• Title/Summary/Keyword: securities

Search Result 438, Processing Time 0.025 seconds

A Study on the Efficient Information Security Methodology under a Korea War-Game Exercise System (워게임 연습체계에서의 효율적 정보보호 방안 연구)

  • 이강택;이동희;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.219-225
    • /
    • 2004
  • There is increasing tension in the Korean Peninsula from the US' putting the NK's nuclear issue along the line of war in Iraq. However, there is worsening in ROK's field exercise condition from decresing defense financial supports, being difficlut to obtain enough space for volumable exercises, and securities and circumstances issues. With acknowleging those problems, CPX(Command Post Exercise), namely war game exercise which is more economical and scientific exercise has earned its attention as the best alternative measure of field exercise war game exercise has already been applyied to independent, joint, and combined exercises. However, the current war game system contains lots of problems in terms of security. Defense network uses dedicated line isolated with internet and secure data through network level encoding. It is vulerable to get attack during war game exercise or from credited network. System security is also subject to reinforced. This research is performed focusing on network and system level securities, and through it, the author will show the effective and optimized security solution for war game system.

  • PDF

Security Analysis On Battery Exchange System for Electric Vehicle (배터리 교체식 전기 자동차 시스템 연구 및 보안 요구 사항 분석)

  • Kwon, Yang-Hyeon;Choi, Yong-Je;Choi, Doo-Ho;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.2
    • /
    • pp.279-287
    • /
    • 2012
  • Recharging battery in electric vehicle takes a quite long time compared with gasoline and diesel vehicle which is a problem, the industries should solve, to introduce the electric vehicle into the market. For this reason, the institutions are suggesting a method replacing the discharged battery to recharged battery which is recharged in the switching center. However, this technology is still required to make clear the controversial issues such as threats to security and identification of users. In this paper, we explore the factors that threats to securities in battery exchange system and define the security requirements of the battery exchange system to solve suggested issues. The results of the research are expected to be the reference in the other studies of electric vehicle field of the commercialization of the battery recharging methods and analysis of the securities.

Possibility of Debt Financing by Korean Entertainment Companies : Case of SM Entertainment and YG Entertainment (한국 엔터테인먼트 기업의 부채금융 가능성 탐색 - SM엔터와 YG엔터 사례를 중심으로)

  • Kim, Daewon;Kim, Seongcheol
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.10
    • /
    • pp.227-236
    • /
    • 2014
  • The purpose of this paper is to explore the possibility for Korean entertainment companies to enter into debt financing. In particular, this study focuses on the possibility of issuing corporate bond and the asset backed securities (ABS) by two leading entertainment companies in Korea: SM Entertainment (SM) and YG Entertainment (YG). Depth interview with specialists such as investment bankers (IB), bond brokers, and financial directors and executives in entertainment companies was done. The results show that IB's opinion on issuing corporate bonds by SM and YG is positive. However, they may need to meet four requirements including maintaining stable cash-flow, diversifying sales source, enhancing accounting and legal transparencies and verifying managerial capabilities. In addition, Psy' s 'Gangnam style', his global hit song, turns out to have high potential as a base asset for ABS.

Current Status of Information Security against Cyber Attacks in Universities and Its Improvement Methods (사이버 공격에 대비한 대학의 정보보안 현황 및 개선 방안)

  • Kang, Young-Sun;Choi, Yeong-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.215-225
    • /
    • 2011
  • This paper suggests several methods of improving information securities of universities through the investigations of the current status of information securities in universities, which is becoming a hot topic in knowledge and information societies. In this paper, universities were randomly selected according to their size, and surveyed through email questionnaire to the persons in charge of security in each university, and 27 universities and 18 colleges were replied. From the survey results we confirmed that the pre-prevention is the most important thing in securing information assets, also in universities, and, in this paper, systematic support must be strengthened to establish a comprehensive security management policy and guidelines for the universities, and the importance of information assets and the necessity of security needs to be shared with the members in the universities. Moreover there must be full administrative and financial support, including recruitment and training of information security professionals and the establishing a separate security division.

THE SITUATION AND DEVELOPMENT OF SECURITY GUARD WORKS ON OUR COUNTRY (우리나라 경호업의 현황 및 발전방안)

