• Title/Summary/Keyword: security plan

Search Result 979, Processing Time 0.022 seconds

A Study on Improving the Demonstration Process in the Defense Area with AI Anti-virus System R&D Products (AI백신체계 연구개발 제품의 국방분야 실증 프로세스 개선 연구)

  • Sukjoon Yoon;Jonghyun Kim;Sang-min Lee;Jiwon Kang
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.31-39
    • /
    • 2021
  • In the R&D of the Defense Weapon System, the evaluation of technical and operational aspects has been developed with the military's own test evaluation system, and organizations and procedures have been established and implemented. However, with the recent advancement of information and communication technology in the private sector, it is often necessary to test-apply it to the field by enhancing the operability and suitability of technologies required for defense before development is complete. This paper investigates and analyzes the process for conducing empirical tests on the latest AI vaccine system R&D prototype organized by the Ministry of Science and ICT which proposes an improved demonstration plan for the existing military information system test evaluation procedure. In addition, under the specificity and security of the defense environment, we would like to present a practical demonstration plan and the improvement of the process for demonstrating the security technology prototype.

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

A Study on Selecting and Operating Educational Department in Cyber Security Major by Analyzing Workforce Framework (직무별 특성을 고려한 대학 정보보호 학과의 교육분야 선정 및 운영에 관한 연구)

  • Lim, Won Gyu;Shin, Hyuk;Ahn, Seong Jin
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.99-105
    • /
    • 2015
  • Because intelligent and organized cyber attack, It is difficult to respond to cyber threats with only a small number of information security experts. Accordingly, information security department compared to 2013 it increased by 17%. But there was a problem that cannot train appropriate students for companies. This research examined the Workforce Framework and Knowledge Units for improving this situation. Based on this, educational department in cyber security major was selected to be learning at the university. And it proposed a plan for a managing course to operate. And the result will be utilized as fundamental research of human resources medium- and long-term demand and supply planning in cyber security department.

Study on the Effective Management Plans of Mobilization Security Business which Utilizes NFC (NFC를 활용한 출동경비업무의 효율적 관리방안에 관한 연구)

  • Kim, Min Su;Lee, Dong Hwi;Kim, Kui Nam J.
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.95-100
    • /
    • 2013
  • As the near field communication technology's application scope tends to expand gradually in the various fields, application of mobile-based NFC(Near Field Communication) is increasing in the various types of technologies. The method which reads the URL address and supports access to the web site of the address if you touch the NFC device in the tag(RFID) that the URL address is stored was applied to the unmanned security system. It proposed the effective plan to manage mobilization security business in the aspects of Integrity, Damage, Real-Time, and Speed through comparison and verification of the method with the existing unmanned security system.

Analysis of Security Trends in Smart Cities(A focus on grids, buildings, and transportation) (스마트시티(그리드, 빌딩, 교통 중심)보안 동향 분석)

  • Jeom-goo, Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.37-47
    • /
    • 2022
  • The need for smart city is emerging all over the world to solve these urban problems such as urban resource and infrastructure shortage, traffic congestion, energy problems and to preemptively respond to the fourth industrial revolution. The analysis that the security of smart city technology is dangerous is dominant all over the world. In this paper, we analyze the technology, security threats and responses of smart city, which are the main security issues of smart city, limited to smart grid, smart building, and smart traffic. In the future, the analysis of various technologies of smart city construction and the research on cyber security are actively progressing, and this paper is expected to be the beginning of the solution plan.

A Study on the Partnership of the Japanese Police and Private Security (일본 경찰과 민간의 협력에 관한 연구)

  • Ahn, Hwang Kwon;Ahn, Chung Joon
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.61-70
    • /
    • 2012
  • The security law and security industry of Japan have a great impact on Korea. In a modern sense, there are little large disparities between the two nations in the history and development of private security. However, the way they look at private security is not the same in large part. In Japan, private security companies are highly regarded by Japanese people as organizations that guarantee their safety, owing to the efforts of private security companies themselves, the National Security Association and civic groups. Private security has especially been approved and supported since it was decided in the anticrime cabinet council in December, 2003, in line with the action plan for the realization of anticrime society to boost private security as an industry to ensure people's safety in daily routine life by curbing crimes that might pose a threat to peaceful life. Afterwards, there has been a dynamic collaboration between the Japanese police and private security in terms of education, crime prevention, disaster prevention/restoration and everyday life safety. As for Korea, the necessity of cooperation between private security and the police is increasingly stressed, and it's required to strengthen their partnership to ensure successful crime prevention in consideration of Japanese partnership cases. In Japan, the police, civic groups, the security association and security companies make every effort to satisfy Japanese people's safety needs in diverse ways and take disaster-prevention measures as well.

