• Title/Summary/Keyword: national security

Search Result 5,226, Processing Time 0.033 seconds

Modern Technologies for Ensuring Economic Security in the Context of Achieving High Efficiency of Public Administration

  • Kryshtanovych, Myroslav;Akimova, Liudmyla;Gavkalova, Nataliia;Akimov, Oleksandr;Shulga, Anastasia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.362-368
    • /
    • 2022
  • The main purpose of the article is to study the key aspects of the use of modern technologies to ensure economic security in the context of achieving high efficiency of public administration.The economic security of the country is a multi-level system, the structure of which is determined by the peculiarities of the structure and key development priorities both in the regional aspect and nationally. The fundamental role of economic security is realized through a set of goals and objectives that are achieved in the process of ensuring it, among the main ones is the effective, dynamic and progressive development of the economy, which is impossible without the development of innovations. The essence of ensuring economic security from the standpoint of innovative development lies in the development of innovations that can increase the level of competitiveness of the state-level economic system, which necessitated an analysis of the conditions and dynamics of innovation development. As a result of the study, the basic aspects of the implementation of modern technologies were analyzed in the context of achieving high efficiency in public administration.

A study on modified Cluster-based Key Distribution in Wireless Sensor Networks (클러스터기반 센서네트워크에서 개선된 키 분배 연구)

  • Lee Kyoung-Hyo;Park Ic-Su;Jung Seok-Won;Kim Hyun-Gon;Oh Byoung-Kyun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.608-612
    • /
    • 2006
  • 센서네트워크는 유비쿼터스 컴퓨팅 기술의 핵심으로 자리 잡아가고 있다. 이러한 센서네트워크는 네트워크가 갖는 특성으로 인하여 일반 네트워크보다 보안에 취약하므로 안전한 통신을 위하여 센서 노드 간 키를 설정하는 것은 보안을 위한 기본적인 요구사항이 되고 있다. 센서네트워크를 클러스터링하여 각 클러스터별로 유일한 다항식을 할당하는 클러스터기반 키 분배에서 클러스터 헤더가 할당하는 다항식 부분정보(polynomial share)인 일변수 다항식 정보는 키 분배시 도청에 의하여 클러스터 헤더의 키인 이변수 다항식을 계산할 수 있었다. 따라서 본 논문에서는 클러스터헤더가 동일한 클러스터내의 센서노드들에게 다항식 부분정보를 배분할 때 다항식을 계산한 상수값을 분배함으로써 클러스터에 도청으로부터 다항식을 알아낼 수 없게 하여 센서노드 간 안전한 통신을 할 수 있게 하였다.

  • PDF

Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System) (보안인증의 경제적 효과에 대한 연구동향 분석: ISMS(정보보호관리체계)를 중심으로)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Lee, Song-Ha;Kang, Min-Seong;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.821-835
    • /
    • 2016
  • This study investigates the domestic and international research trends to analyze the economic effects of various information security certification systems. Results of the study can suggest future research topics for researchers, and help make rational decision-making on introducing information security management systems for practitioners.

Economic Consequences of the Impact of War on Labor Resources and Tourism in Terms of Ensuring Economic Security

  • Krupa, Oksana;Krupa, Volodymyr;Dydiv, Iryna;Horpynchenko, Olha;Kovalenko, Snizhana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.117-122
    • /
    • 2022
  • The main purpose of the article is to determine the economic consequences of the impact of war on labor resources and tourism in terms of ensuring economic security. Today, in the context of Russia's invasion of the territory of Ukraine, an important aspect of people's lives is confidence in their safety. But no less important is the provision of economic security, its impact on the labor and tourism aspects of this type of security, the negative impact on which is carried out under the influence of war. Modern society is faced with the same problems that were a hundred years ago: technological progress, the balance of power in the world community, social problems, military conflicts. In the modern development of society, no one can deny the amazing scientific progress in new technologies and communications.That is why it is important to understand how dangerous war is not only for human life, but also for the economy of the state, its labor and tourism aspects.

An Exploratory Study on Extracting Industrial Security Jobs and Competencies in the National Competency Standard(NCS):Focusing on the Unclassified Security Area (국가직무능력표준(NCS)에서의 산업보안 직무 및 직무능력 추출을 위한 탐색적 연구:NCS 미분류 보안영역을 중심으로)

  • Lim, Dongsun;Shin, Eunhee;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.25-32
    • /
    • 2020
  • In the midst of the rising need for Industrial Security experts, the development of National Competency Standards(NCS) with regards to industrial security is a very important and urgent task. The NCS standardizes university-level academic curriculum and qualification systems and connects them with the industry's needs. This study has extracted, classified and analyzed security-related jobs and tasks requiring security expertise that is required within NCS. Through this study, many tasks have been confirmed to require security competencies that are different from those in IT-security, physical security that already exist as a NCS tasks. It is expected that the industry's needs of industrial security expertise will be reflected in future NCS development, which will be used as basic data for systematizing industrial security jobs and competency.

