• 제목/요약/키워드: security associations

검색결과 45건 처리시간 0.021초

신변보호사(경호사) 자격제도 도입방안 (A Study on Introduction Plan of the Private Security Guard System)

  • 김태환;박대우
    • 한국안전학회지
    • /
    • 제20권2호
    • /
    • pp.146-150
    • /
    • 2005
  • According to the current record of Private Security in Korea, more than 110,231 private security guards and around 2,213 security guard associations are engaged in the private security industries. However, there is no a professional license for the private security. In order to be provided a high quality service from private security industries, the security guard should be required his/her professional qualification which can be upgraded by establishing a professional license system. For introducing the license system the government and security guard associations need to support the suitable training program including curriculum and method, and all associations related to the private security have to require people involved in any kinds of private security matters to complete obligatorily some educational training programs. And also, to complete a college should be the minimum requirement.

Impact of Trust-based Security Association and Mobility on the Delay Metric in MANET

  • Nguyen, Dang Quan;Toulgoat, Mylene;Lamont, Louise
    • Journal of Communications and Networks
    • /
    • 제18권1호
    • /
    • pp.105-111
    • /
    • 2016
  • Trust models in the literature of MANETs commonly assume that packets have different security requirements. Before a node forwards a packet, if the recipient's trust level does not meet the packet's requirement level, then the recipient must perform certain security association procedures, such as re-authentication. We present in this paper an analysis of the epidemic broadcast delay in such context. The network, mobility and trust models presented in this paper are quite generic and allow us to obtain the delay component induced only by the security associations along a path. Numerical results obtained by simulations also confirm the accuracy of the analysis. In particular, we can observe from both simulation's and analysis results that, for large and sparsely connected networks, the delay caused by security associations is very small compared to the total delay of a packet. This also means that parameters like network density and nodes' velocity, rather than any trust model parameter, have more impact on the overall delay.

민간조사업 전문직업화에 대한 연구 (A Study on the Professionalization of Private Investigation Service)

  • 이강훈
    • 시큐리티연구
    • /
    • 제32호
    • /
    • pp.177-204
    • /
    • 2012
  • 본 연구는 민간조사 전문직업화의 실태를 분석하여, 이를 기초로 향후 민간조사업의 직업전문성을 제고하기 위한 방안을 모색해 보고자 하는데 그 목적이 있다. 이를 위해 이론적 논의와 선행연구를 바탕으로 전문직업화 과정을 밝히는 구조적인 접근방식의 전문직 특징인 전문협회, 전문지식, 교육과정, 자격제도, 윤리규정의 네 가지 요소를 중심으로 민간조사업의 전문직업화 실태를 분석하였다. 실태분석 결과를 바탕으로 민간조사업의 직업전문성을 제고하기 위해서는 법인화를 위한 관련 협회들 간의 적극적인 노력, 전문지식 편중성의 극복, 전문교과 과정의 편성 운영, 공인화된 자격제도로의 전환, 윤리강령의 제정 등이 요구된다고 할 수 있다.

  • PDF

Enhanced Security Scheme to Support Secure and Fast ASN-anchored Mobility in Mobile WiMAX

  • Park, Chang-Seop;Kang, Hyun-Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권11호
    • /
    • pp.2204-2220
    • /
    • 2011
  • Without providing a proper security measure to the handover procedure in Mobile WiMAX, several security attacks can be mounted. Even though security schemes have been previously proposed for this purpose, they are still vulnerable to several security attacks due to fatal design flaws. A newly proposed security scheme in this paper is based on the framework of authentication domain and concept of handover ticket. A method of establishing security associations within the authentication domain is proposed, and a lightweight security measure to protect the management messages associated with the handover is also proposed. Especially, using the handover ticket, the new security scheme can defend against a Redirection Attack arising from a compromised base station. The new security scheme is comparatively analyzed with the previous security schemes in terms of Replay, Session Hijacking, Man-In-The-Middle, and Redirection attacks.

