 시스템에 가해지는 보안 위협을 도출하기 위해서, 보안 위협과 서버 가상화 시스템의 보안 이슈 사항의 관계를 분석 및 제시한다.

Construction of Security MIB for EDI System

  • Park Tae-Kyou
    • 정보보호학회논문지
    • /
    • 제8권1호
    • /
    • pp.23-37
    • /
    • 1998
  • This paper considers the design and management of security MIB for EDI system. EDI system has to establish various securety wervices and mechanisms to protect against security threats. Hence, the EDIsystem requires appropriate security management to monitor and control the security obhects for its security services and mechanisms. In this paper, I identify security objects for management of secueity services defined in the EDIsystem, and propose the design of a security MIB and describe the use of SNMPnetwork management protocol in its management.

저대역 센서 네트워크 기반의 양방향 보안등 관제 시스템 개발 (Development of a Bi-Directional Security Light Control System based on Low-Bandwidth Wireless Sensor Network)

  • 이호근;이상호;이석규;최정원
    • 조명전기설비학회논문지
    • /
    • 제24권10호
    • /
    • pp.58-66
    • /
    • 2010
  • This paper shows an implementation and management result of wireless networks based security light control system, which performs a great role in protection of pedestrians and prevention of crime. Conventional security light units have severe limits in confirmation and inspection of security light unit failure, like wilful damage by someone or failure by influence of other equipment or failure by spontaneous heat-increase, and so on. In addition, local government offices are responsible for maintenance of security light units and as a matter of fact, most of civil complaints are about security light units. It is an obvious that the existing security light maintenance system reaches the limit and the security light maintenance problem is a difficulty of local government. Therefore, efficient security light control system is needed, which enables central control and intelligent maintenance. Moreover, the system has to be easy to control and has to be stable. In this study, wireless sensor network based security light control system is implemented, which is independent of programming language and platform, and which is simple to control and extend the system. The proven protocols, HTTP and SOAP, are utilized in order to improve the system reliability. This paper shows the excellence of our proposed system by implementing and operating it in real environment.

공개 보안 도구를 이용한 리눅스 기반 통합 보안 시스템의 설계 및 구현 (Design and Implementation of Linux-based Integrated Security System(LISS) Using Open Security Tools)

  • 전용희;김민수;장정숙
    • 정보처리학회논문지C
    • /
    • 제11C권4호
    • /
    • pp.485-496
    • /
    • 2004
  • 광범위한 인터넷의 보급에 따라 컴퓨터 및 네트워크 시스템의 취약점을 이용한 해커들의 통신 웹을 경유한 공격이 쉽게 되었다. 본 논문에서는 통합 보안관리가 가능한 LISS(Linux-based Integrated Security System)라고 이름 붙여진 통합 보안 시스템을 설계하고 구현한다. 이 시스템은 공개 운영 체제인 Linux에 기반하고 있으며, Linux 기반 서버의 보안관리에 효과적인 공개 보안 도구들로 구성되어 있다. LISS의 성능을 시험하기 위하여 테스트베드를 구성하여 시험한 결과, 구현된 시스템이 네트워크 매퍼로부터 발생되는 모든 공격 패턴들을 포획하는 것으로 나타났다.

A Study on the Security Management System for Preventing Technology Leakage of Small and Medium Enterprises in Digital New Deal Environment

  • Kim, Sun-Jib
    • International Journal of Advanced Culture Technology
    • /
    • 제9권4호
    • /
    • pp.355-362
    • /
    • 2021
  • Through the Korean version of the New Deal 2.0, manufacturing-oriented SMEs are facing a new environmental change called smart factory construction. In addition, SMEs are facing new security threats along with a contactless environment due to COVID-19. However, it is practically impossible to apply the previously researched and developed security management system to protect the core technology of manufacturing-oriented SMEs due to the lack of economic capacity of SMEs. Therefore, through research on security management systems suitable for SMEs, it is necessary to strengthen their business competitiveness and ensure sustainability through proactive responses to security threats faced by SMEs. The security management system presented in this study is a security management system to prevent technology leakage applicable to SMEs by deriving and reflecting the minimum security requirements in consideration of technology protection point of view, smart factory, and remote access in a non-contact environment. It is also designed in a modular form. The proposed security management system is standardized and can be selectively used by SMEs.