• Title/Summary/Keyword: security plan

Search Result 979, Processing Time 0.025 seconds

Enhancement of Security Monitoring & Control System in Zero Trust Security Models (제로트러스트 보안 모델에서 보안관제 시스템 강화 연구)

  • Wonhyung Park
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.51-57
    • /
    • 2022
  • Recently, the concept of zero trust has been introduced, and it is necessary to strengthen the security elements required for the next-generation security control system. Also, the security paradigm in the era of the 4th industrial revolution is changing. Cloud computing and the cybersecurity problems caused by the dramatic changes in the work environment due to the corona 19 virus continue to occur. And at the same time, new cyber attack techniques are becoming more intelligent and advanced, so a future security control system is needed to strengthen security. Based on the core concept of doubting and trusting everything, Zero Trust Security increases security by monitoring all communications and allowing strict authentication and minimal access rights for access requesters. In this paper, we propose a security enhancement plan in the security control field through a zero trust security model that can understand the problems of the existing security control system and solve them.

A Plan of e-Settlement Study for Effective Improvement of e-Money Based on e-Commerce (전자상거래 기반에서 전자화폐의 효율성 향상을 위한 전자결제 연구 방안)

  • Ahn, Byeong-Tae;Lee, Chong-Ha;Chung, Bhum-Suk
    • Management & Information Systems Review
    • /
    • v.19
    • /
    • pp.129-143
    • /
    • 2006
  • The internet industry is gradually increasing according to the explosive explosion of internet and development of information communication industry. Specially, The payment method of settlement means is diversed with development of e-commerce. In this paper, we propose a settlement method using e-settlement in the network. and we suggest a security method for efficiency of e-money. Also, we propose a reform plan of e-settlement system.

  • PDF

A Study on the Traffic Induction Security Plan: On the Case of Japan (교통유도경비 도입방안에 관한 연구: 일본사례를 중심으로)

  • Kim, Tae-Hwan
    • 한국경호경비학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.33-43
    • /
    • 2008
  • 최근 국민소득의 성장과 안전한 삶의 질에 대한 요구는 보다 높은 건설 현장이나 공사장, 도로, 그리고 각종 행사장에서의 안전 관리를 요구하고 있으나 현실은 이에 미치지 못하고 있다. 본 연구에서는 일본에서 시행되고 있는 교통유도경비 제도를 우리의 실태와 분석하여, 방안으로, 경비업과 관과의 상호협력체계마련과 민간자격제도 도입, 그리고, 교육프로그램 개발과 교육의 표준화, 법적지위의 확보에 대한 대안을 제시하였다.

  • PDF

Study on the way of Institutionalized Budget for Information Security (정보보호 강화를 위한 예산편성 제도화 방안 연구)

  • Kim, So-Jeong;Choi, Seok-Jin;Lee, Cheol-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.115-122
    • /
    • 2007
  • US is strengthening the information security by managing federal agency's information and information system systematically. For this purpose. US government put the Federal Information Security Management Act into the E Government Act of 2002. According to the FISMA, it is required to have information securitv management plan for all federal agencies. In addition that, OMB Circular A II requires all federal agencies to identity the ratio of information security investment. That is the basis of strengthening the information security of federal agency, This paper will compare the budget status and information security mechanism of Korea and US.

Study on Minimum Security Requirement Using Risk Priority Number(SFRPN) for Secure Smart Factory (안전한 스마트공장 구축을 위한 위험우선순위(SFRPN) 기반 최소보안요구사항에 관한 연구)

  • Yi, Byung-gueon;Kim, Dong-won;Noh, Bong-nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1323-1333
    • /
    • 2016
  • According to spreading of smart devices and development of communication technology, the security issues come to the fore in the modern factory. Especially, the smart facpry should be considered the risk management plan how to identify and evaluate, control the risks. In this paper, we suggest the minimum security requirements applying SFRPN(Smart Factory Risk Priority Number) model to domestic smart factory on the basis of the results inspecting factories.

