• Title/Summary/Keyword: security studies

Search Result 1,960, Processing Time 0.035 seconds

Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities (보안책임과 규제가 기업의 보안활동에 미치는 영향 분석)

  • Shim, Woo-Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.53-73
    • /
    • 2011
  • Many governments have tried to develop a liability and compliance law that can improve cyber security in a sustainable way. This paper explores whether a liability and compliance law is effective in motivating firms' information security activities. In particular, I empirically investigate the impact of the 2007 Electronic Financial Transaction Act (EFTA), a liability and compliance law in Korea, on the information security activities of financial institutions and services providers. In spite of various criticisms of the effectiveness of EFTA, the empirical findings of this study clearly show that EFTA is having a positive impact on information security activities. From these findings, this article concludes that a liability and compliance law is likely to contribute to a certain degree to the achievement of sustainable development of cyber security.

A Meta-analysis of Korean Gamification Research Trends for Security Education Design (보안 교육 설계를 위한 국내 게이미피케이션 연구동향 메타분석)

  • Kim, Jong Wan;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.81-95
    • /
    • 2021
  • This study is to design a security game to proceed in the future based on the results of analyzing 105 research trends on gamification from 2018 to 2021 according to research period, research purpose, research subject, research topic, research method, game method, and emphasis factors. was trying to find an answer to Gamification showed a trend of increasing research related to 2021 due to the increase in the importance of non-face-to-face education in 2020, and there were not many studies targeting middle and high school students, colleges, and adults. Security-related research was a relatively incomplete and limited field, as only a small number of studies on raising awareness were conducted due to access restrictions. In the future, by referring to various research cases and statistics analyzed in this study, we will try to actually implement security education cases through gamification.

Security Evaluation Criteria of Electronic Payment System (전자 지불 시스템의 보안 평가 기준)

  • 신장균;황재준
    • Proceedings of the CALSEC Conference
    • /
    • 1999.07b
    • /
    • pp.491-500
    • /
    • 1999
  • Recent increase of commercial network Integration to World Wide Web(WWW) shifts an ordinary commerce to electronic environment. This draws more people to examine re-assurance of their secure transaction. This study investigates current status of security methodology for Electronic Payment System and extracts important axis of security level for electronic payment. Using these axis as security evaluation criteria, the research proposes a security matrix which consists of four different level of security granularity, hence allowing evaluation of a nation-wide credit card based payment system. Feasible usage of this matrix contributes to security analysis of the electronic system as whole, hence providing better secured electronic environment.

  • PDF

A Study on the Suggestion of Participate to the Involvement of Police and Security Science Majors in Crime Prevention Activities (경찰.전공자의 공공방범활동 참여제안에 관한 연구)

  • Kim, Il Gon;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.61-70
    • /
    • 2014
  • The purpose of this study was to examine the types and state of the private sector's cooperative activities for public peace and order and any problems with it in an effort to step up the revitalization of police-college collaborative efforts for public security by allowing police studies majors and security science majors to participate in crime prevention activities for which the police was responsible in each local community. What problems might possibly take place if police studies majors and security science majors would be involved in crime prevention activities was investigated by making a qualitative analysis. The findings of the study were as follows: First, more human resources and equipment should be offered, as the shortage of the two was pointed out as one of problems with the police itself. Second, how to cope with accidents that might occur if police studies majors and security science majors would take part in crime prevention activities should carefully be studied. Third, it should first be carried out at college to improve an ability to properly respond to diverse situations on the spot.

Security Knowledge Classification Framework for Future Intelligent Environment (미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계)

  • Na, Onechul;Lee, Hyojik;Sung, Soyung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.

A study on Development of Certification Schemes for Cloud Security (국내 클라우드 보안 인증스킴 개발에 관한 연구)

  • Jung, Jin-Woo;Kim, Jungduk;Song, Myeong-Gyun;Jin, Chul-Gu
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.43-49
    • /
    • 2015
  • As the cloud computing law was passed in March, 2015, many private companies and public organizations give consideration to introduce cloud computing services. However, most of them are still concerned about the security issues in cloud computing services. To solve the problem, a certification system of cloud security is necessary as an enabler for adoption of the trusted cloud services. There have been a number of studies about certification systems for cloud security, but only few studies exist about certification scheme of cloud security. Therefore, in this study, foreign certification systems for cloud security are analyzed to draw requirements for developing a domestic certification scheme for cloud security. Based on the result of analysis, this study proposes the three certification schemes of cloud security, which have been reviewed by the focus group interview method to draw advantages and disadvantages of each scheme.

