• Title/Summary/Keyword: security system

Search Result 9,583, Processing Time 0.046 seconds

Convergence Security Provider Self-Conformity System (융합보안 공급자 자기 적합성 제도)

  • Baik, Namkyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.53-61
    • /
    • 2019
  • In this paper, we propose 'a self - conformance system of convergence security provider' to provide basic data for security and reliability of convergence industrial technology, system and service. It is difficult to evaluate convergence security systems, limited to information and communication service providers, unable to check convergence security items, burden of submission documents, difficulty in measuring convergence security service level and we will summarize product and service-based requirements that can be integrated and systematically measure the level of convergence security and define renewed life cycle-based convergence security information and content security and assurance requirements. On the basis of this, each convergence security company declares conformity with the standard itself without the certification of the certification body, and introduces the provider conformity certification system which can manufacture and sell. This will enable the company to strengthen its competitiveness through timely launch and implementation of products and services and cost reduction.

Development and Application in Measurement of Security Need Satisfaction From Users of Electronic Security System (기계경비시스템 이용자의 안전욕구충족 척도 개발과 적용)

  • Kim, Chan-Sun
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.47-64
    • /
    • 2008
  • The purpose of this study is to develop the measurement of security needs satisfaction from users of electronic security system, to verify its validity and reliability, and by applying them, to examine the effects between the communities using this system. In 2008, the users of electronic security system in big cities in Seoul(Yong-San, Jong-Lo) and Gyung-Gi Do(Su-Won) for their convenience stores, jewelry shops, communication services, banks, government and public offices, etc. were arranged for a population and 262 of them were used for the final analysis by purposive sampling. This study yields following results. First, the validity of security need satisfaction from users of electronic security system is very high, which means the explanatory adequacy of environmental security need is the highest. Second, the reliability of security need satisfaction from users of electronic security system is very high, in which the reliability value(Cronbach's $\alpha$) of internal consistency is over .765. Third, the security need of electronic security system has the most effects on the group of bank workers. That is, through a close cooperative system between the bank and the service of electronic security system, the more keeping satisfied the environmental, bodily, physical security needs are, the less the in security of this group has. Informational security need has the most effects on convenient store group. It means the service companies of electronic security system offer more services at dawn time and make or supply all sorts of visual information system, which reduces insecurity of the convenient store group.

  • PDF

Developing a Framework for the Implementation of Evidence Collection System: Focusing on the Evaluation of Information Security Management in South Korea

  • Choi, Myeonggil;Kang, Sungmin;Park, Eunju
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.5
    • /
    • pp.13-25
    • /
    • 2019
  • Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the '6. Information System Security' of 'information security management actual condition evaluation index'. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.

A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System (보안관리체계 분석을 통한 산업중심 보안수준평가 모형 설계 방향 연구)

  • Bae, Je-Min;Kim, Sanggeun;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.177-191
    • /
    • 2015
  • Recently, the necessity of systematic security management system that consider company' character and environment has appeared because of increasing security accident continuously in domestic companies. However, most of companies has applied to only K-ISMS which is existing information security management system, although They are different from object, purpose and way of security level evaluation by companies. According to this situation, Many experts have questioned that there are many problems with effectiveness of introducing security management system. In this study, We established definition of information security management system, industrial security management system and research security management system through analysis of previous study and developed evaluation item which can implement security in whole industry comparing and analyzing the control items of them. Also, we analyzed existing security level evaluation and suggest design direction of industry-centric security level evaluation model considering character of industry.

A Study on the License & Training System of Security Agent in Japan (일본 민간경비원의 자격 및 훈련제도에 관한 연구)

  • Jo, Yong-Chul;Kim, Soon-Seok
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.339-356
    • /
    • 2008
  • This study discusses some topics of Security License System and Security Training System in Japan. Especially, the Security License must be very influence that the growth of security industry. And it's true that a few enlightened approach to cooperation between police and private security has already begun to take place in some divisions. The most important thing of the License Test System in Japan is the method of test rule and test section. Then the training systems of the security agent have been very impressive rule and the system for security agent. Today, the market of the security industry in Korea have been going to develop and extend to the future industry. The assignments that are leaved to security industry in Korea must be that the improvement of the License & Training System of Security Agent in Korea should be made effort by the security industry and the public section that looks like the police.

