• Title/Summary/Keyword: security component

Search Result 407, Processing Time 0.025 seconds

Evaluation and Developmental Direction for International Maritime Security Cooperation (Maritime Security Cooperation in the Malacca Strate and adjioning seas of Somalia as centered) (국제해양안보협력의 평가와 발전방향 (소말리아 근해와 말라카 해협의 해적대응을 위한 해양안보협력을 중심으로))

  • Park, Eung-Soo;Ko, Kwang-Soop
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.303-310
    • /
    • 2010
  • Today, about 98% of the international trade which leads the global economy is conducted at seas. This situation shows that maritime security is a key component for the stable development not only for international economy but also for the international security. Further, it suggests that the international society have reached to the stage that needs to fundamentally evaluate issues of the international maritime security cooperation and make further development. However, the international cooperation might not be an easy task to achieve because each nation faces different maritime security issues and maritime security cooperations require massive manpower and budgets due to diverse types of threats. Therefore, this paper analyzes status and issues of maritime security cooperation in vicinity of Malacca Strait and Somalian seas as key SLOCs for international economy. Based on this analysis, this paper aims to contribute to improve stability for the international economy by suggesting directions for the further development.

  • PDF

Optimization of Data Placement using Principal Component Analysis based Pareto-optimal method for Multi-Cloud Storage Environment

  • Latha, V.L. Padma;Reddy, N. Sudhakar;Babu, A. Suresh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.248-256
    • /
    • 2021
  • Now that we're in the big data era, data has taken on a new significance as the storage capacity has exploded from trillion bytes to petabytes at breakneck pace. As the use of cloud computing expands and becomes more commonly accepted, several businesses and institutions are opting to store their requests and data there. Cloud storage's concept of a nearly infinite storage resource pool makes data storage and access scalable and readily available. The majority of them, on the other hand, favour a single cloud because of the simplicity and inexpensive storage costs it offers in the near run. Cloud-based data storage, on the other hand, has concerns such as vendor lock-in, privacy leakage and unavailability. With geographically dispersed cloud storage providers, multicloud storage can alleviate these dangers. One of the key challenges in this storage system is to arrange user data in a cost-effective and high-availability manner. A multicloud storage architecture is given in this study. Next, a multi-objective optimization problem is defined to minimise total costs and maximise data availability at the same time, which can be solved using a technique based on the non-dominated sorting genetic algorithm II (NSGA-II) and obtain a set of non-dominated solutions known as the Pareto-optimal set.. When consumers can't pick from the Pareto-optimal set directly, a method based on Principal Component Analysis (PCA) is presented to find the best answer. To sum it all up, thorough tests based on a variety of real-world cloud storage scenarios have proven that the proposed method performs as expected.

Improvement Plan on Park Geun-Hye Government's Policy Implementation for Social Security (박근혜 정부의 사회안전 정책추진 발전방안)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.35
    • /
    • pp.87-124
    • /
    • 2013
  • This paper studies changes in people's social security awareness during Lee Myung-Bak government, and based on the result, suggests future Park Geun-Hye government's social-security-related administration management plan. In specific, the changes in people's social security awareness in the period of 2008 ~ 2012 have been analyzed, and the result has been utilized to draw suggestions on the future social-security-related administration management plan The result is as the following: First, comprehensive social-security-related policy must be continuously pushed. In terms of the fact that social security is closely related to people's daily lives and life itself, every major component of social security cannot be overlooked. Therefore, comprehensive administration management and policies on each of those components are necessary. Second, social security policies must be reinforced enough for people to actually witness. In case of crime rate, 57.1% of people are pointing it as one of the main causes of social unrest; therefore, this national anxiety must be met with focusing awareness on the subject nation-widely and with thorough national defense preparedness. Third, mutual cooperation between social-security-related branches, and systematic management within the each branches are required. In order to systematically manage every aspect of social security, not only the big agencies - such as Ministry of Security and Public Administration, Ministry of National Defense, Prosecution Service, or National Police Agency -, but most of other parts of administration must cooperate as well. Fourth, consistency in social security policies is necessary. As Park Geun-Hye government's administrative slogans are, "secure and integrated society," "establishing a foundation for happy unification era," which are similar to that of previous administration, the administration should be consistent on its social-security-related politics, rather than differentiating themselves from the previous administration.

  • PDF

A Study on Efficient Component In Patch Manangement System (패치관리시스템의 효율적인 구성요소에 관한 연구)

  • Lee, In-Yong;Lee, Su-Young;Moon, Jong-Sub;Lim, Jong-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.21-24
    • /
    • 2008
  • 컴퓨터가 대중화 되면서 다양한 소프트웨어에 대한 수요가 증가하게 되었고, 많은 소프트웨어들이 단시간에 개발되어지고 있다. 이런 이유로 많은 소프트웨어들에 대한 취약점들이 생겨나게 되었고, 이를 해결하기 위해서 소프트웨어 벤더들은 패치를 만들고 배포를 하고 있다. 하지만, 다양한 시스템과 소프트웨어를 관리하는 곳에서 일일이 패치를 벤더로부터 받아 대상시스템에 설치하고 관리하기에는 어려움이 많으며, 일괄적이고 통합적인 방법이 필요하다. 이런 문제와 요구를 해결하기 위해 패치관리시스템에 관한 많은 연구들이 진행되어 왔으며 상용제품들도 하나둘씩 개발되고 있다. 하지만, 안타깝게도 많은 패치관련연구들이 안전한 패치관리시스템 설계나 구성에 관해서만 연구되고 진행되어 왔다. 안전한 패치관리시스템을 설계하거나 구성하기 전에 무엇보다도 우선시 되어야 하는 것이 필수적인 패치관리시스템 구성요소들을 정의하는 것이며, 이와 관련된 표준이나 연구가 많이 부족하다. 따라서 본 논문은 패치관리시스템을 구성하기 위한 기본적이면서 필수적인 구성요소들을 고려하고 정의했으며, 이를 바탕으로 기본 패치관리시스템 프레임워크를 설계했다.

