• Title/Summary/Keyword: Convergence security

Search Result 3,472, Processing Time 0.023 seconds

A Study on Developing Framework for Measuring of Security Risk Appetite (보안 위험성향 측정을 위한 프레임워크 개발에 관한 연구)

  • Gim, Gisam;Park, Jinsang;Kim, Jungduk
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.141-148
    • /
    • 2019
  • The advancement of digital technology accelerates intelligence, convergence, and demands better change beyond traditional methods in all aspects of business models and technologies, infrastructure, processes, and platforms. Risk management is becoming more important because of various security risks, depending on the changing business environment and aligned to business goals is emerging from the existing information asset based risk management. For business aligned risk management, it is essential to understand the risk appetite for achieving business goals, which provides a basis for decision-making in subsequent risk management processes. In this paper, we propose a framework for analyzing the risk management framework, pre - existing risk analysis, and protection motivation theory that influences decisions on security risk management. To examine the practical feasibility of the developed risk appetite framework, we reviewed the applicability and significance of the proposed risk appetite framework through an advisory committee composed of security risk management specialists.

Comparison of Health Status and Life Satisfaction According to Food Security in Single-Person Households of Elderly Population

  • Dong Hoon Jung;Jae Won Han;Wonha Kim;Hee-Sook Lim
    • Clinical Nutrition Research
    • /
    • v.13 no.1
    • /
    • pp.42-50
    • /
    • 2024
  • This study analyzed the 2019 Community Health Survey data to compare and analyze the health levels and life satisfaction of single-person elderly households based on food security. The final study subjects were 15,606 single-person elderly individuals aged 65 and above. These subjects were classified based on their response to food security into three groups: food sufficient-diverse, food sufficient-not diverse, and food insufficient. The study results showed that the proportion of the food insufficient group among single-person elderly households was 7.4% for men and 10.6% for women, with a slightly higher rate for female elderly. Both male and female elderly over 80 years of age, with low education levels, and basic living support recipients showed significantly higher proportions in the sufficient-not diverse and food insufficient groups. For male elderly, significant differences were observed in subjective health status and oral health level in the food insufficient group, and for female elderly, stress levels also showed significant differences. Life satisfaction scores were generally lower for female elderly compared to male, and significant differences were found in both male and female elderly based on food security. Common factors that significantly influence life satisfaction among single-person elderly households, both male and female, include food security, subjective health status, and living environment satisfaction, with food security being the most impactful factor. The study suggests that it is necessary to include these significant factors in the development of various social activity programs, such as dietary programs, to enhance life satisfaction and food security of single-person elderly households.

An Analysis of Industrial Security Curriculums in Colleges (국내 산업보안학과의 교과과정 분석: 교육 영역과 과목별 분류를 중심으로)

  • Jung, Jinhyo;Lee, Chang-Moo
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.29-53
    • /
    • 2019
  • Of all the 55 security departments in colleges, the information security departments occupies the majority of 45. Though existing security focused too much on information security, a new research stream on industrial security from a perspective of convergence has emerged. Since the first department of industrial security was established in a college in 2014, the total of four departments have been established until 2018. A new discipline to solve the existing problems and an opportunity to cultivate industrial security professionals have been greatly appreciated; however, the definition of industrial security is not yet specific, and more discussions on education categories and subjects with a focus on the characteristics of convergence are needed. The demand for industrial security professionals has gradually increasing and the departments of industrial security have been established to meet the demand. It is necessary, in this circumstance, to find out how the industrial security departments are teaching students. To this end, the purpose of this article is to deliver an overview of the educational curriculums of the four industrial security departments. This study analyzed 127 subjects in the curriculums, categorized educational areas, and employed Social Network Analysis to understand the relationships between subjects of each departments.

