• Title/Summary/Keyword: security strategy

Search Result 980, Processing Time 0.027 seconds

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

China's Diplomatic Challenges and Prospect in the Xi Jinping Era (시진핑 시대 중국의 외교적 과제와 전망)

  • Cho, Young Nam
    • Strategy21
    • /
    • s.33
    • /
    • pp.5-36
    • /
    • 2014
  • This article aims to analyze the diplomatic challenges currently facing China as well as the foreign policy the Xi Jinping administration is adopting to address them. With these purposes in mind, it will look into three areas: first, diplomatic tasks confronting the Xi leadership; second, foreign policy that the Xi administration has implemented since the 18th Party Congress in 2012; and third, the prospects for China's foreign policy under the Xi leadership. As the Xi Jinping administration entered into office, it has encountered two major diplomatic challenges. One is the searching for a new foreign policy, and the other the restructuring of the existing foreign affairs and national security systems. The Xi administration, during its first year in office, has responded actively to tackle these issues. To begin with, it has attempted to make some adjustments on foreign policy while maintaining the Deng Xiaoping line of foreign policy. One of these modifications is placing emphasis on national "core interest," as illustrated by changes in guideline for maritime conflicts, pushing for building maritime power, and proclamation of Air Defense Identification Zone in the East China Sea. Second is the decision on the new guideline for peripheral diplomacy. That is, the administration regarded creating peaceful and stable environments to realize "Chinese Dream" as an important goal of foreign policy, and proposed such new guiding ideology as "familiarity, integrity, benefit, and accommodation." In additoin, the Xi administration restructured the existing foreign affairs and national security systems. Establishing the Central State Security Committee and the Internet Leading Small Group (LSG) are cases in point. As comprehensive organizations for policy coordination that encompass party, government, and military, the two LSGs are in charge of enacting related policies and fine-tuning policy implementation, based upon leadership consisting of chiefs of each relevant organs. Moreover, since Xi himself became the chief of these two newly-found organs, the conditions under which these LSGs could demonstrate unified leadership and adjusting role in its implementation of military, diplomatic, and security policies were developed. The future Chinese diplomacy will be characterized with three main trends. First, peripheral diplomacy will be reinforced. The peripheral diplomacy has become far more important since the Work Conference on Peripheral Diplomacy in October 2013. Second, economic diplomacy will be strengthened with an eye on reducing the "China Threat Theory," which still exists in Asia. Third, the policies to isolate the Philippines and Japan will continue in regard to maritime disputes. All in all, Chinese diplomacy in the Xi Jinping era is likely to feature practical diplomacy which combines both hard and soft approaches to best realize Chinese national interest.

A Study on the Counter-Terrorism and Security Strategy for Korean Companies Engaged in the Overseas Business (해외진출 한국 기업의 대테러 경호${\cdot}$경비 전략에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.507-528
    • /
    • 2007
  • June 2006, five korean oil workers, three who worked for Daewoo and two for Korea Gas, released after being held hostage by separatist militants in Nigeria. The kidnapping was happened in the Niger Delta where armed separatists are demanding a larger share in oil revenues and compensation for environmental destruction due to oil exploration. Seven months later, nine Korean pipeline workers of Daewoo together with a Nigerian were kidnapped again and safely released thanks to the efforts of the company and the Korean government. These two kidnapping incidents have shown that companies engaged in the overseas business are not safe any more from the terrorist attacks and has given an invaluable lesson that the company having an intention to go abroad for business should take all possible anti and counter-measures against terrorism. The main purpose of this study is to suggest a guideline for the establishment of counter-terrorism and security strategy against terrorist attacks on the private companies at the overseas. In order to foster a better understanding of the problem, a brief history of terrorism is presented in the first part. In addition, this study analyses and describes the variations of terrorist attacks against private companies together with the terrorism related environment of Korea. Based on the outcome of the study, this paper takes a global view and perspectives of terrorist attacks against private companies and suggests consideration for the future.

  • PDF

The Legal Definition of Effective Control and Dokdo Issue: International Law as Critical Asset of National Maritime Strategy (독도(獨島)의 실효적(實效的) 지배(支配)와 해양(海洋) 전략자산(戰略資産)으로서의 국제법(國際法))

  • AHN, Han Byul
    • Strategy21
    • /
    • s.38
    • /
    • pp.13-46
    • /
    • 2015
  • Dokdo issue reaches beyond economic and security interest to Koreans, as it is regarded as symbol of her independence. Albeit the fact that Japan has merely no legitimate title over Dokdo, Japan has been tenaciously insisting their jurisdiction over Dokdo since the independence of Korea. Under such circumstances, public outrage towards Japan is most certainly understandable. Yet, mere outrage itself, lacking in logic and factual grounds, can contribute little if not any, to the desirable solution of the problem. Precedents reveal that dealing maritime issues amid lack of profound understanding in international law has often led to undesirable results, such as the inclusion of Dokdo in the Joint Management Fisheries Zone in 1999 Korea-Japan Fisheries Agreement. In a sense, adroit use of international law is a critical element in preserving Korea's sovereign rights against persistent Japanese plans to rob Dokdo once again. The Dokdo issue is inextricably bound to international law; the legal status of Dokdo as island, the equitable solution of maritime boundary delimitation and effective control, existence of dispute. Yet, the public policies and arguments made by pundits are generally in lack of understanding in international law. It is now the time for Korea to commence on long-term cross-academia / department plans to establish Dokdo strategy as part of the nationwide maritime strategy effectively using international law as its stronghold.