A Study for Enhancing Necessity of Certain Industrial Security Charge Department through Investigating Domestic Industrial Security Organization (국내 산업보안 유관기관 조사를 통한 산업보안 전담부서 필요성 제고)

  • Lee, Hyojik;Ryu, Bora;Kim, Hwayoung;Lee, Jeakyun;Kim, Yein;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.121-133
    • /
    • 2016
  • All industries has expanded their research investment for development and secure of new technology, following application of ICT technology and rapid growth of industrial technology. Therefore efforts to protect the new technology have strengthened. Several governments have conducted a variety of industrial security activities with interest because these efforts are considered not only business problem level but also national level. In this paper, we research the industrial security related organization that performs the activities for industrial assets protection and technology drain prevention. Furthermore we discuss problems with the industrial security performance of government and emphasize the necessity of industrial security department in government.

Application of STPA-SafeSec for a cyber-attack impact analysis of NPPs with a condensate water system test-bed

  • Shin, Jinsoo;Choi, Jong-Gyun;Lee, Jung-Woon;Lee, Cheol-Kwon;Song, Jae-Gu;Son, Jun-Young
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3319-3326
    • /
    • 2021
  • As a form of industrial control systems (ICS), nuclear instrumentation and control (I&C) systems have been digitalized increasingly. This has raised in turn cyber security concerns. Cyber security for ICS is important because cyber-attacks against ICS can cause not only equipment damage and loss of production but also personal and public safety hazards unlike in general IT environments. Numerous risk analyses have been carried out to enhance the safety of ICS and recently, many studies related to the cyber security of ICS are being conducted. Many existing risk analyses and cyber security studies have considered safety and cyber security separately. However, both safety and cyber security perspectives should be considered when analyzing risks for complex and critical ICS facilities such as nuclear power plants (NPPs). In this paper, the STPA-SafeSec methodology is selected to consider both safety and security perspectives when performing a risk analysis for NPPs in order to assess impacts on the safety by cyber-attacks against the digital I&C systems. The STPA-SafeSec methodology was applied to a test-bed system that simulates a condensate water (CD) system in an NPP. The process of the application up to the development of mitigation strategies is described in detail.

An Analysis on Role of Stakeholders for Security System in Smart Healthcare Environment (스마트 의료환경에서 보안체계 구축을 위한 이해관계자 역할 분석)

  • Kim, Yanghoon;Jeong, Wonwho
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.17-27
    • /
    • 2019
  • With the occurrence of the 4th Industrial Revolution, environmental change is happening in the healthcare industry as overall flow of Industry heads to ICT-based business environment. Healthcare Industry, which has the characteristic of public goods, is requiring a reliability and continuity of healthcare industry, however, the introduction of security is being delayed due to the problem of compatibility and extendability of existing system. Accordingly, in this research, we have built a section and role for stakeholders to be concerned in order to induce, analyze and introduce a needed security technology for rapidly building a security system in a smart healthcare environment. We have suggested a possibility of extendability regarding a multi-dimensional effort of stakeholders for establishing a healthcare security system.

Security Threats and Attacks in Internet of Things (IOTs)

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.107-118
    • /
    • 2021
  • The term Internet of Things (IoTs) refers to the future where things are known daily through the Internet, whether in one way or another, as it is done by the method of collecting various information from various sensors to form a huge network through which people, things and machines are helped to make a link between them at all time and anywhere. The IoTs is everywhere around us such as connected appliances, smart homes security systems and wearable health monitors. However, the question is what if there is a malfunction or outside interference that affects the work of these IoTs based devises? This is the reason of the spread of security causes great concern with the widespread availability of the Internet and Internet devices that are subject to many attacks. Since there aren't many studies that combines requirements, mechanisms, and the attacks of the IoTs, this paper which explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality Additionally, the paper addresses the different types of attacks in IoTs. We have also addressed the different approaches aim to prevention mechanisms according to several researchers' conclusions and recommendations.