• 제목/요약/키워드: Comprehensive Security Perspective

검색결과 34건 처리시간 0.023초

포괄안보 관점의 국가위기관리와 국가방위 요소간의 관계 연구 - 통합방위의 원칙, 문제, 그리고 대안을 중심으로 - (A Study on the Mechanism between 'National Crisis Management' and 'National Defense Elements'in the Perspective of Comprehensive Security - Focusing on the Principles, Problems, and Altenatives of'Integrated Defense'-)

  • 김태진
    • 융합보안논문지
    • /
    • 제22권5호
    • /
    • pp.115-126
    • /
    • 2022
  • 본 연구는 포괄안보 관점의 국가위기관리와 국가방위요소간의 작동관계를 연구한 것이다. 국가방위요소는 통합방위법에서 제시하고 있다. 따라서 통합방위의 원칙과 문제, 그리고 대안을 제시하여 국가위기 시 국민의 생명과 재산을 지키고 국가안보를 굳건히 하기 위한 목적으로 연구하였다. 이론적 배경으로 '총체적 위기관리 모델'과 '국가위기관리기본지침'의 위기관리 4단계를 근거로 분석틀을 구상하였다. 이를 통해 국내외 4가지의 사례연구를 진행하였다. 연구결과 국가위기관리 단계별 국가방위요소가 잘 작동하기 위해서는 관련법규, 주관기관, 국민의식이 구비되어야 함을 확인할 수 있다. 국가위기관리의 완전성을 위해서 국가위기관리기본법 제정과 관련법률의 정비, 통합방위계획의 수립, 연계된 훈련, 소통을 위한 C4I구비, 지자체장 능력강화, 소방의 국가방위요소화가 필요함을 제시하였다.

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • 제15권4호
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

Decision Tree Analysis for Prediction Model of Poverty of The Older Population in South Korea

  • Lee, Soochang;Kim, Daechan
    • International Journal of Advanced Culture Technology
    • /
    • 제10권2호
    • /
    • pp.28-33
    • /
    • 2022
  • This study aims to investigate factors that affect elderly poverty based on a comprehensive and universal perspective, suggesting some alternatives for improving the poverty rate of the elderly. The comprehensive and universal approach to the poverty of the aged that this study attempts can give a better understanding of the elderly poverty beyond the contribution of the existing literature, with the research model including individual, family, labor, and income factors as the causes of old-age poverty from the comprehensive and universal perspective on the causes of poverty of the elderly. In addition, the study attempts to input variants of variables into the equation for the causes of elderly poverty by using panel data from the 8th Korean Retirement and Income Study. This study employs decision tree analysis to determine the cause of the poverty of the elderly using CHAID. The decision tree analysis shows that the most vital variable affecting elderly poverty is making income. For the poor elderly without earned income, public pensions, educational careers, and residential areas influence elderly poverty, but for the poor elderly with earned income, wage earners and gender are variables that affect poverty. This study suggests some alternatives to improve the poverty rate of the aged. The government should create a better working environment such as senior re-employment for old people to be able to participate in economic activities, improve public pension or social security for workers with unfavorable conditions for public security of old age, and give companies that create employment of the aged diverse incentives.

러시아의 크림반도 합병의 해양안보적 고찰 (A Maritime Security Review of Russia's Annexation of Crimea)

  • 정민기
    • 해양안보
    • /
    • 제6권1호
    • /
    • pp.57-81
    • /
    • 2023
  • 본 연구는 러시아의 크림반도 합병의 해양안보적 고찰을 목표로 하였다. 본 연구는 러시아의 국가안보 인식에 대한 포괄적인 분석을 바탕으로 러시아의 해양안보전략과 흑해·아조프해의 안보적 중요성에 대해서 검토하였으며, 이후 크림반도 합병을 해양 안보적으로 고찰하였다. 이를 통해 본 연구는 러시아의 크림반도 합병이 군사적으로는 흑해함대의 활동을 보장하며 대서양으로의 진출 통로를 확보하여 NATO의 동진에 대항하고 경제적으로는 천연자원의 생산 및 수송, 해운의 안정적인 보장, 흑해경제권 내에서의 영향력 확보를 위한 전략적 고려를 바탕으로 이뤄졌음을 드러냈다.

