• 제목/요약/키워드: security strategy

Search Result 964, Processing Time 0.022 seconds

An Information Security Model for Digital Contents (디지털 콘텐츠의 정보보호 분석 모델)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.9-14
    • /
    • 2010
  • The network architecture and analysis model for evaluating the information security are presented to distribute the reliable and secure multimedia digital contents. Using the firewall and IDS, the function of the proposed model includes the security range, related data collection/analysis, level evaluation and strategy proposal. To develop efficient automatic analysis tool, the inter-distribution algorithm and network design based on the traffic analysis between web-server and user are needed. Furthermore, the efficient algorithm and design of DRM/PKI also should be presented before the development of the automatic information security model.

A Study on Retraining for Career Development of Information Security Workforce (정보보호 업무인력의 경력개발을 위한 재교육 방향)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.4
    • /
    • pp.67-77
    • /
    • 2018
  • With the types and targets of cyber attacks expanding and with personal information leaks increasing, the quantitative demand for information security specialists has increased. The base for training the workforce has expanded accordingly, but joblessness and job-seeking still coexist. To resolve the gap between labor demand and supply, education and training systems that can supply demand quickly are needed. It takes a considerable amount of time for information security education and new manpower supply through universities and graduate schools to be reflected in the market. However, if information security retraining is carried out in terms of career development of information security and related workforce, the problem of lack of experts could be solved in a relatively short period. This paper investigates and analyzes the information security work of the information security workforce, the degree of skill level, the need for retraining, and the workplace migration experience; it also discusses the direction of career development retraining.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

Unified Modeling for RFID Privacy to Enhance Security Issues (보안성 문제를 개선하기 위한 RFID 보안성에 대한 모델링 기법)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.899-900
    • /
    • 2012
  • RFID technology can help automatically and remotely identify objects, which raises many security concerns. We review and categorize several RFID security and privacy solutions, and conclude that the most promising and low-cost approach currently attracts little academic attention. We therefore concluded that, from a privacy perspective, the user scheme is an important strategy for meeting the consumer's needs. Furthermore, we call for the privacy research community to put more effort into this line of thinking about RFID privacy.

  • PDF

A Study on the Multicast Security System in Multiple Core Environment (다중코어 환경에서의 멀티캐스트 보안에 관한 연구)

  • Lee, Jun-Seok
    • Journal of Industrial Convergence
    • /
    • v.7 no.1
    • /
    • pp.21-31
    • /
    • 2009
  • Multicast is a network technology for the delivery of information to a group of destinations simultaneously using the most efficient strategy to deliver the messages over each link of the network only once, creating copies only when the links to the multiple destinations split. This thesis designed a group certificate that can authenticate group information safety between cores based on CBT, proposed a multicast security system that can control some security key.

  • PDF

Branding and Advertising on Social Networks: Current Trends

  • Trachuk, Tetiana;Vdovichena, Olga;Andriushchenko, Mariia;Semenda, Olha;Pashkevych, Maryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.178-185
    • /
    • 2021
  • The emergence of social networks has led to the flourishing of a new golden era of branding, which is a challenge for companies due to the need for creative positioning of companies with an emphasis on building trust and loyalty to the brand. Consumers are becoming more demanding and due to a wide range of products in different markets, make demands that are more stringent on companies. The goal of this article was to study the main trends of branding and advertising on social networks to develop a new approach to brand promotion. Methodology. The quantitative and qualitative research design was used to determine the main trends in branding and advertising on social networks. The methodology included the following methods: 1) analysis of the relationship between brand value and brand content strategy, 2) content analysis of the content of companies in social networks on the example of 10 world-famous brands with the highest value. The results allowed forming the criteria of effective content and communication: simplicity of content and simplicity of communication, lack of direct advertising of products, emphasis on global socio-economic problems and social orientation, unobtrusive communication, content creativity, indirect information about the product or work, the history of the company's development through various tools. The main content strategies of brands are defined: storytelling strategy; strategy of informing about the history of the company's development; entertainment and information strategy; strategy of joint interaction with the audience through the involvement of wellknown influencers or users of products. The theoretical and practical value of the results is confirmed by the conceptualization of the main content strategies of world-famous brands, which are pioneers in new ways to build relationships with users through social networks. The research proposes to use a customer-oriented approach to brand promotion. This means studying consumer behavior and predicting possible changes in behavior, which determines the level of interaction with the brand, the content strategy of the brand, and its effectiveness.

Formation of the Strategy of Digital Marketing of the Enterprise in the Conditions of the Competitiveness Intensification in the International Market

  • Solntsev, Sergii;Smerichevskyi, Serhii;Skyba, Halyna;Zabashtanska, Tetiana;Bazaliyska, Natalia;Kolbushkin, Yuriy
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.47-56
    • /
    • 2022
  • The article defines the principles of formation of digital marketing strategy of enterprises in the conditions of intensification of competition on the international market. The stages of development of digital marketing strategy of enterprises in the conditions of intensification of competition in the international market are substantiated, which includes: setting goals, which envisages observance of the principles of SMART-scheme; product or service analysis; monitoring of competitors; analytics of definition and segmentation of the target audience of the enterprise; selection of digital marketing tools and channels for promotion on the international market of products or services; formation of a unique, unique trade offer, selection of indicators for evaluating the effectiveness of digital marketing strategy and its tools. It is proved that according to the principle of SMART method of goal setting it is necessary that the goals have: specificity, measurability, achievability, relevance, achievement of the goal should be limited in time, have specific deadlines. To increase the effectiveness of digital marketing strategy, it is necessary to analyze the internal and external environment using the method of SWOT-analysis, the advantage of which is a comprehensive assessment of the company, competitors and the industry as a whole in the face of competition in the international market. The main indicators of evaluation of the effectiveness of digital marketing strategy in the conditions of intensification of competition on the international market are substantiated.