  • PDF

Problems of Security Act and Solutions (경비업법의 현안과 해결방안)

  • Park, Byung-Sick
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.87-113
    • /
    • 2011
  • Korean security industry has history of more than half a century, and it is growing fast. Private security industry contributes not only to livelihood safety, but also to national security. The area of the industry is being expanded. Security Act is closely related to the security industry, and has contributed to the growth of private security industry sector. Security Act of Korea, which was established in 1976, was originally made after Japanese Security Act. But nowadays, Korean Security Act is as systematic as the Japanese act. However, for 10 years, Security Act of Korea has been stagnant, not able to reflect security industries' demand. The writer has contributed to the development of Security Act. In 1995, the writer wrote the basic framework of Security Instructor Qualifications System and drafted Security Act in 2002. There are currently many problems in existing Security Act, but there are four representative problems. (1) No more establishment of new security sector, (2) excessively slack qualification criteria, (3) the education system for guards, (4) the security Instructor examination system. This paper derives problems of current Security Act, and suggests solutions for them. Not only the academic world, but all of us should pay attention to the revision of Security Act.

  • PDF

Design and Performance Analysis of Security Network Management Architecture for Auto-managing Security Systems (보안 시스템의 자동 관리를 위한 보안 네트워크 관리 구조의 설계 및 성능 분석)

  • Ahn Gae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8B
    • /
    • pp.525-534
    • /
    • 2005
  • This paper proposes the architecture and the methods of security network management for auto-configuration of security systems by extending the existing policy-based network management architecture. The architecture and the methods proposed in this paper enable a security management sewer to automatically decide the best-suited security policy to apply to a security system and the most effective and efficient security system to perform security policy rule, based on the role and capability information of security systems and the role and time information of security policy. For integrated control of network system and security system, this paper also proposes SNMP protocol based security network topology map generator. To show the excellence of the proposed architecture and methods, we simulate and evaluate the automatic response against attacks.

Design and Implementation of Security Solution Structure to Enhance Inside Security in Enterprise Security Management System (통합보안관리 시스템에서 내부 보안을 향상시킨 보안 솔루션 구조의 설계 및 구현)

  • Kim Seok-Soo;Kang Min-Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.360-367
    • /
    • 2005
  • Corporation's computerization developed by diffusion of internet, and dysfunction of Information is increasing greatly with virus, computing network infringement. Therefore, the today, corporation security is more and more emphasized. Security solution by that importance of security rises so is developing together Security solution is developing to ESM system in existing single system and important thing is function of each security solution and optimizing design of policy. Existent security policy taking a serious view security from external invasion but security of interior the importance rise the today. Accordingly, must construct ESM system of new structure for this. This paper proposes and embodied integration security administration system that solidify interior security utilizing IDS. Experiment external IP and ID access and analyzed the result.

  • PDF

A Study on the Security Architecture of CALS System (CALS체계의 정보보호 구조 연구)

  • 남길현
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.2
    • /
    • pp.197-208
    • /
    • 1999
  • With developing computer and communication technologies, the concept of CALS system has been popular not only to military but also to commercial industries. The security problem is one of the most critical issues to construct CALS infrastructure. The CALS system needs some security functions such that data confidentiality, integrity, authenticity, availability, and non-repudiation. This paper proposes a security architecture model in CALS. The security architecture model is composed of 5 submodels such that network security model, authentication and key management model, operation and audit model, integrated database security model, and risk analysis model.

  • PDF

A Study on Security Kernel of Linux System (Linux 시스템의 보안커널에 관한 연구)

  • Han, Myung-Mook;Lee, Jun-Hwan
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.25-31
    • /
    • 2008
  • SELinux, security operating system, is the security system which implements mandatory access control using linux security module on the traditional linux kernel supporting discretionary access control. But intrusion detection and logging are lacked when system intrusions are happened. This study proposes a SELinux security kernel which performs detection of access violation and privilege restriction using dynamic access control. It detects the intrusion using security check when the abnormal access of system is happened, and dynamically changes the system privilege for the intruder through privilege restriction. Finally we prevent reintrusion and explain the result of experiment.

  • PDF