• Title/Summary/Keyword: industrial security science

Search Result 424, Processing Time 0.023 seconds

Supporting Scalability of Tunneling and Mobile Clients in Virtual Private Network (가상사설망에서 터널링의 확장성과 모바일 클라이언트 지원)

  • Kim, Young-Jin;Lee, Joo-Yeon;Song, Joo-Seok
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.195-199
    • /
    • 2002
  • Requirements of a well-designed VPNs(Virtual Private Networks) are scalability, performance, reliability, ease of management, interoperability and security. Tunneling is a important technology to support these. This paper researches VPNs tunneling technologies used currently and proposes VPN service models for the scalability that is a problem in VPNs and for the resource limit of Mobile Station in Mobile VPNs environment.

  • PDF

A Study on the Establishment of Industrial Security Education Programs in Korea (한국 산업보안교육 프로그램의 정립에 관한 연구)

  • Choi, Sun-Tae;Yu, Hyeong-Chang
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.185-208
    • /
    • 2010
  • This study is to suggest the current security education programs and improvement of industrial security curriculums in Korea. We live in a world of insecurity; the world is changing at an ever accelerating pace. Life, society, economics, international relations, and security risk are becoming more and more complex. The nature of work, travel, recreation, and communication is radically changing. We live in a world where, seemingly with each passing year, the past is less and less's guide to the future. Security is involved in on one way or another in virtually every decision we make and every activity we undertake. The global environment has never been more volatile, and societal expectations for industrial security and increasing if anything. The complexities of globalization, public expectation, regulatory requirements, transnational issues, jurisdictional risks, crime, terrorism, advances in information technology, cyber attacks, and pandemics have created a security risk environment that has never been more challenging. We had to educate industrial security professional to cope with new security risk. But, how relevant is a college education to the security professional? A college degree will not guarantee a job or advancement opportunities. But, with a college and professional training, a person has improved chances for obtaining a favored position. Commonly, Security education and experience are top considerations to find a job so far, also training is important. Today, Security is good source to gain competitive advantage in global business. The future of security education is prospect when one considers the growth evident in the field. Modern people are very security-conscious today, so now we had to set up close relevant industrial security programs to cope with new security risk being offered in colleges or several security professional educational courses.

  • PDF

Development Plan for the Identity and Future of Security Science (경호학의 정체성과 미래에 대한 발전 방안)

  • Kwon, Hyuck-Bin;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.145-172
    • /
    • 2017
  • In 2015 the Department of Education announced that it will make downsizing efforts by recommending classified downsizing ratio according to the evaluation of universities for active support toward autonomous efforts of universities with the possibilities of reform and qualitative structural reform for customized human resource cultivation according to the social demands. This is the preemtive structural reform preparing against the rapid decrease of the number of students, and the preparation for changing into competitive universities so that customized human resource that is needed in the society can be trained. Security Science Departments of Korea, first established in 1996, need changes in curriculum in order to prepare for the fourth revolution of the future, and are stagnant on the education goal and employment course. Therefore the adoption of related certificates, curriculum, NCS, and professional curriculum is needed. For example, Hansei University, Chung-Ang University, and Far East University have established the Department of Industrial Security, and Kyonggi University and Sungshin Women's University have established the Department of Convergence Security. Also, Konkuk University has established the Graduate School of Security and Disasters, the Graduate School of Information and Policy, the Graduate School of Criminal Justice, Gachon University the Graduate School of National Security, Sungkyunkwan University the Graduate School of Strategic Studies. This shows that the field of Security Science should not settle for itself. This article analyzes current curriculum and subjects of security, police, industrial security, military related academic departments of key universities. It is necessary to prepare for the future by predicting the change from the merge of academic departments and the demands of the times. As technical colleges are adopting NCS, this is the time to seek for systematic collaboration between universities and technical colleges and between industry, government, and academida.

  • PDF

Polygraph Security Screening as an Internal Control Method to Counter Industrial Espionage in Korea (폴리그라프를 활용한 산업스파이 대응방안)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.291-311
    • /
    • 2009
  • Amid intensified global competition, securing high technologies is becoming a prerequisite towards achieving developed nation status. Korea has made tremendous efforts into developing technologies for decades and it has now obtained a leading position in many fields. As a result, however, Korea has become a major target of industrial espionage and not a few Korean businesses have already suffered from it. In order to effectively counter industrial espionage, this research explores the use of polygraph security screening as an internal control method through literature review, and discusses matters which need to be considered before the introduction of it into Korea, focusing on the accuracy of security screening. Since polygraph security screening generates deterrent effect by increasing certainty and celerity of punishment, it makes a valuable contribution to the control of industrial espionage. However, the most important problem with the use of the polygraph in security screening is errors of the examination. Thus, polygraph security screening should be used as a part of comprehensive security management program to reduce the possibility of errors. In addition, because factors such as countermeasures and examiner's experience are known to influence the accuracy of the examination, the issues surrounding them should also be addressed.