The System for Ensuring the Information Security of the Organization in the Context of COVID-19 Based on Public-Private Partnership

  • Dzyana, Halyna;Pasichnyk, Vasyl;Garmash, Yevgen;Naumko, Mykhaylo;Didych, Oleg
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.19-24
    • /
    • 2022
  • The main purpose of the study is to analyze the current state of the organization's information security system in the context of COVID-19 on the basis of public-private partnership. The development of public-private interaction in information security is one of the priorities of the state policy of many estates. Among the priorities of public-private partnership in cybersecurity and information security, there is an expansion of interaction between government agencies and private scientific institutions, public associations and volunteer organizations, including in training, as well as increasing the digital literacy of citizens and the security culture in cyberspace. As a result of the study, the foundations of the organization's information security system in the context of COVID 19 were formed on the basis of public-private partnership.

Specialists' Views Concerning the Assessment, Evaluation, and Programming System (AEPS) in Associations for Children with Disabilities in Saudi Arabia

  • Munchi, Khiryah S.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.91-100
    • /
    • 2022
  • To support early intervention, it is necessary to develop programming system tools that enable accurate, valid, and reliable assessments and can help achieve reasonable, generalizable, and measurable goals. This study examined the Assessment, Evaluation, and Programming System (AEPS) used by associations of children with disabilities in Saudi Arabia to assess its suitability for children with intellectual disabilities. A group of 16 specialists with different professional backgrounds (including special education, physiotherapy, occupational therapy, speech therapy and psychology) from 11 associations of children with disabilities took part in semi-structured personal interviews. The study concluded that AEPS is generally suited for use with children with intellectual disabilities. However, its suitability depends on the type and severity of the child's disability. The more severe the disability, the less effective the AEPS is likely to be. On the basis of this finding the researchers formed interdisciplinary teams to organise and integrate the children's learning and assess the benefits of AEPS, including its accuracy and ability to achieve adaptive, cognitive, and social targets, enhance family engagement and learning and develop basic development skills. This study also identified obstacles associated with the use of AEPS. These include the lack of comprehensiveness and accuracy of the goal, lack of precision and non-applicability to large movements and the fact that it cannot be used with all children with intellectual disabilities. In addition, the research showed that non-cooperation within the family is a major obstacle to the implementation of the AEPS. The results of this study have several implications.

Inter-Territorial Collaboration in the Context of Strengthening Its Economic Security

  • Hlazov, Oleksandr;Kalashnikova, Khrystyna;Zolotarov, Volodymyr;Levchenko, Iaroslava;Britchenko, Igor;Losonczi, Peter
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.675-683
    • /
    • 2021
  • An article is devoted to developing the concept of inter-territorial collaboration in the context of strengthening its economic security. This concept is based on the study of international experience and successful OTG functioning in Ukraine. The idea includes directions, forms, tools, procedures, and financial sources for joint projects that strengthen territorial associations' economic security. The research consists of assessing the state of economic development of territorial communities and forms of their cooperation with other territorial communities. Analysis, synthesis, induction, and deduction are the main methods of scientific knowledge used to summarize statistical information, normative and legal support, and global experience of cooperation of territorial communities. The study results include the main areas of cooperation of territorial communities in Ukraine, including long-term collaboration. The study also contains successful examples of collaboration between different territorial communities, applying practical aspects and tools to form effective interaction. The main points of discussion concern various forms of interaction between territorial communities, which allow achieving the economic goal more quickly and effectively.