Service Distribution Strategy Development for MICE in Nakhon Si Thammarat Province, Thailand

  • Pannapa KHIAWNOI;Sor sirichai NAKUDOM
    • Journal of Distribution Science
    • /
    • v.22 no.2
    • /
    • pp.63-69
    • /
    • 2024
  • Purpose: This study analyses the Service Development Strategy for MICE in Nakhon Si Thammarat Province, Thailand aim to 1) Investigate the current and desirable conditions of the service businesses in order to support the MICE 2) Undertake a SWOT analysis of service businesses with regard to supporting the MICE 3) Analyze service business distribution strategies development to support the MICE in Nakhon Si Thammarat Province. Research design, data and methodology: This study divided into 2 phases: Phase 1 involved qualitative research to study the process of service businesses in their support of the MICE. Phase 2 involved research and development with regard to the development of innovative service business development strategies to support the MICE. Results: The article showed that company executives and related parties understand the meaning of service business management to support the MICE to consist of 8 indicators: quality of meeting venues, access to meeting venues, meeting infrastructure, government support, additional activities in addition to meetings, the image and reputation of the city, MICE personnel, and security. Conclusions: Strategies for developing service business innovations to support the MICE consist of a proactive strategy, a preventive strategy, and a remedial strategy together with defensive strategies.

Security Analysis of Block Ciphers Designed with BOGI Strategy against Differential Attacks (BOGI 전략으로 설계된 블록 암호의 차분 공격에 대한 안전성 분석)

  • Lee, Sanghyeop;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1259-1270
    • /
    • 2019
  • The upper bound of differential characteristic probability is mainly used to determine the number of rounds when constructing a block cipher. As the number of rounds affects the performance of block cipher, it is critical to evaluate the tight upper bound in the constructing process. In order to calculate the upper bound of differential characteristic probability, the previous searching methods for minimum number of active S-boxes constructed constraint equations for non-linear operations and linear operations, independently. However, in the case of BOGI design strategy, where linear operation is dependent on non-linear operation, the previous methods may present the less tight upper bound. In this paper, we exploit the properties of BOGI strategy to propose a new method to evaluate a tighter upper bound of differential characteristic probability than previous ones. Additionally, we mathematically proved the validity of our method. Our proposed method was applied to GIFT-64 and GIFT-128, which are based on BOGI strategy, and the upper bounds of differential characteristic probability were derived until 9 round. Previously, the upper bounds of differential characteristic probability for 7-round GIFT-64 and 9-round GIFT-128 were 2-18.395 and 2-26.885, respectively, while we show that the upper bounds of differential characteristic probability are more tight as 2-19.81 and 2-28.3, respectively.

A Trend Analysis of in the U.S. Cybersecurity Strategy and Implications for Korea (미국 사이버안보 전략의 경향 분석과 한국에의 함의)

  • Sunha Bae;Minkyung Song;Dong Hee Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.11-25
    • /
    • 2023
  • Since President Biden's inauguration, significant cyberattacks have occurred several times in the United States, and cybersecurity was emphasized as a national priority. The U.S. is advancing efforts to strengthen the cybersecurity both domestically and internationally, including with allies. In particular, the Biden administration announced the National Cybersecurity Strategy in March 2023. The National Cybersecurity Strategy is the top guideline of cybersecurity and is the foundation of other cybersecurity policies. And it includes public-privates as well as international policy directions, so it is expected to affect the international order. Meanwhile, In Korea, a new administration was launched in 2022, and the revision of the National Cybersecurity Strategy is necessary. In addition, cooperation between Korea and the U.S. has recently been strengthened, and cybersecurity is being treated as a key agenda in the cooperative relationship. In this paper, we examine the cyber security strategies of the Trump and Biden administration, and analyze how the strategies have changed, their characteristics and implications in qualitative and quantitative terms. And we derive the implications of these changes for Korea's cybersecurity policy.

A Typology Study of Corporation Patent Strategy Using Competing Value Model (경쟁가치모형에 따른 기업의 특허전략 유형화 연구)

  • Cha, Wan-Kyu;Lee, Hwan-Soo
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.33-43
    • /
    • 2017
  • Patent strategy research has focused on the efficiency of licensing for investigation, analysis and utilization of application management, product and development task in finding patent idea, to establish patent strategy linked with management strategy and technology strategy. However, it is difficult to find the research on patent strategy that reflects an adaptive culture to enhance the internalization and performance of the established strategy. As a result, companies have been striving to imitate patent strategies of advanced companies that do not consider their industry and organizational culture. This study proposes a method of defining a firm 's patent strategy according to the competing value model that analyzes organizational culture as four frameworks. This study verifies the classification method through case studies, suggests a suitable patent strategy for the patent strategy type. This study has contributions in that discussing from a new point of view based on organizational culture theory and providing a IP strategic model with high practicality.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.