  • PDF

A Study on the Influence of Organizational Justice on the Industrial Security Supervisors' Compliance Motivations towards Security Policies: With a Focus on Organizational Attachment and Empowerment (조직공정성이 산업보안담당자의 보안정책 준수의지에 미치는 영향 : 조직애착과 임파워먼트를 중심으로)

  • Shin, Hyun-Goo;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.241-268
    • /
    • 2014
  • This paper is a study on the industrial security specialists of organizations in possession of industrial technology and their compliance motivations towards security policies. The focus is on organizational justice, organizational attachment and empowerment based on our hypothesis that compliance motivations are shaped, not only by the organization itself but, also by the attitude and principle of the organization's members. The objective is to propose a direction for administrative security policy to increase prevention of industrial technology leakage by identifying the factors' significance through hypothesis testing and thereafter investigating the influencing relationship. Survey questionnaires are collected from the participants of a regular educational program provided by the Korean Association for Industrial Technology Security (KAITS) and analyzed using SPSS 21.0 and AMOS 21.0 software. Through various statistical analyses, following results are acquired. First, procedural fairness and organizational attachment are found to motivate security supervisors to comply with security policies. Particularly, the relationship between procedural fairness and compliance motivations towards security policies is fully mediated by organizational attachment, suggesting that improved fairness at the organizational level will lead to an increase in organizational attachment, which will encourage the individuals to comply with security policies. Additionally, empowerment of the individuals in organizations partially mediates the relationship between procedural fairness and organizational attachment, confirming that procedural fairness empowers each individual and increases his organizational attachment. Specifically, in order to maximize compliance of security policies, businesses should demonstrate procedural fairness when compensating their employees for their work to empower them and increase their organizational attachment, which can increase their will to comply with existing security policies. This research provides insights into how to encourage security supervisors to comply with security policies by increasing their empowerment and organizational attachment.

  • PDF

A Study on the 4th Industrial Revolution and E-Government Security Strategy -In Terms of the Cyber Security Technology of Intelligent Government- (제4차 산업혁명과 전자정부 보안연구 -지능형 정부의 빅데이터 사이버보안기술 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.369-376
    • /
    • 2019
  • This paper studies desirable form of future e-government in terms of intelligent government research in response to new intelligent cyber security services in the fourth industrial revolution. Also, the strategic planning of the future e-government has been contemplated in terms of the centralization and intellectualization which are significant characteristics of the fourth industrial revolution. The new system construction which is applied with security analysis technology using big data through advanced relationship analysis is suggested in the paper. The establishment of the system, such as SIEM(Security Information & Event Management), which anticipatively detects security threat by using log information through big data analysis is suggested in the paper. Once the suggested system is materialized, it will be possible to expand big data object, allow centralization in terms of e-government security in the fourth industrial revolution, boost data process, speed and follow-up response, which allows the system to function anticipatively.

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

A Complimentary Direction of the Fourth Industrial Revolution and the Department of Military Science in Universities (제4차 산업혁명과 민간대학 군사학과 교육체계 보완방향)

  • Kim, Yeon-Jun
    • Journal of National Security and Military Science
    • /
    • s.15
    • /
    • pp.31-55
    • /
    • 2018
  • It has been fifteen years since military science was introduced into private and public universities since 2004. The department focuses on the improvements of the South Korean Army quality based on the Korean Army's traits including: an increase of power in the armed force and operations through research, development, and the expansion of a cooperation between the public (civilians) and military. Approximately, four hundred students from various universities in the military science department graduate in order to become an officer. The fourth industrial revolution causes structural transformation to our lives. Through the use of Artificial Intelligence (AI,) war and the military as a whole will be altered significantly particularly with regard to efficiency. Nevertheless, it is important for us to train officers in creative ways so that they can deal with situations where machines will be unable to handle situations. Considering this change in our lives, it is necessary for the military science departments to change the way to teach and train their students. In order to accomplish this goal, we need to introduce a method called "Flipped Learning" and during the process all the members need to participate and communicate in an interactive way. By doing this, the military science departments will play an important role by improving human resource in terms of military and national security.

  • PDF

Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks

  • Wei, Min;Kim, Kee-Cheon
    • Journal of Communications and Networks
    • /
    • v.14 no.3
    • /
    • pp.310-318
    • /
    • 2012
  • Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.

The Study on Threats of Information Security and Their Solutions in the Fourth Industrial Revolution (4차 산업혁명 시대에 정보보안의 위협요인과 대응방안에 대한 연구)

  • Cho, Sung-Phil
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.11-35
    • /
    • 2017
  • The third industrial revolution, characterized by factory automation and informatization, are moving toward the fourth industrial revolution which is the era of superintelligence and supernetworking through rapid technology innovation. The most important resources in the fourth industrial revolution are information or data since the most of industrial and economic activities will be affected by information in the fourth industrial revolution. Therefore we can expect that more information will be utilized, shared and transfered through the networks or systems in real time than before so the significance of information management and security will also increase. As the importance of information resource management and security which is the core of the fourth industrial revolution increases, the threats on information security are also growing so security incidents such as data breeches and accidents take place more often. Various and thorough solutions are highly needed to protect information resources from security risks because information accidents or breaches seriously damage brand image and cause huge financial damage to organization. The purpose of this study is to research general trends on data breaches and accident that can be serious threat of information security. Also, we will provide resonable solutions to protect data from nine attack patterns or other risk factors after figuring out each characteristic of nin attack patterns in data breaches and accidents.

  • PDF