  • Park, Ju-Hyeon
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.123-134
    • /
    • 1997
  • Our conuntry have come out to the phenomenon to the atrocity crimes, make into a intellecture crims and specialization with them due to various change to the expension of economy growth, drift of population to cities and sense of value is plunged in confution, Now that things have come to this day, since foundation of the security guard law it first begin, ten years, civilian securities guard law was include to the civil service securities law due to amendment fo the civility secuties law newly on Dec. 30, 1995. According to the amendment, the part of the public peace of peoples livelihood were slough of the visual angle in knowledge which function of the civilies security were only be in under the government dimension were put in order to be tointly according to the such state of affairs, should found the consider a counterplan fundamentally regarding to the what to doing efforts foster the civilities securitylaw and qualitalive elevation of presidential guards. To make a long story short by few words, the question resolves itself into the following five points. The first, peoples arrengements for the attitude fo public duty service with devotedly Sustaining publicity work activities for the thire divert of the understanding of civilian security guard. The secondly, Existing security traders and security association should to support to the civilian security works. The third, The government office concerned should strengthen the licensing system in order to improve the quality of existings in order to may establishment newly systems of license and technical institute of regarding to them. The fourth, Should be newly organixed the exclusive organization of personal protective works in the police buroau for the sustaining development of civirity guard works and soundness of the upbringing. The fifth, It is necessary to found the reserch institute for the study on oretical, scholarly, study for the technical reserch and enlargement of effeciveness And try to find a solution to the Universitys function and duty, activity plan, support plan to the Department of security specialist for the come forward in succession it under the national assistance. The finally, I am sure that the Korean security association could be transiormed into the organization which reliable and receive a love from the peoples when doing best utmost to do pursuit of the structure to be a securitys legalism, specialization and total security systems.

  • PDF

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

Effective Models for Connecting BTL and Project Finance (BTL 사업과 프로젝트 금융의 효과적 결합 방안)

  • Park, Won-Seok
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.11 no.2
    • /
    • pp.233-250
    • /
    • 2008
  • This paper aims to analyze the characteristics of BTL, and to propose the effective models connecting BTL and project finance, through the analysis of current state and case study of BTL. The main results of this study are as follows. Firstly, BTL business have been increasing fast, and most of projects are middle size projects below 100 billion Won. Nextly, key suggestions for improving BTL business model are analyzed, which are, first, risk allocation between public and private interests, second, improvement of method for selecting private investment consortium, and third, alleviation of long-term burden of local finance. Finally, effective models for connecting BTL and project finance, which are, first, model for using asset backed securities, second, model for dividing project corporations into construction corporation and operation corporation, and third, model for risk allocation between public and private interests.

  • PDF

Analyzing Relationships between Stock Prices and Business Performances of Construction Companies (건설기업의 주식가격과 경영성과와의 상관관계 분석)

  • Kim Hee-Joon;Kim Myung-Sun;Kim Jae-Jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.4 no.3 s.15
    • /
    • pp.76-84
    • /
    • 2003
  • The bankruptcy possibility of construction firms have been higher by the environment of current construction industry. Thus, converting management environment for growth into that for value or profit is required. Nowadays, funds of construction firms is almost provided by financial institutions. As the firms' size grow, they have a form of fund provision through the securities market; however, fair distribution for returns is not practiced by opening company. Especially, construction firms lost trust of Investor by lack of awareness to firm clearness, and then a vicious cycle of no effectiveness in fund provision through securities market is continued again. On this study correlation between stock quotations and primary financial factors of firms in order to grasp actual management condition in construction firms was analyzed. By this, the correlation between stock quotations and the result of firm management was provided. Also, necessity of firm's capital provision was explained, thus ways to ensure firm clearness was searched.

The Analysis of the Herding Behavior of Korean Institutional Investors: Evidence from the Intraday (일중거래자료를 사용한 기관투자자 군집거래의 분석)

  • Lee, Jae-Hyun;Lee, Ho-Sun
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.83-105
    • /
    • 2013
  • There are many literatures about the herding behavior of institutional investors but there is lack of literatures about the relation among several investor groups consisting of institutional investors. So we investigate the relation among sub-institutional investor groups like bank, insurance companies, pension funds using KRX intraday trading data of 2009. As the result, we find that foreign, individual, and securities firm investors trade in the opposite direction of other investor groups including pension funds. And pension, insurance, asset management, private equity funds, other companies, government, and banks are cross-mimicking each other, so we conclude that these investors make herding behavior. In 2009 institutional investors except securities firms make herding in a short period, and insurance, asset management, pension funds and other companies make herding and self-mimicking in all period, but there is no herding and mimicking after foreign investors.

  • PDF

A Study on the Rational Application of Valuation for Unlisted Stock (비상장주식 가치평가의 합리적 적용방안에 관한 연구)

  • Kim, Heung-Su
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.179-189
    • /
    • 2014
  • Unlisted stocks, each country applies a systematic evaluation of the proposed regulations and how the objectivity and reliability of the valuation is trying to improve. In the case of Korea, the law relating to the assessment of unlisted stocks of a representative and 'Inheritance and Gift Tax Law' and the majority of the information in accordance with this law is. IFRS to the valuation of securities at fair value, such as unlisted stocks, but with the exception that non-marketable securities, the acquisition cost can be replaced by a well-known professional organizations calculation of the amount of stocks that the rules are followed. Therefore, in this study, together with the other examples given statutory valuation theory or technique has been referred to various valuation models in practice. It is significant to provide data that can be used to present a variety of methods for the valuation of unlisted shares and enable rationalization study. But the limitations of this study, the implication is obtained through a single enterprise, the research will continue to be applied to the case study and plan the future by the various sectors of the corporate scale.