• Title/Summary/Keyword: 사전예방적보안

Search Result 99, Processing Time 0.026 seconds

A study on The Private Investigator usage for Enterprise Security Activity: Focusing on countermeasure to the Industrial Spy (민간조사원(탐정)을 활용한 기업보안활동의 강화방안: 산업 스파이에 대한 대응방안을 중심으로)

  • Sin, Sung-Gyun;Park, Sang-Jin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.199-228
    • /
    • 2009
  • National security of post cold-war since 1990's shift that conception of the national security transfer traditional military strength to economic strength. Accordingly, the national interest about how to protect the of the high-technology industry enterprises has become contentious social issue. The U.S. and advanced countries promote the policy to protect The United State's Economic Espionage Act(EEA). The Korea reaching to high level a field at IT, Shipbuilding, Steel, Automobile Industry and huge capital investment to high-technology & development. But, systematic industry security activity not an unfold. So private investigator collect the evidence and information of business case for prevent danger is efficient. The private investigator system, deal with the matter efficiently, will good system to prevent economic loss of business, state and nation through make a good use in business crime that machinery of law difficult to intervene. This article countermeasure about industry spy through make a good use of private investigator.

  • PDF

Improvement Plan for Public Institution Remote Security Model in the New-Normal Era (뉴노멀 시대의 공공기관 원격보안 모델 개선방안)

  • Shin, SeungWoo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.104-112
    • /
    • 2022
  • The pandemic caused by the COVID-19 virus, which has lasted for the past three years, has changed society and the way people live in many ways. These changes also affect cyberspace, so the pre-pandemic information security model and standards have limitations when applied to the current situation. In this paper, a new method to improve the information security model of public institutions was proposed in consideration of various situations in the new normal era. In other words, through the proposed information security model, the possibility of external intrusion is blocked in advance through the policy and technical supplementation of remote work, which is a weakness of the existing information security operation of public institutions. Also, how to prevent abnormal authentication attempts by building a secure VPN environment, how to prevent social engineering cyber attacks targeting fear and uncertainty caused by COVID-19, and how to use a smooth network and create a remote work environment. For this purpose, methods for securing service availability were additionally presented.

Current Status of Information Security against Cyber Attacks in Universities and Its Improvement Methods (사이버 공격에 대비한 대학의 정보보안 현황 및 개선 방안)

  • Kang, Young-Sun;Choi, Yeong-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.215-225
    • /
    • 2011
  • This paper suggests several methods of improving information securities of universities through the investigations of the current status of information securities in universities, which is becoming a hot topic in knowledge and information societies. In this paper, universities were randomly selected according to their size, and surveyed through email questionnaire to the persons in charge of security in each university, and 27 universities and 18 colleges were replied. From the survey results we confirmed that the pre-prevention is the most important thing in securing information assets, also in universities, and, in this paper, systematic support must be strengthened to establish a comprehensive security management policy and guidelines for the universities, and the importance of information assets and the necessity of security needs to be shared with the members in the universities. Moreover there must be full administrative and financial support, including recruitment and training of information security professionals and the establishing a separate security division.

Study on Public Key Cryptosystem and Password Based Direct Authentication Protocol for Remote User Access (공개키와 패스워드 기반의 사용자 직접 인증 프로토콜에 관한 연구)

  • Kim, Chan-Oh;Choi, Eun-Jeong;Song, Joo-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1041-1044
    • /
    • 2001
  • 신뢰할 수 없는 네트워크를 통한 패스워드 기반의 원거리 사용자 인증은 패스워드의 선택범위와 길이가 사용자의 기억력에 제한되는 낮은 안전성 때문에 오프라인 사전공격에 취약하다. 본 논문은 이산 대수 문제 해결의 어려움에 기반한 Diffie-Hellman 키 교환과 블록암호화 알고리듬 및 MAC을 이용하여 패스워드 기반 인증 및 키 협상 프로토콜을 제안한다. 제안된 프로토콜은 오프라인 사전공격을 예방할 수 있으며, 세션키와 패스워드 검증정보가 독립적이므로 공격자에게 패스워드가 노출되더라도 이전 세션의 복호화에 영향을 미치지 않는 전향적 보안성을 제공한다. 또한 세션키의 노출이 패스워드에 대한 정보를 노출시키지 않으며, 암호화 횟수와 메시지 크기를 최소화 하여 효율성을 극대화 하였다. 따라서 웹을 통한 홈뱅킹이나, 모바일 환경이 요구되는 셀룰러 폰에서의 사용자 인증처럼 제3의 신뢰 기관을 이용하지 않는 단순 직접 인증에 적합하다.