  • PDF

포괄적 IT 자산관리의 자동화에 관한 연구 (Study on Automation of Comprehensive IT Asset Management)

  • 황원섭;민대환;김정환;이한진
    • 한국IT서비스학회지
    • /
    • 제23권1호
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로 (The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness)

  • 김종기;전진환;임호섭
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제15권1호
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

기술스트레스가 정보보안에 미치는 영향에 관한 연구 (An Investigation into the Role of Technostress in Information Security Context)

  • 박철주;임명성
    • 디지털융복합연구
    • /
    • 제10권5호
    • /
    • pp.37-51
    • /
    • 2012
  • 본 연구의 목적은 정보보안을 기술, 조직, 인적 요소 등을 포함하는 포괄적인 관점에서 접근하는 것이다. 정보보안 역시 최종 사용자와 관련된 기술을 포함하고 있기 때문에 기술스트레스를 증가시킬 수 있다. 따라서 기술스트레스 프레임워크를 활용하여 보안상황에서 보안인식훈련이라는 상황적 요인이 기술스트레스에 어떠한 영향을 미치며, 기술스트레스가 보안정책준수행위에 어떠한 영향을 미치는지 실증적으로 분석해보았다. 분석결과 보안인식훈련은 업무과중과 기술불확실성에 유의한 영향을 미치는 것으로 나타났으며, 이들은 보안정책 준수에 유의한 영향을 미치는 것으로 나타났다.

전자금융기반시설 정보보호 수준강화 방안 (정보보호 관리수준 분석을 통한) (Improvements of Information Security Level in Electronic Financial Infrastructure(By Analyzing Information Security Management Level))

  • 박근덕;염흥열
    • 정보보호학회논문지
    • /
    • 제26권6호
    • /
    • pp.1605-1618
    • /
    • 2016
  • 최근 몇 년 동안 금융회사(은행, 증권사, 신용카드사, 보험사 등)를 대상으로 한 개인정보 유출, 홈페이지 해킹, 분산 서비스거부공격(DDoS) 등 보안사고가 꾸준히 증가하고 있다. 본 논문에서는 현행 전자금융기반시설의 정보보호 관리수준의 문제점을 법적 준거성과 정보보호 인증제도 관점에서 분석하고 금융 분야 특성에 적합한 종합적인 관리체계 하에서 높은 수준의 정보보호 활동이 지속 가능하도록 정보보호관리체계, 정보보호 준비도 평가 및 주요정보통신기반시설 취약점 분석 평가 제도를 활용한 개선방안을 제시하고자 한다.

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • 제13권6호
    • /
    • pp.1613-1627
    • /
    • 2017
  • The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

제도적 측면에서 살펴본 도시농업의 현황과 과제 (The Current Status of the Korean Urban Farming Researched from an Institutional Perspective and Tasks for the Future)

  • 박진욱;안계복
    • 농촌계획
    • /
    • 제19권3호
    • /
    • pp.61-73
    • /
    • 2013
  • This study presents the methods to improve the urban farming in Korea by analysing the current circumstances of urban farming in Korea. Specifically, the legal system in association with urban farming, current status of the act on the urban farming, the present situation of the Korean urban farming, and the comprehensive plans for urban farming have been analysed in order to grasp the present situations and seek for solutions. Based on these, the research provides effective supporting methods for sustainable urban farming in Korea. As a result, the essentials to improved urban farming can be summarized with two factors; securing more space for urban farming and improving the supporting system for the urban farmers. Enthusiastic attitudes of local governments, security of budget, and cooperation with the citizens are vital to expand the urban farming in addition to the institutional and systematic urban farming improving methods mentioned above.