• Title/Summary/Keyword: system security

Search Result 9,629, Processing Time 0.031 seconds

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF

Implementation and Design of Policy Based Security System for Integration Management (통합 관리를 위한 정책 기반의 보안시스템 설계 및 구현)

  • Kim, Yong-Tak;Lee, Jong-Min;Kim, Tai-Suk;Kwon, Oh-Jun
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.8
    • /
    • pp.1052-1059
    • /
    • 2007
  • Network security system used in the large scale network composes individual security system which protects only own domain. Problems of individual security system are not to protect the backbone network and to be hard to cope with in real-time. In this paper we proposed a security system which includes security function at the router, and the access point, which exist at the backbone network, to solve the problems. This security system sends the alert messages to an integrated security management system after detecting intrusions. The integrated security management system releases confrontation plan to each suity system. Thus the systematic and immediate confrontation is possible. We analyzed function verification and efficiency by using the security system and the integrated security management system suggested in this paper. We confirmed this integrated security management system has a possibility of a systematic and immediate confrontation.

  • PDF

Overview of SAE/LTE security

  • Prasad, Anand R.;Zhang, Xiaowei
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.1
    • /
    • pp.36-43
    • /
    • 2013
  • This paper provides an overview of the security in the System Architecture Evolution (SAE) / Long-Term Evolution (LTE) system. Security is an integral part of SAE/LTE with improvements over the Third Generation (3G) system. This paper reviews the SAE/LTE system architecture, and discusses the security requirements, algorithms, Authentication and Key Agreement (AKA), Security Mode Command (SMC), key hierarchy and security for mobility.

  • PDF

Design of Financial Information Security Model based on Enterprise Information Security Architecture (전사적 정보보호 아키텍처에 근거한 금융 정보보호 모델 설계)

  • Kim, Dong Soo;Jun, Nam Jae;Kim, Hee Wan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.307-317
    • /
    • 2010
  • The majority of financial and general business organizations have had individual damage from hacking, worms, viruses, cyber attacks, internet fraud, technology and information leaks due to criminal damage. Therefore privacy has become an important issue in the community. This paper examines various elements of the information security management system and discuss about Information Security Management System Models by using the analysis of the financial statue and its level of information security assessment. These analyses were based on the Information Security Management System (ISMS) of Korea Information Security Agency, British's ISO27001, GMITS, ISO/IEC 17799/2005, and COBIT's information security architecture. This model will allow users to manage and secure information safely. Therefore, it is recommended for companies to use the security management plan to improve the companies' financial and information security and to prevent from any risk of exposing the companies' information.

Tools for Improving the Efficiency of the Economic Security of Enterprises in Face of the Competitiveness Intensification

  • Turylo, Anatolii M.;Sharko, Vitalii;Fesun, Iryna;Stadnyk, Viktoriya;Andrusenko, Nadiia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.53-60
    • /
    • 2022
  • The article examines the problems of ensuring the effectiveness of the economic security system in the face of increasing competition. The relevance of the study is determined by the intensification of competition between enterprises and the threats arising from this phenomenon. The methodological basis is the methods used: analysis and synthesis - to identify the main trends in the development of tools for economic security of the enterprise; systematization - to highlight the main characteristics of the economic security of the enterprise in the intensification of competition; generalization - to form the general conclusions of the study. The purpose of scientific research is to substantiate the feasibility of using the tools of the economic security system to increase its efficiency in the face of intensifying competition. The main components of the economic security system of the enterprise, which have the greatest impact on the formation of an effective level of economic security. The defining characteristics of the system of economic security of the enterprise are investigated. Special characteristics of the economic security system of the enterprise are considered. The offered directions of tools of maintenance of system of economic safety of the enterprise in competitive conditions: objective, subjective external, subjective internal. For each area, specific tools for ensuring the system of economic security, which affect its efficiency, have been identified.

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.

DATA MINING-BASED MULTIDIMENSIONAL EXTRACTION METHOD FOR INDICATORS OF SOCIAL SECURITY SYSTEM FOR PEOPLE WITH DISABILITIES

  • BATYHA, RADWAN M.
    • Journal of applied mathematics & informatics
    • /
    • v.40 no.1_2
    • /
    • pp.289-303
    • /
    • 2022
  • This article examines the multidimensional index extraction method of the disability social security system based on data mining. While creating the data warehouse of the social security system for the disabled, we need to know the elements of the social security indicators for the disabled. In this context, a clustering algorithm was used to extract the indicators of the social security system for the disabled by investigating the historical dimension of social security for the disabled. The simulation results show that the index extraction method has high coverage, sensitivity and reliability. In this paper, a multidimensional extraction method is introduced to extract the indicators of the social security system for the disabled based on data mining. The simulation experiments show that the method presented in this paper is more reliable, and the indicators of social security system for the disabled extracted are more effective in practical application.

Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management (대규모 네트워크 환경에서의 보안관리를 위한 보안평가 시스템 설계)

  • 이재승;김상춘
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.776-786
    • /
    • 2003
  • Security Evaluation System is a system that evaluates the security of the entire enterprise network domain which consists of various components and that supports a security manager or a Security Management System in making decisions about security management of the enterprise network based on the evaluation. It helps the security manager or the security management system to make a decision about how to change the configuration of the network to prevent the attack due to the security vulnerabilities of the network. Security Evaluation System checks the “current status” of the network, predicts the possible intrusion and supports decision-making about security management to prevent the intrusion in advance. In this paper we analyze the requirements of the Security Evaluation System that automates the security evaluation of the enterprise network which consists of various components and that supports decision-making about security management to prevent the intrusion, and we propose a design for it which satisfies the requirements.

A Study on Scheme of Automatical Security Analysis Tools for Information Security System (정보보호 시스템 보안성 자동 분석 방법 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.117-127
    • /
    • 2008
  • The backwardness of Domestic security management system tend to depend on foreign security companies which have advanced technology. The appearance risk to flow out confidential affairs of domestic enterprises and public organizations to foreign countries. In this regard, this paper is implement and designed automatic security analysis system for secure public network. This system is to offer enhanced security quality of public organizations and reducing the dependence on foreign companies. And maintains security analysis technique for public network.

  • PDF

Cloud System Security Technology Trend

  • Yoon, Jeong-Won;Jang, Beakcheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.49-56
    • /
    • 2015
  • In this paper, we introduce recent cloud system security technologies categorizing them according to Reliability, Availability, Serviceability, Integrity, and Security (RASIS), terms that evaluate robustness of the computer system. Then we describe examples of security attacks and corresponding security technologies for each of them. We introduce security technologies based on Software Defined Network (SDN) for Reliability, security technologies based on hypervisor and virtualization for Availability, disaster restoration systems for Serviceability, authorization and access control technologies for Integrity, and encryption algorithms for Security. We believe that this paper provide wise view and necessary information for recent cloud system security technologies.