Development of Freelance System for Private Security Work (민간경비업무 프리랜서제도 발전방안)

  • Ha, Jeong Hoon
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.137-153
    • /
    • 2019
  • The private security industry in Korea has developed considerably with the development of economic growth and IT technology. The purpose of this study is to explore the development method of the freelance system for private security work based on the problems of the freelance system that CEO of the security company in the private security work field recognize. To accomplish the purpose of this study, we interviewed 3 professors and 6 CEO of the security company to analyze the data. They suggested the development of the freelance system of private security work as follows. First, the systematic management of freelance security guards is needed. Secondly, the training for the manager of the freelance security guards should be done. Third, a minimum wage compliance check is required. Fourth, the contents of freelance system should be added to the reality in accordance with the security law. Fifth, the social security system of freelance security guards should be improved. Sixth, the establishment of a freelance security guard cooperative is necessary.

The Power Analysis of Smart Work Industry and Increase Plan (스마트워크 산업 경쟁력 분석 및 육성방안)

  • Yu, Seung-Yeob;Noh, Kyoo-Sung
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.187-196
    • /
    • 2011
  • This study found the power analysis and increase plan of Smart work industry out. We did the internet survey with 117 experts of Smart work and analyzed International competitive power and Smart work marketability. The results was as follows: First, Experts recognized the growth about Cloud computing industry so that they were most high. Second, The thing which the earning of Smart work industry is high appeared a Security industry, Cloud computing industry, and Mobile office industry etc sequence. Third, The Smart work industry which an international technique power level is high appeared in a Smart e-learning industry, Mobile office industry, and Security industry etc sequence. Lastly, An Smart work industry which the concentration supports in the government dimension Security industry, Cloud computing industry, Smart work user SW industry, and Smart e-learning industry etc sequence. This research products will use for there even though it prepares a concentration support industry in the government dimension an activation policy.

The Study on Corporate Information Security Governance Model for CEO (최고경영자를 위한 기업 정보보호 거버넌스 모델에 대한 연구)

  • Kim, Do Hyeong
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.39-44
    • /
    • 2017
  • The existing enterprise information security activities were centered on the information security organization, and the top management considers information security and enterprise management to be separate. However, various kinds of security incidents are constantly occurring. In order to cope with such incidents, it is necessary to protect information in terms of business management, not just information security organization. In this study, we examine the existing corporate governance and IT governance, and present an information security governance model that can reflect the business goals of the enterprise and the goals of the management. The information security governance model proposed in this paper induces the participation of top management from the planning stage and establishes information security goals. We can strengthen information security activities by establishing an information security plan, establishing and operating an information security system, and reporting the results to top management through compliance audit, vulnerability analysis and risk management.

Research on Expansion and Improvement Approaches of Information Security Budget for Cybersecurity Enhancement (정보보호 기반 강화를 위한 정보보호 예산 확대 및 개선 방안 연구)

  • Bae, Sunha;KIM, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1279-1294
    • /
    • 2016
  • Information security to use information technology(IT) in safety and reliability environment is becoming of great importance. In advanced countries including United States and United Kingdom are consistently expanding budget for information security. Korea also has been a growing interest in information security and Korea government announced plan to develop information security into next-generation growth engine. However, information security budget has increased slightly in recent years, so many national institutions and state governments have budget shortfall to perform information security work. Moreover budget items do not include generic contents about information security and there are confined to some security SW, HW and services. It is necessary to expand information security budget for enhancement national capabilities of information security. In this paper, we analyze the IT and information security budget situation for Korea and United States and propose effective budget expansion and improvement approaches for Korea.