China's Pursuit for Seapower and New U.S.-China Relationship (중국의 해양강국 추구와 새로운 미중관계)

  • KIM, Heung-Kyu
    • Strategy21
    • /
    • s.36
    • /
    • pp.59-93
    • /
    • 2015
  • A Paradigm shift is in process in China's foreign policies during Xi Jinping's era. Such changes occur with changing national identities from developing country to great power, and from continental power to continental-maritime power. China's pursuit for sea power embraces its global strategy. Accommodating the new identity of maritime power, China is developing its maritime strategy. New silk-road strategy actively utilizes China's advantage in economy, while avoiding direct military challenges against the U.S. China seeks an associated balance of power with the U.S. On the other hand, China make its determination clear to protect its core national interests, particularly Taiwan straits issue, deploying Anti-Access and Area-Denial strategy. 'Pax-Americana 3.0' and 'China's rise 2.0' have convoluted and evolved in complexity. South Korea faces much tougher challenges ahead in its foreign and security environments.

Future Development of Republic of Korea NCAGS (한국형 선박통제의 발전방향에 관한 연구)

  • Kim, Sung Hae;Jung, Hyo Sup
    • Strategy21
    • /
    • s.44
    • /
    • pp.352-376
    • /
    • 2018
  • Through this research, the current state of naval coordination and guidance of shipping is reviewed whereupon which a suggestion is made for a novel role which satisfies the needs of the people and the country asked of the Navy. Taking into consideration the dynamic security environment, the developing relationship between the two nations on the Korean peninsula, and the influence that the Republic of Korea has on maritime security, it is made more urgent that the Navy takes a proactive course of action in terms of naval coordination and guidance of shipping. The current form of Korean naval coordination and guidance of shipping is adapted from the logical and flexible concepts of NCAPS and NCAGS and is one of many tasks that the Republic of Korea Navy must perform. However, when the Republic of Korea Navy develops blue-water capabilities with the ambitions of protecting its people and their way of life, naval coordination and guidance of shipping could potentially become one of the primary functions of the Republic of Korea Navy that the it must champion. Already, there are indications that foreign navies are, through many developments and commitment towards naval coordination and guidance of shipping, protecting its people and states' interests wherever is necessary. In the case of Chile, its Navy has taken the helm of naval coordination and guidance of shipping and has integrated various maritime organizations including the coast guard and the National Customs Service for the sake of maintaining regional maritime security, showing immediate force if necessary. Presently, as the Republic of Korea Navy looks to be a global naval power, it is important that a reprioritization of the Navy's mission is undertaken, all the while sustaining military readiness posture on the Northern Limit Line. It cannot be any more emphasized how crucial thorough military readiness posture is as a natural stance against the enemy. That being said, contributing towards international maritime security is consistent with the nation's standing. It is a fact that maritime security has been conceptualized and developed merely as a study within the Ministry of Maritime Affairs and Fisheries, the Republic of Korea Navy, and other governmental organizations, forces, and academia. Naval cooperation and guidance of shipping suggested by this research as a practical operational field is a concrete solution to what once was an abstract concept. To stand firm on its status as a maritime nation, the Republic of Korea must establish a Maritime Security Organization within its Navy and develop the appropriate doctrines. Attaining experts, developing doctrines, and cultivating the capability to deploy maritime forces will allow for the Republic of Korea to execute a primary role in keeping international maritime security and naval coordination and guidance of shipping. To fully achieve its latent potential necessitates the Republic of Korea Navy to expedite the introduction of naval coordination and guidance of shipping concepts and to establish the appropriate doctrines, operation plans, and organizations.

Formation of Resilience in the Context of Volunteer Activities Using Information and Communications Technology

  • Lazarenko, NataLiia;Sabat, Nataliia;Sabat, Nadiia;Sylenko, Nadiia;Rundong, Wang;Duchenko, Anna;Shuppe, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.374-381
    • /
    • 2022
  • The article identifies and theoretically substantiates the trends of national resilience in the context of establishing the security of the country and its civilizational subjectivity. The strategy of development of the pedagogical university in the conditions of European integration into the European educational and scientific space based on certain characterological features of the personality of the volunteer in the context of allocation of personal resilience is developed. The analysis of both external and internal challenges and threats to the civilization of the country needs to be understood in the context of economic, socio-political, legal, military-political, spiritual-cultural, educational-scientific and network-information resilience. The concepts of "national resilience" and "national security" are quite close - at first glance, even identical. However, a deeper understanding clarifies the differences: national security is a state of protection of the country identity and its very existence, the realization of its national interests. In turn, resilience is a fairly effective strategy and a fundamental guarantee of national security. At the same time, it is extremely important to understand that both national security as a state and national resilience as a strategy are only means of achieving and developing a strong and humanistic civilizational subjectivity of the country. After all, such subjectivity opens for citizens the opportunity for development, dignified self-realization and a proper life. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The use of information and communication technologies in volunteering will contribute to the formation of resilience traits in the structure of personality formation. Directly to the personal traits of resilience should be included methodological competencies, which include methodological knowledge, skills and abilities (ability to define ultimate and intermediate goals, plan, conduct and analyze knowledge, establish and implement interdisciplinary links with disciplines of medical-psychological-pedagogical cycles, etc.). All these competencies form the professional resilience of the volunteer.