정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘 (Prototype Design and Security Association Mechanism for Policy-based on Security Management Model)

  • 황윤철;현정식;이상호
    • 정보보호학회논문지
    • /
    • 제13권1호
    • /
    • pp.131-138
    • /
    • 2003
  • 인터넷 서비스가 대중화되면서부터 네트워크상의 통신 및 시스템을 안전하게 보호하기 위한 네트워크 보안 관리가 시급한 문제로 부상되고 있다. 이에 따라 침입탐지 시스템, 침입차단 시스템, VPN과 같은 보안 장비들이 급속히 사용화 되고 있는 실정이다. 그러나 이들 보안 장비들은 단일환경, 단일 시스템에서 제각기 독립적으로 기능하기 때문에 보안 대상이 매우 제한적이며, 벤더별로 상이한 구조로 인해 강호 유기적인 통합기능을 제공하지 못하고 있는 실정이다. 따라서 이 논문에서는 일관성 있고 체계적인 보안정책을 네트워크를 대상으로 적절하게 적용할 수 있는 계층적 구조의 정책기반 보안관리 모델을 제시하고, 각기 다른 보안 영역에 따라 다르게 정의된 보안 정책들에 대한 관리와 협상을 용이하게 하는 정책 협상 메커니즘과 프로토타입을 제시한다. 이 연구 결과는 다양한 환경의 네트워크에서 보안정책 서버 및 보안 기술의 개발에 지침으로 활용이 가능하며, 또한 네트워크 전체의 보안성을 향상시킬 수 있으며, 각 호스트간의 보안 정책 협상을 효율적으로 지원할 수 있다.

A Secure WLAN Authentication Scheme

  • Singh, Rajeev;Sharma, Teek Parval
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권3호
    • /
    • pp.176-187
    • /
    • 2013
  • Message replay, malicious Access Point (AP) associations and Denial of Service (DoS) attacks are the major threats in Wireless LANs. These threats are possible due to a lack of proper authentication and insecure message communications between wireless devices. Current wireless authentication & key exchange (AKE) schemes and security protocols (WEP, WPA and IEEE 802.11i) are not sufficient against these threats. This paper presents a novel Secure WLAN Authentication Scheme (SWAS). The scheme introduces the delegation concept of mobile authentication in WLANs, and provides mutual authentication to all parties (Wireless Station, Access Point and Authentication Server). The messages involved in the process serve both authentication and key refreshing purposes. The scheme enhances the security by protecting the messages through cryptographic techniques and reduces the DoS impact. The results showed that cryptographic techniques do not result in extra latencies in authentication. The scheme also reduces the communication cost and network overhead.

  • PDF

모바일 RFID 서비스를 위한 QoS 및 보안 모델 (Mobile RFID Service QoS, Security Model)

  • 김말희;이용준
    • 한국통신학회논문지
    • /
    • 제31권5C호
    • /
    • pp.562-567
    • /
    • 2006
  • 본 논문은 Diameter 프로토콜을 이용하여 모바일 RFID 서비스를 위한 구성 노드 간 보안 연관을 설정하여 노드 간 통신에 대한 보안을 제공하며, 모바일 RFID 서비스 사용자의 QoS 기반 권한 검증을 제공함으로써, 차별적인 서비스를 제공할 수 있도록 한다. 본 논문은 현재 우리나라에서 표준으로 제정중인 모바일 RFID 기술을 전제로 하며 따라서 900MHz 주파수 대역을 사용하는 RFID tag와 휴대폰에 장착되는 RFID 리더를 사용하는 환경을 가정한다. 또한 Diameter AAA 서버를 이용하여 망 접속 인증을 수행하는 환경을 가정한다. Diameter AAA 서버를 이용하여 망 접속 인증을 수행한 후, 사용자의 QoS와 서버의 정책에 따른 권한 검증을 수행하며, 모바일 RFID 서비스 노드 간 보안 정책을 동적으로 생성하여 분배한다. 보안 연관이 수립 가능한 구간은 RFID 태그와 RFID 리더간, RFID 리더(휴대폰)와 모바일 RFID 서비스 에이전트(Diameter AAA Client)간, 휴대폰과 응용 서버(OIS:Object Information Service)간, 휴대폰과 이력정보제공서버(OTS : Object Traceability Service) 간 휴대폰과 과금/결재 서버 간으로 한다.