• Title/Summary/Keyword: System-level security

Search Result 1,161, Processing Time 0.03 seconds

Tools for Improving the Efficiency of the Economic Security of Enterprises in Face of the Competitiveness Intensification

  • Turylo, Anatolii M.;Sharko, Vitalii;Fesun, Iryna;Stadnyk, Viktoriya;Andrusenko, Nadiia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.53-60
    • /
    • 2022
  • The article examines the problems of ensuring the effectiveness of the economic security system in the face of increasing competition. The relevance of the study is determined by the intensification of competition between enterprises and the threats arising from this phenomenon. The methodological basis is the methods used: analysis and synthesis - to identify the main trends in the development of tools for economic security of the enterprise; systematization - to highlight the main characteristics of the economic security of the enterprise in the intensification of competition; generalization - to form the general conclusions of the study. The purpose of scientific research is to substantiate the feasibility of using the tools of the economic security system to increase its efficiency in the face of intensifying competition. The main components of the economic security system of the enterprise, which have the greatest impact on the formation of an effective level of economic security. The defining characteristics of the system of economic security of the enterprise are investigated. Special characteristics of the economic security system of the enterprise are considered. The offered directions of tools of maintenance of system of economic safety of the enterprise in competitive conditions: objective, subjective external, subjective internal. For each area, specific tools for ensuring the system of economic security, which affect its efficiency, have been identified.

Design of the Security Evaluation System for Internet Secure Connectivity Assurance Platform (인터넷 패킷 보호 보증 플랫폼에서의 보안성 평가 시스템 설계)

  • 김상춘;한근희
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.207-216
    • /
    • 2004
  • IPsec protocol has been developed to provide security services to Internet. Recently IPsec is implemented on the various operating systems Hence, it is very important to evaluate the stability of the Ipsec protocol as well as other protocols that provide security services. However, there has been little effort to develop the tools that require to evaluate the stability of IPsec protocols. Therefore, in this paper, we develope the security requirements and suggest a security evaluation system for the Internet packet protection protocols that provide security services at the If level that can be used to check if the security protocols Provide the claimed services correctly This system can be used as debugging tool for developing IPsec based security system.

The System for Ensuring the Financial and Economic Security of the State in an Aggressive External Environment

  • Kryshtanovych, Myroslav;Vartsaba, Vira;Kurnosenko, Larysa;Munko, Anna;Chepets, Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.51-56
    • /
    • 2022
  • The main purpose of the study is to analyze the features of ensuring the financial and economic security of the state in an aggressive external environment. The concept of financial and economic security should contain the priority goals and objectives of ensuring security, ways and methods to achieve them, adequately reflecting the role of finance in the socioeconomic development of the state. Its content is designed to coordinate nationwide actions in the field of security at the level of individual citizens, business entities, industries, sectors of the economy, as well as at the regional, national and international levels. The methodology includes a number of scientific and theoretical methods of analysis. Based on the results of the study, the key aspects of the system for ensuring the financial and economic security of the state in an aggressive external environment were identified.

A Study on the Evaluation of the Information Security Level in Major Container Terminals (주요 컨테이너 터미널의 정보보호 수준 평가에 관한 연구)

  • Lee, Hong-Girl
    • Journal of Navigation and Port Research
    • /
    • v.33 no.10
    • /
    • pp.735-742
    • /
    • 2009
  • Information security is an essential factor that enables terminal to be operated. However, despite of this importance of information security, there has hardly been any research related to this topic. And moreover, current level of information security performance in container terminals has not been analyzed so far. The objective of this study is to evaluate current level of information security in container terminals. Through survey from the four leading container terminal operators in Korea, The results firstly showed that average of information security level of major container terminals was 71.7%. And from the results of data analysis, it revealed that the weak point of information security in Korean container terminals was security management, and in detail, lack of expertise of support group.

