• Title/Summary/Keyword: security plan

Search Result 979, Processing Time 0.03 seconds

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design (보안 에이전트 역할 기반에 기초한 의료정보시스템 소프트웨어 보안아키텍쳐 설계방안)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.77-83
    • /
    • 2011
  • In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.

Implementation and Design of Policy Based Security System for Integration Management (통합 관리를 위한 정책 기반의 보안시스템 설계 및 구현)

  • Kim, Yong-Tak;Lee, Jong-Min;Kim, Tai-Suk;Kwon, Oh-Jun
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.8
    • /
    • pp.1052-1059
    • /
    • 2007
  • Network security system used in the large scale network composes individual security system which protects only own domain. Problems of individual security system are not to protect the backbone network and to be hard to cope with in real-time. In this paper we proposed a security system which includes security function at the router, and the access point, which exist at the backbone network, to solve the problems. This security system sends the alert messages to an integrated security management system after detecting intrusions. The integrated security management system releases confrontation plan to each suity system. Thus the systematic and immediate confrontation is possible. We analyzed function verification and efficiency by using the security system and the integrated security management system suggested in this paper. We confirmed this integrated security management system has a possibility of a systematic and immediate confrontation.

  • PDF

Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing (클라우드컴퓨팅 이용 신용카드사의 영세수탁자 개인신용정보 보호방안)

  • Kim, Shi-in;Kim, In-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.885-895
    • /
    • 2019
  • As seen in recent cases of hacking in financial services, attackers are attempting to hacking trustee with poor security management, rather than directly hacking a financial company. As a result, the consignor is strengthening the security check and control of the trustee, but small trustee has difficulties to invest in information security with the lack of computer facilities and the excessive cost of security equipment. In this paper I investigate the vulnerability of personal information processing life cycle standards in order to enhance the security of small consignee that receive personal information form the credit card company. To solve the vulnerability the company should use litigation management system constructed on cloud computing service and install VPN to secure confidentiality and intergrity in data transfer section. Also, to enhance the security of users, it is suggested to protect personal credit information by installing PC firewall and output security on user PC.

The Effect of Class Satisfaction among Students in the Department of Security Services on Career Decision Efficacy (경호학과 학생들의 전공수업만족도가 진로 결정 효능감에 미치는 영향)

  • Paek, Kyung-Hwa;Ji, Chi-Hwan
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.19-33
    • /
    • 2009
  • This study attempted to investigate the effect of class satisfaction of the students majoring in the studies of security services on the efficacy of career decision. To do this, I chose 430 security services of the students majoring by the systematic stratified cluster random sampling as the subject of study. All data were analyzed the causal relationship of the collected equation. In order to do a data analysis used descriptive statistics analysis, t-test, one-way ANOVA and multiple regression analysis of SPSS. As a result, the following conclusion was drawn: First, it was found that there was not a statistically significant(learning factor, interpersonal relation, aptitude factor) difference in their major class satisfaction and career decision efficacy(goal choice, future plan, working information) according to gender. Second, it was found that there was a statistically signifiant difference in such factors as learning, interpersonal relations and aptitude, in relation to the difference in subfactor such as major class satisfaction and career decision efficacy. Third, it was found that the learning, aptitude and career factors of major class satisfaction had a statistically significant effect on the future plan. Fourth, it was found that he learning and career factors of major class satisfaction had a statistically significant effect on the resolution of the goal. Fifth, it was found that the aptitude and career factors of major class satisfaction had a statistically significant effect on job information. Sixth, it was found that the career factors of major class satisfaction had a statistically significant effect on the problem-solution. Therefore, we must first give priority to improve the class satisfaction. By doing this, we can raise the efficacy level of career decision.

  • PDF

A Study on Architectural Results and Specific Characters of according to an Agreement Method in Housing Complex Plan - Focused on the Bong Mu-dong Town House in Daegu (집합주택계획에서 협의방식을 통해 나타난 건축적 성과와 특성에 관한 연구 - 대구광역시 '봉무동 타운하우스'를 중심으로 -)