  • PDF

Component Analysis of DevOps and DevSecOps (DevOps와 DevSecOps의 컴포넌트 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.9
    • /
    • pp.47-53
    • /
    • 2019
  • This paper is analyzed of the characteristics of development operations and development security operations of the software and product, and the use analysis tools from a software code perspective. Also, it is emphasized the importance of human factors and the need to strengthen them, when considering security design rules. In this paper, we consider a secure process for managing change, focusing on fast and accurate decision-making in terms of procedural factors, when considering development security operations. In addition, the paper discussed the need for maturity model analysis in relation to the development security operating characteristics, and analyzed the meaning of the analysis elements through detailed procedures for the strength and integration elements of the dynamic and static elements accordingly. The paper also analyzed factors such as scanning activity and code analysis for threat modeling and compliance and control.

Robust and Auditable Secure Data Access Control in Clouds

  • KARPAGADEEPA.S;VIJAYAKUMAR.P
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.95-102
    • /
    • 2024
  • In distributed computing, accessible encryption strategy over Auditable data is a hot research field. Be that as it may, most existing system on encoded look and auditable over outsourced cloud information and disregard customized seek goal. Distributed storage space get to manage is imperative for the security of given information, where information security is executed just for the encoded content. It is a smaller amount secure in light of the fact that the Intruder has been endeavored to separate the scrambled records or Information. To determine this issue we have actualize (CBC) figure piece fastening. It is tied in with adding XOR each plaintext piece to the figure content square that was already delivered. We propose a novel heterogeneous structure to evaluate the issue of single-point execution bottleneck and give a more proficient access control plot with a reviewing component. In the interim, in our plan, a CA (Central Authority) is acquainted with create mystery keys for authenticity confirmed clients. Not at all like other multi specialist get to control plots, each of the experts in our plan deals with the entire trait set independently. Keywords: Cloud storage, Access control, Auditing, CBC.

Development of Real-Time Face Region Recognition System for City-Security CCTV (도심방범용 CCTV를 위한 실시간 얼굴 영역 인식 시스템)

  • Kim, Young-Ho;Kim, Jin-Hong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.504-511
    • /
    • 2010
  • In this paper, we propose the face region recognition system for City-Security CCTV(Closed Circuit Television) using hippocampal neural network which is modelling of human brain's hippocampus. This system is composed of feature extraction, learning and recognition part. The feature extraction part is constructed using PCA(Principal Component Analysis) and LDA(Linear Discriminants Analysis). In the learning part, it can label the features of the image-data which are inputted according to the order of hippocampal neuron structure to reaction-pattern according to the adjustment of a good impression in a dentate gyrus and remove the noise through the auto-associative memory in the CA3 region. In the CA1 region receiving the information of the CA3, it can make long-term memory learned by neuron. Experiments confirm the each recognition rate, that are shape change and light change. The experimental results show that we can compare a feature extraction and learning method proposed in this paper of any other methods, and we can confirm that the proposed method is superior to existing methods.

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF

A Case Study on the Application of RMF to Domestic Weapon System (국내 무기체계에 대한 RMF 적용 실 사례 연구)

  • Cho, Hyun-suk;Cha, Sung-yong;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1463-1475
    • /
    • 2019
  • Unlike the past, modern high-tech weapons systems are complex and many components are combined to form a weapons system. In addition, unlike the past, where hardware was the main component, the proportion of software is increasing every year, making the security assurance activities of weapon systems more difficult than in the past. The United States has been working to ensure the security of the weapons systems they develop since the 1960s. The findings were made to US internal standards, updated regularly, and are now being applied as RMF. In Korea, research activities have been conducted since 2010 based on the RMF of the United States. However, actual RMF application cases in the United States cannot be classified and obtained, and there are no official cases in Korea. In this paper, we apply Korean RMF research that has been studied so far to apply to the recently developed real weapon system. Thus, detailed guidelines for applying the RMF are presented.

A Study on Measurements of IT Security Service Quality : Feasibility of Quantitative Measures (IT 보안 서비스 품질의 측정 방법에 관한 연구 : 정량 지표의 사용 가능성)

  • Kyung, Ji Hoon;Kim, Chong Su
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.30-38
    • /
    • 2015
  • IT security service provides customers with the capability of protecting the networked information asset and infrastructures, and the scope of security service is expanding from a technology-intensive task to a comprehensive protection system for IT environment. To improve the quality of this service, a research model which help assess the quality is required. Several research models have been proposed and used in various service areas, but few cases are found for IT security service. In this work, a research model for the IT security quality has been proposed, based on research models such as SERVQUAL and E-S-QUAL. With the proposed model, factors which affect the service quality and the best quality measure have been identified. And the feasibility of using quantitative measures for quality has been examined. For analysis, structural equation modeling and various statistical methods such as principal component analysis were used. The result shows that satisfaction is the most significant measure affected by the proposed quality factors. Two quality factors, fulfillment and empathy, are the main determinants of the service quality. This leads to a strategy of quality improvement based on factors of emotion and perception, not of technology. The quantitative measures are considered as promising alternative measures, when combined with other measures. In order to design reliable quantitative measures, more work should be done on target processing time and users' expectation. It is hoped that work of this research will provide efficient tools and methods to improve the quality of IT security service and help future research works for other IT service areas.