A Research on the Development of Information Security Governance Framework (정보보호 거버넌스 프레임워크 개발에 관한 연구)

  • Lee, Seong-Il;Hwang, Kyung-Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.2
    • /
    • pp.91-108
    • /
    • 2011
  • Enormous losses of shareholders and consumers caused by the risks threatening today's business (e.g., accounting fraud and inside trading) have ignited the necessity of international regulations on corporate ethics and internal control, such as Basel II and SOX. Responding to these regulations, companies are establishing governance system, applying it consistently to the core competency of the company, and increasing the scope of the governance system. Recently occurred security related incidents require companies to take more strict accountability over information security. One of the results includes strengthening of legislation and regulations. For these reasons, introduction of information security governance is needed. Information security governance governs the general information security activities of the company (establishment of information security management system, implementation of information security solutions) in the corporate level. Recognizing that the information security is not restricted to IT domain, but is the issue of overall business, this study develops information security governance framework based on the existing frameworks and systems of IT governance. The information security governance framework proposed in the study include concept, objective, and principle schemes which will help clearly understand the concepts of the information security governance, and execution scheme which will help implement proper organization, process and tools needed for the execution of information security governance.

Advanced approach to information security management system utilizing maturity models in critical infrastructure

  • You, Youngin;Oh, Junhyoung;Kim, Sooheon;Lee, Kyungho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4995-5014
    • /
    • 2018
  • As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities. Currently, these methods of measuring information security are a concrete method of recommendation in related standards. However, the security controls used in these methods are lacking in connectivity, causing silo effect. In order to solve this problem, there has been an attempt to study the information security management system in terms of maturity. However, to the best of our knowledge, no research has considered the specific definitions of each level that measures organizational security maturity or specific methods and criteria for constructing such levels. This study developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. The proposed model is simulated using the thermal power sector in critical infrastructure of the Republic of Korea to confirm the possibility of its application to the field and derive core security processes and goals that constitute infrastructure security maturity. The findings will be useful for future research or practical application of infrastructure ISMSs.

A Genetic Algorithm-Based Intrusion Detection System

  • Lee, Han H.;Lee, Duk;Kim, Hee S.;Park, Jong U.
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.04a
    • /
    • pp.343-346
    • /
    • 2000
  • In this paper, a novel approach to intruder detection is introduced. The approach, based on the genetic algorithms, improved detection rate of the host systems which has traditionally relied on known intruder patterns and host addresses. Rather than making judgments on whether the access is instrusion or not, the systems can continuously monitor systems with categorized security level. With the categorization, when the intruder attempts repeatedly to access the systems, the security level is incrementally escalated. In the simulation of a simple intrusion, it was shown that the current approach improves robustness of the security systems by enhancing detection and flexibility. The evolutionary approach to intruder detection enhances adaptability of the system.

  • PDF

Analysis of Security System Priority for the Systematic Defense Technology Security (체계적인 방위산업기술보호를 위한 보호체계 우선순위 분석 연구)

  • Park, Heungsoon;Kim, Seyong;Kim, Yonghwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.3-12
    • /
    • 2019
  • The outflow of defense technology can cause serious damage not only in terms of business losses, but also in terms of national security and national interests. Recently, the government has enacted the Defense Technology Security Act, recognizing the importance of technology in the defense industry, and prepared guidelines for the defense technology security accordingly. According to the law, institutions and companies with defense technologies should establish a defense technology protection system, and the government should implement various technology protection policies to improve their level of technology protection. In this study, the implications were derived by comparing existing technology protection guidelines and priority analysis was performed on the protection system details through AHP for self-diagnosis items in the defense technology security guidelines. As a result, it is expected that it will enable efficient diagnosis of the level of protection and policy support for the systematic establishment of the protection system for the target institutions.

Research Trends Analysis of Information Security using Text Mining (텍스트마이닝을 이용한 정보보호 연구동향 분석)

  • Kim, Taekyung;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

보안 지식 베이스 관리 시스템에서의 질의 처리

  • 조일래;김원중;심갑식
    • Review of KIISC
    • /
    • v.7 no.2
    • /
    • pp.85-94
    • /
    • 1997
  • This paper describes the notion of a Multilevel Secure Knowledge Base Management System(MLS/KBMS). It states a security policy and security constraints. A design for query operation introduced cover story in a MLS/KBMS is discussed. Query processing approach is to provide cover stories that lead to alternative explanations for readily available information. Therefore such cover stories prevent an unauthorized user from inferring high-level information from low-level data.

  • PDF