  • Lee Jeong-Ho;Yoon Young Do
    • Journal of the Korean housing association
    • /
    • v.17 no.1
    • /
    • pp.145-153
    • /
    • 2006
  • Making of agreement with participation subjects is important process laying stress on presentation and a reasonable design guide line to form space order grant and synthetic space in Housing Complex plan. This study analyzed residing application specific character of design guide line that is presented to architects in general planning laying stress on plan only of 'Bongmu-dong town house' and design agreement of by architectural result that appear analyze. Result that analyze is as following: 1) Confer in 18 plan contents and integrate design or was adjusted. Being main conduct and unit plan and residing only in plan many negotiations accomplish. Architect who confer most Designs of 5 architects is 'Jean Michel Wilmott' and 'Shigeru Ban' 2) contents that confer much in plan main conduct and unit generation were details plan. Contents that is conferred with many architects are about door/core/rooftop be and asked a question about proper size of entrance. Negotiation about size was expose to the tribe of knowledge about element that do furniture and detail of necessary each space in life style of our country. We must present furnitures or detail element that appear by emotion of our country and detailed item of furnitures' size etc.. in guide line. It is immediate that creation of guide that architects can approach easily for lacking abroad architects of interests by code difference in each country is pressing. 3) In residing plan 4 architects of 5 architects applied similarly guide line in design. Most architects look by active support that make synthetic housing complex. and this is construed that act positively to make by unified residing. That plan of woods or landscape architecture and security of green area space are thing to approach on 'Environment-friendly mode of life residing only' that is general planning subject of 'Bongmu-dong town house'. 4) common question items of architects guide line of though is refered definitely when make out effective interests plan. So that can overcome legislation difference, countermeasure to make understood construction code of our country is pressing

The Evaluation-based CBR Model for Security Risk Analysis (보안위험분석을 위한 평가기반 CBR모델)

  • Bang, Young-Hwan;Lee, Gang-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.282-287
    • /
    • 2007
  • Information society is dramatically developing in the various areas of finance, trade, medical service, energy, and education using information system. Evaluation for risk analysis should be done before security management for information system and security risk analysis is the best method to safely prevent it from occurrence, solving weaknesses of information security service. In this paper, Modeling it did the evaluation-base CBD function it will be able to establish the evaluation plan of optimum. Evaluation-based CBD(case-based reasoning) functions manages a security risk analysis evaluation at project unit. it evaluate the evaluation instance for beginning of history degree of existing. It seeks the evaluation instance which is similar and Result security risk analysis evaluation of optimum about under using planning.

A Study on The Leak of Core Business Technologies Using Preventative Security Methods Such as Clustering (군집화를 이용한 기업 핵심기술 유출자 분류에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.23-28
    • /
    • 2010
  • Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and invesment companies. This shows that the source of the leaks are internal personnel. In this manner, we can infer that the management and plan of personnel security has not implemented sound practices to prevent technology leak by people. Therefore, this thesis suggests classifying methods of technology leak through clustering, one of the data mining methods about the information of internal personnel to prevent core technology leak from businesses.

A Study on the Countermeasure Technology for Fin-Tech Optimized Financial Security (금융 보안에 최적화된 Fin-Tech 대응기술 연구)

  • Kim, Seokhoon;Kwak, Ha-Min
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.25-30
    • /
    • 2015
  • Recently, interest in Fin-Tech, a compound word of finance and technology, has been increased. However, Fin-Tech that is a mixture of finance and IT is exposed in terms of security. In this paper, we propose a method to solve the security-related problem that occurs in the financial sector where the Fin-Tech is used. Proposed method found out different problems of services which are provided by companies through a variety of financial sectors and described a method to facilitate the security service. In particular, proposed method presents a service plan to secure safety and to minimize the damage. Also, proposed method set an objective to stabilize financial services based on analyzed result after analyzing the problems of existing FinTech security services.

  • PDF

A Study on a Plan for Improving a Smart Time and Attendance Management System by Applying NFC (근거리 통신 기법을 이용한 근태관리 시스템에 관한 연구)

  • Lee, Young Ho;Hwang, Hyun Seok;Kang, Min Gyu
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.77-83
    • /
    • 2014
  • In times past, the awareness of security held good on the physical aspect, but it has been expanded to the aspect of information security and management security owing to the development of information and communication technology, therefore an effort is being made to meet multidimensional security needs. These realities are currently changing the viewpoint of consumers from manned guarding to machine-aided guarding. The change to the machine-aided guarding caused the profitability problem of manned guarding companies, and brought about a reverse side effect that prompt and correct countermeasure was inferior to that of manned-guarding. Therefore, this study proposes a 'smart time & attendance management system' that can be applied to various types of work and can minimize position information.

Defense ICT Supply Chain Security Threat Response Plan (국방 ICT 공급에 대한 보안 위협 대응 방안)

  • Lee, Yong-Joon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.125-134
    • /
    • 2020
  • The potential security threat is increasing as the supply of ICT products to the defense sector increases with the development of information and communication technology. Attempts to neutralize, such as intelligence gathering and destruction, through attacks on the defense power support system and the intelligence system of the weapons system could pose a fatal threat.Therefore, security measures of supply chain shear system that take into account ICT product production and operation stage to maintenance stage are needed in defense field. In the paper, technical and administrative measures for responding to 12 ICT supply chain security threats at each stage of the defense ICT supply chain life cycle were presented.