The Method of Production of Security Educational Content Considering the Characteristics of MZ Generation (MZ세대 특성을 고려한 보안 교육용 컨텐츠 제작 방안)

  • Jo Hae Min;Ryu Jung Ryol;Sim Chung Sik;Hong Suk Woo
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.157-164
    • /
    • 2023
  • As the MZ generation, which has recently become a hot topic, enters a major generation that plays various social roles, the need for research on efficient educational methods and content production tailored to the level of the MZ generation continues to be raised. In this reality, this paper was described to discuss the direction of development and raising the level of security educational content. To this end, the effectiveness of security educational content currently being used socially was analyzed, the content of a gametoon that combines the concept of gamification with a webtoon as a development plan was explained, and the educational effect was verified through the Likert scale. Furthermore, it was proposed to effectively utilize it by presenting the direction of development applicable to security educational contents.

A Plan to Improve Core Job Skills through the Level Management System : Focusing on the X-ray Screening Rating System (수준관리체계를 통한 핵심 직무역량 향상 방안 - 보안검색요원 판독등급제 중심으로 -)

  • Kim, Dong Min;Baek, Jeong Seon
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.4
    • /
    • pp.677-689
    • /
    • 2023
  • Purpose: The purpose of this study is to design a x-ray screening rating system to improve X-ray screening ability, which is a core job competency of security screener at Incheon International Airport, and to verify its effectiveness through empirical analysis to suggest ways to improve the level management system. Methods: In this study, the effectiveness of the research model was analyzed using T-test tests for effect analysis based on the empirical analysis results derived through the competency evaluation model, the screening rating system. Results: The results of this study are as follows. The average score for regular education before the implementation of the x-ray screening rating system was 94.1 points, but after the implementation of the x-ray screening rating system, the average score for regular education was 95.5 points, an average of 1.4 points increased. In addition, the proportion of those with 95 or more points classified as high scorers also increased significantly from 51.1% to 69.3%. Conclusion: The X-ray screening rating system of security inspectors will systematically manage the level of screening ability, which is a key job competency, and play a strong role in improving competency, while preventing security accidents through early identification and intensive training of level-lowers.

A Study on Private Security in the 1970s (1970년대의 민간경비연구)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.15-24
    • /
    • 2013
  • In the 1960s, economic growth served to step up industrialization and urbanization, which was concurrent with th e urban concentration of population, and this phenomenon led to an increase in crime, and there was a rapid increase in demand for security at the same time. So the law enforcement authorities instituted the security service act in a move to secure quasi-police force. The enactment of the security service act has been put in force up to now, fueling the growth of security business. Mean while, the security industry has attained a splendid growth as one of growth industries, and it's required to look back on the past to determine new directions for the industry to make a new leap forward. Thus, the 1970s was a period to lay the groundwork for Korean private security, and the purpose of this study was to examine the social environments of the 1970s related to private security and what accelerated the development of private security.

Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information) (PC보안솔루션 로그분석을 통한 보안정책 제안 (개인정보유출 방지))

  • Chae, Hyun Tak;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.961-968
    • /
    • 2014
  • In order to prevent leakage of personal information by insiders a large number of companies install pc security solutions like DRM(Digital Right Management), DLP(Data Loss Prevention), Personal information filtering software steadily. However, despite these investments anomalies personal information occurred. To establish proper security policy before implementing pc security solutions, companies can prevent personal information leakage. Furthermore by analyzing the log from the solutions, companies verify the policies implemented effectively and modify security policies. In this paper, we define the required security solutions installed on PC to prevent disclosure of personal information in a variety of PC security solution, plan to integrate operations of the solutions in the blocking personal information leakage point of view and propose security policies through PC security solution log analysis.

Private security development plan through security guard crime statistics analysis

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.283-288
    • /
    • 2021
  • The purpose of this paper is to provide basic data for related studies by comparing and analyzing crimes committed by security guards through criminal statistical analysis, and to contribute to the sound development of the private security industry by strengthening the professional ethics of security guards and reducing guard crimes. The purpose. As a results of a comparative analysis of the number of crimes by security guards and the crime rate are as follows. Although the total number of crimes committed in Korea and the number of crimes committed by security guards decreased every year, the crime rate of security guards was higher than the average crime rate. felonious crimes, violent crimes, customs crimes, and special economic crimes were consistently high. As a countermeasure against the results, first, interest in security guard crimes as perpetrators rather than as victims, second, reinforcement of professional ethics education through new training and job training, third, academic development and systematic It appeared as a specification of the definition and current status of security guards for the study.