A Study on the Necessity of Establishing the National Cyber Security Act through a Comparative Legal Analysis (국내 관련 법과 비교 분석을 통한 국가사이버안보법안의 제정 필요성 연구)

  • Kim, Sung-Hyun;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.9-35
    • /
    • 2018
  • During the recent years, cyber attacks have been increasing both in the private sector and the government. Those include the DDOS cases in 2009, the Blue House cyber attack, bank hackings etc. Cyber threats are becoming increasingly serious. However, there is no basic law related to cyber security at present, and regulations related to cyber security are scattered in various domestic laws. This can lead to confusion in the application of the law and difficult to grasp the regulations related to cyber security. In order to overcome this situation, the bill on the prevention and countermeasures against cyber crisis was initiated in 2006, but it has been abrogated. Since then, it has been repeatedly proposed, but it has been abrogated repeatedly due to the overlapping of existing laws and concerns about infringement of personal information. The most recent initiative was the National Cyber Security Act, which was initiated by the government in January 2017. The act focuses on resolving the absence of a basic law related to cyber security, strengthening its responsiveness in the event of a cyber security crisis, and fostering security strength. Therefore, this study seeks to contribute to the establishment of National Cyber Security legislation as a basic law of cyber security by examining the necessity of National Cyber Security legislation through comparative legal analysis with existing domestic laws related to cyber security and suggesting policy implications.

Introduction of Smart-Management into the System of Public Management of Regional Development in the Context of Strengthening National Security of Ukraine

  • Ivashova, Liudmyla;Larin, Stanislav;Shevchenko, Nataliia;Antonova, Liudmyla;Yurchenko, Serhii;Kryshtanovych, Myroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.369-375
    • /
    • 2022
  • The article substantiates the need and shows the features of introducing SMART management into the system of public management of regional development in the context of strengthening the national security of Ukraine. Disclosed are such provisions as: goal-setting; state mission; state mission in Ukraine; goals of the Ukrainian state; strategic management priorities in Ukraine. Differences between the purpose of the organization and the purpose of the state are determined. The characteristic of the goal at the state level is given. The management standards in SMART management are characterized. The issues of the exhaustibility of existing SMART criteria are reviewed and it is proposed to supplement them with two such as: inspiration (inspiration) and ity (ethics). Two main principles are defined (evaluated (assessment), reviewed (review)), which must be observed when introducing SMART management into the system of public management of regional development in the context of strengthening the national security of Ukraine.

Information Sovereignty as the Basis of Modern State Information Security

  • Zozulia, Oleksandr;Zozulia, Ihor;Brusakova, Oksana;Kholod, Yurii;Berezhna, Yevheniia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.264-268
    • /
    • 2021
  • In the context of globalization of information processes, the prevalence of information wars and terrorism, there are new threats to national interests in the information sphere, which actualizes providing the information sovereignty of modern states. Therefore, the purpose of the article is an in-depth analysis of the features and content of information sovereignty as a component of state sovereignty, its relationship with freedom of information and information security, as well as a characterization of the bases and directions of providing information sovereignty. The information sovereignty of the modern state includes its activities to determine national interests in the information sphere, the formation and implementation of information policy, providing information security, regulation and control of information processes. The realization of information sovereignty should be based on real freedom of information, information privacy and the state obligation to provide them. Ensuring information sovereignty also requires solving the problems of formation of modern information legislation, which would comprehensively establish the bases and directions of providing information sovereignty, exceptional cases of restriction of freedom of information.

Designing demand side education of information security professionals (수요자 중심의 정보보호 전문 인력 양성을 위한 교육과정 설계)

  • Lee, Jong Lark
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.99-106
    • /
    • 2013
  • There has been a lot of growth more than 10% in the information security industry. In accordance with the industrial growth, it increased needs for the information security manpower development as a national problem. But there is an imbalance between demand and supply of the information security manpower in terms of the quantity and quality. It is mainly caused by the curriculum of the information security is made considering for suppliers not for demanders. As a resolution to solve this problem, we suggest the curriculum of information security for vocational education and training. As the information security area is wide in view of required knowledge and technology, we design the curriculum by selecting major occupation type from the information security manpower distribution and products and then by investigating the job description using NCS(National Competency Standard). And we compared the curriculum to that of two or three year diploma courses in Korea.

Information Security and Organizational Performance: Empirical Study of Korean Securities Industry

  • Kong, Heekyung;Jung, Suhyun;Lee, Insung;Yeon, Seung-Jun
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.428-437
    • /
    • 2015
  • This study was conducted to analyze the effect of information security activities on organizational performance. With this in mind and with the aim of resolving transaction stability in the securities industry, using an organization's security activities as a tool for carrying out information security activities, the effect of security activities on organizational performance was analyzed. Under the assumption that the effectiveness of information security activities can be bolstered to enhance organizational performance, such effects were analyzed based on Herzberg's motivation theory, which is one of the motivation theories that may influence information protection activities. To measure the actual attributes of the theoretical model, an empirical survey of the securities industry was conducted. In this explorative study, the proposed model was verified using partial least squares as a structural equation model consisting of IT service, information security, information sharing, transaction stability, and organizational performance.