• Title/Summary/Keyword: 보안문화

Search Result 227, Processing Time 0.029 seconds

신제품 - 한국후지제록스, 흑백 디지털 인쇄기 6종 출시

  • 대한인쇄문화협회
    • 프린팅코리아
    • /
    • v.11 no.7
    • /
    • pp.137-137
    • /
    • 2012
  • 한국후지제록스(주)(대표이사 정광은)는 기존 동급 모델 대비 생산성 및 보안 기능이 향상된 흑백디지털인쇄기 6종을 출시했다. 이번 신제품은 상업인쇄 시장은 물론이고, 기업의 사내 출력실, 학교, 프린트숍 등에 이르기까지 다양한 시장의 요구에 대응할 수 있는 1:1 맞춤형 솔루션 제품이다.

  • PDF

정보보호 문화운동, 세계는 지금

  • Jeong, Se-Jeong
    • 정보보호뉴스
    • /
    • s.134
    • /
    • pp.24-25
    • /
    • 2008
  • 지난달 10월 $12{\sim}17$일 페루 리마에서 제38차 APEC TEL 희의의 일환으로, '사이버 보안 인식제고 워크샵(Cyber Security Awareness Raising Workshop)'이 개최됐다. 이날 회의에서는 우리나라를 비롯해 미국, 호주 등 정보보호 문화운동이 우수한 국가들이 활동현황이 소개되는 한편, 국가간 의견 공유가 이뤄졌다. 그 가운데 우리나라의 정보보호 인식제고 활동이 자세히 소개되면서 APEC 회원국으로부터 집중 관심을 받기도 했다.

  • PDF

Analysis of the Effects of Information Security Policy Awareness, Information Security Involvement, and Compliance Behavioral Intention on Information Security behavior : Focursing on Reward and Fairness (정보보안 정책 인식과 정보보안 관여성, 준수 의도성이 정보보안 행동에 미치는 영향 분석: 보상 차원과 공정성 차원을 중심으로)

  • Hu, Sung-ho;Hwang, In-ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.91-99
    • /
    • 2020
  • The aim of this study to assess the effect of information security policy awareness, information security involvement, compliance behavioral intention on information security behavior The research method is composed of a cross-sectional design of reward and fairness. This paper focuses on the process of organizational policy on the information security compliance intention in the individual decision-making process. As a result, the reward had a significant effect on compliance behavioral intention, and it was found that influence of the psychological reward-based condition was greater than the material reward-based condition. The fairness had a significant effect on information security policy awareness, information security involvement, information security behavior, and it was found that influence of the equity-based condition was greater than the equality-based condition. The exploration model was verified as a multiple mediation model. In addition, the discussion presented the necessary research direction from the perspective of synergy by the cultural environment of individuals and organizations.

A Secure Protocol for High-Performance RFID Tag using Dynamic ID Allocating (동적 ID 할당을 이용한 고기능 RFID 태그용 보안 프로토콜)

  • Park Jin-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.642-648
    • /
    • 2006
  • In this paper, I have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating a dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

  • PDF

A Study on the Mitigation of Anxiety that Negatively Affect Information Security Compliance (정보보안 준수에 부정적 영향을 미치는 걱정 완화에 대한 연구)

  • Hwang, Inho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.153-165
    • /
    • 2021
  • The purpose of this study is to find precedent factors that positively and negatively affect the information security compliance intention. In detail, the study finds precedent factors to reduce anxiety that negatively affects compliance intentions, and confirms that feedback moderates the negative relationship between anxiety and compliance intention. The questionnaire was targeted at office workers working in organizations with information security policies, and research hypothesis verification was conducted through structural equation modeling to analyze main effects and moderation effects. As a result of the study, anxiety had a negative effect on the compliance intention, and the organizational culture that was raised through management support reduced anxiety of employees. In addition, feedback mitigated the negative impact relationship between anxiety and compliance intention. The implications of this study were to suggest a direction to mitigate the anxiety of the employees of the organization through the introduction and operation of information security technology.

Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things (사물인터넷과 융합한 헬스케어 시스템에서의 보안 이슈 및 취약점 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.699-706
    • /
    • 2023
  • Recently, the 4 generation industry revolution is developed with advanced and combined with a variety of new technologies. Conventional healthcare system is applied with IoT application. It provides many advantages with mobility and swift data transfers to patient and doctor. In despite of these kinds of advantages, it occurred security issues between basic devices and protocols in their applications. Especially, internet of things have restricted and limited resources such as small memory capacity, low capability of computing power, etc. Therefore, we can not utilize conventional mechanism. In this paper, we analyzed attacks and vulnerability in terms of security issues. To analyze security structure, features, demands and requirements, we solve the methods to be reduced security issues.

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

A Study on Cyber Security Test for The Game Site Security (게임 사이트 보안을 위한 사이버 보안 테스트에 관한 연구)

  • Kim, Hyo-Nam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.355-356
    • /
    • 2019
  • 글로벌 게임 시장 규모가 전년 대비 13.3% 늘어나고 국내 게임 시장 규모도 전년 대비 6.2%로 증가되고 있는 것이 현재 게임 산업의 현황이다. 그러나 이에 반해 게임을 향한 해킹 공격도 지금 이 순간에도 지능화되고 횟수 역시 기하급수적으로 늘어가는 것도 현 게임 산업의 실태이다. 본 논문에서는 게임을 기반으로 게임 사용자들의 중요한 데이터를 탈취하고 피해를 막기 위해서 좀 더 다른 시각에서 게임 해킹을 방어할 수 있는 방법으로 사이버 보안 테스트를 이용하여 현재 게임 사이트의 보안상태를 점검하고 개선할 수 있는 방법을 제시한다.

  • PDF

A Study on Developing Framework for Measuring of Security Risk Appetite (보안 위험성향 측정을 위한 프레임워크 개발에 관한 연구)

  • Gim, Gisam;Park, Jinsang;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.141-148
    • /
    • 2019
  • The advancement of digital technology accelerates intelligence, convergence, and demands better change beyond traditional methods in all aspects of business models and technologies, infrastructure, processes, and platforms. Risk management is becoming more important because of various security risks, depending on the changing business environment and aligned to business goals is emerging from the existing information asset based risk management. For business aligned risk management, it is essential to understand the risk appetite for achieving business goals, which provides a basis for decision-making in subsequent risk management processes. In this paper, we propose a framework for analyzing the risk management framework, pre - existing risk analysis, and protection motivation theory that influences decisions on security risk management. To examine the practical feasibility of the developed risk appetite framework, we reviewed the applicability and significance of the proposed risk appetite framework through an advisory committee composed of security risk management specialists.

A Study on security policy for vitalizing financial company cloud (금융회사 클라우드 활성화를 위한 보안 정책 연구)

  • Im, Je-sang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.4
    • /
    • pp.199-205
    • /
    • 2017
  • As cloud computing can utilize the proper allocation of system resources, it can be expected to have great benefits in terms of maintaining availability and reducing costs when a cloud is applied to a financial company's computer system. Although some provisions of the Financial Supervisory Regulation were revised in October 2016, this is limited to non-critical information processing systems, limits are remain whitch the application of cloud computing to the whole computer system of financial companies including electronic financial systems. In this paper, cloud security requirements are studied for the application of financial company's computational infrastructure system.