  • PDF

Strengthening the Legal Basis for Security Rule to Protect Technology and Trade Secrets for Small Businesses (중소기업의 기술 및 영업비밀 보호에 대한 보안규정의 법적 근거 강화방안)

  • Ahn, Sang Soo;Lee, Jung hun;Son, Seung Woo
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.57-77
    • /
    • 2020
  • In Korea, various schemes have been implemented to prevent the outflow of technology, but they do not bring practical effects. In general, we focus on follow-up measures such as strong punishment in case of violation of the law. In terms of proactive prevention, it is not shown to have any real preventive effect, even though it includes such matters as imposing security measures on companies or conducting a survey. this paper examines the need to strengthen the protection of business secrets by reviewing the employment rules between companies and workers presented in the Labor Relations Act and the Labor Standards Act as a realistic alternative. In most companies, even though the employment rule is the highest standard of private regulations, the employment rule has no matters on the prevention and protection of technology leakage. The employment rules require all employees working for companies to agree and notify in the Labor Standards Act, so it is necessary to reflect them as standards in the standard employment rules because it shows that all employees of the company can have a common sense of security and present legal compliance with security-related documents, such as security pledges and security-related guidelines and procedures.

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.

A Study on Measures of Air Terrorism: Focused on Security (항공테러 대응에 관한 소고: 경비를 중심으로)

  • Kwon, Jeonghoon
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.1
    • /
    • pp.10-17
    • /
    • 2012
  • The purpose of this study is to make people acknowledge the danger of the air terror and provide measures to prevent a recurrence of the accident and find required security. Also, the air terror is categorized into aircraft and airport and take steps to come up with preventive measures against the air terror by finding a countermeasure and precaution. The following steps should be checked to take precautionary measures against the air terror. major security crackdown and the need for a further security check should be conducted to prevent terrorists from boarding the aircraft, security around the airport needs to be tightened up by training the airport workers and promoting emergency situations, airport sheriffs and armed guards should be on patrol for the safety of the cabin, new measures of efficient security for in and around the airport and its facilities should be set up to tighten up security of baggage.

A Study on Developing Assessment indicators for Cyber Resilience (사이버 레질리언스 평가지표 개발에 관한 연구)

  • Kim, Sujin;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.137-144
    • /
    • 2017
  • Recently, cyber resilience has emerged as an important concept, recognizing that there is no perfect security. However, domestic researches on cyber resilience are insufficient. In this study, the 22 indicators for cyber resilience assessment were initially developed by the literature survey and discussions with security experts. The developed indicators are reviewed using the Focus Group Interview method in terms of materiality and feasibility of the indicators. This study derived meaningful and useful indicators for the assessment of cyber resilience, and it is expected to be used as a foundation for the future cyber resilience studies. In order to generalize and apply the results of this study in practice, it is necessary to carry out quantitative researches in the future.

A Study on the Application of School Guard to School Police System (학교지킴이의 청원경찰 적용 방안에 관한 연구)

  • Park, Yong Soo
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.177-186
    • /
    • 2013
  • It has been long time since the social concern about school safety was fully raised in our country. The accidents, such as sexual violence against young children, traffic accident when going to and from school, psychological violence by bullying, extorting money & violence and so on, frequently happen. Under the circumstances that this kind of school safety problems are concerned greatly by society, it is very important for schools to create the environment in which children can have a safe living. The study focuses on the necessity and introduction of a professional school police system to establish the sexual violence prevention system in advance. The system, practically and systematically organized, can prevent various kinds of safety accidents and form the agreement of family, regional society, and related institutions alike. It is also supposed to emphasize the strengthening of school safety by its operation.

Proposal and Analysis of Solution for Improving Problem of Our Country Logistics Security (우리나라 물류보안의 문제점 개선 방안 제안 및 분석)

  • Ahn, Jae-Deok;Lee, Ki-Wook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.352-360
    • /
    • 2010
  • 9.11 This research since 2001, including shipping and port security and cargo flow international logistics the overall efficiency of the important issues of the international community that reflects the emerging research on the logistics to improve the security problems of I may occur in the logistics sector in the country, such as terrorism and to prevent security incidents from the security system of the logistics in order to operate in real time, and the introduction of advanced logistics and my analysis and logistics for the security system to collect data and develop lesson Logistics problems facing the security sector will want to analyze and improve the present. The analysis of the problems of logistics and security and find ways to improve research and literature selected by experts to improve, and to improve the first part of measures to improve the survey was analyzed through the AHP.