On the Configuration and Improvement of Security Control Systems (보안관제시스템 구성 및 개선방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.69-80
    • /
    • 2017
  • Due to the advanced IT environment, the role of Security Monitoring & Control becomes more important as the cyber-crime is becoming intelligent, diversified, and advanced. In contrast to the way it relied solely on security devices such as Firewall and IDS in the past, Security Monitoring & Control tasks responding to cyber attacks through real-time monitoring have become wide spread and their role is also important. In response to current cyber threats, since security equipment alone can not be guaranteed a stable defense, the task of Security Monitoring & Control became essential to operate and monitor security equipment and to respond in real time. In this study, we will discuss how to configure network security system effectively and how to improve the real-time Security Monitor & Control.

A Study on the Defense Information System Security Guideline for Network Centric Warfare (네트워크 중심전(NCW)하의 국방정보체계 제대별/기능별 정보보호지침 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Information security is a critical issue for network centric warfare(NCW). This paper provides defense information system security guidelines for NCW, which is a result of the research through a group decision making process. The purpose of the research is to intended to help military officers establish information system security measures within their organization.

  • PDF

A study on America Police-Private Security Partnership (미국 경찰과 민간경비의 Partnership에 관한 연구)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.15-22
    • /
    • 2012
  • A study on America Police-Private Security Partnership in Business Improvement Districts, Special Event Safety and Security, Community Policing, Alarms, Investigations, Electronic and Financial Crimes Investigations. Many Police-Private Security Partnerships have significantly changed how policing is done with respect to field operations, particularly patrol and access control. Some areas in which these collaborations have produced notable results are described here.

Analysis of the Security and Technical Problem of National Education Information System (교육행정정보시스템의 보안 및 기술적 문제 분석)

  • Lee, Dae Sik;Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2004
  • This paper is to analyze security and technical problem of NEIS and suggest an improving methods about the effective system. Therefore questionnaire was performed in the five items with security as well as technical problem of NEIS to primary and secondary school teachers. The result of questionnaire analysis on each item is that they think of NEIS as the essential system for the age of information, despite problems such as the invasion of human right and security as well as reveal of personal data.

  • PDF

A Study on Secure Matrix-based RFID Authentication Protocol (행렬기반 RFID 인증 프로토콜에 대한 연구)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.83-90
    • /
    • 2006
  • Recently, the security for RFID/USN environment is divided into network security and RFID security. The authentication protocol design for RFID security is studied to protect user privacy in RFID system. However, the study of efficient authentication protocol for RFID system is not satisfy a security for low-cost RFID tag and user privacy. Therefore, this paper proposes a secure matrix-based RFID authentication protocol that decrease communication overhead and computation. In result, the Matrix-based RFID authentication protocol is an effective authentication protocol compare with HB and $HB^+$ in traffic analysis attack and trace location attack.

  • PDF

A Study on the Verification Tool for the Security Level in Development Environment (개발 환경 보안수준 점검도구 연구)

  • Ko, Il-Seok
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.133-140
    • /
    • 2006
  • For the verification of the security level against a IT product development environment, we should analyze the vulnerability and the various threatening factors which exists in the IT product development environment. Also we need the evaluation criteria and tools for the evaluation and improvement of the level of information security. For that, we need evaluation indices and the standard it will be able to improve the evaluation methodology in the actual IT product development environment which will reach it will be able to apply must be researched. In this study, our aims are the development of verification tools for the security level of IT product development environment.

  • PDF

Algorithm of certificate security based-on using query language (사용자 질의어를 이용한 개인 인증 보안 알고리즘)

  • Lee, Chang-Jo
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.45-51
    • /
    • 2011
  • Certificate security oriented cyber certificate is important tool for the purpose of offering user-authentication service based on on-line system. In the paper, we analyzed management implement which could make the efficient use of certificate security oriented cyber terror response. This algorithm called SOL(Security Oriented Language) will make efficient use of the service about authentication consisting of the basis in the age of information through efficient management and partial use of each certificates. Especially, SOL could be used efficiently by grafting a small group of on-line system which is operated with particular purposes.