• Title/Summary/Keyword: Core Knowledge Security

Search Result 36, Processing Time 0.03 seconds

An Exploratory Study on the Core Technology of the Fourth Industrial Revolution and Information Security Organization: Focusing on Firm Performance (4차산업혁명 핵심기술 도입 및 정보보호조직에 관한 탐색적 연구: 성과측면에서의 비교분석)

  • Kim, Kihyun;Cho, Hyejin;Lim, Sohee
    • Knowledge Management Research
    • /
    • v.21 no.1
    • /
    • pp.41-59
    • /
    • 2020
  • This explorative study examines the difference in firm performance according to the adoption of the core technology of the Fourth industrial revolution, including artificial intelligence(AI), internet of things (IoT), cloud computing, and big data technology. Additionally, we investigate the importance of internal organizational structure exclusively responsible for information security. We analyze unique microdata offered by the Korea Information Society Development Institute to examine the impact of the adoption of the new technologies and the existence of organizational structure for information protection on firm performance, i.e., firm sales. By considering the core information technology as powerful knowledge assets, we argue that the adoption of such technology leads firms to have comparative advantage comparing to the competitors. Also, we emphasize the need to consider the organizational structure suitable for information security, which can become a structural asset of a firm.

RAM Encryption for preventing RAM Core Dump Exploitation. (RAM Core Dump Exploitation을 방지하기 위한 RAM Encryption)

  • Shin, Yong-Myeong;Kim, Kang-Seok;Yeh, Hong-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.891-892
    • /
    • 2011
  • 최근 많은 연구들은 RAM이 이전에 우리가 생각하는 것처럼 안전하지 않다는 것을 증명했다. RAM에는 암호화되지 않은 data가 저장되는데, RAM에 저장되어있는 데이터를 보호하기 위한 연구들이 진행되고 있다. 최근 cold boot attack이나 core dump exploitations은 과거 우리가 생각했던 것만큼 RAM이 안전하지 않다는 것을 증명하였다. 이런 유형의 공격으로부터 RAM을 보호하기 위한 방법으로 RAM의 암호화 방안을 제안한다.

Quantitative and Qualitative Considerations to Apply Methods for Identifying Content Relevance between Knowledge Into Managing Knowledge Service (지식 간 내용적 연관성 파악 기법의 지식 서비스 관리 접목을 위한 정량적/정성적 고려사항 검토)

  • Yoo, Keedong
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.119-132
    • /
    • 2021
  • Identification of associated knowledge based on content relevance is a fundamental functionality in managing service and security of core knowledge. This study compares the performance of methods to identify associated knowledge based on content relevance, i.e., the associated document network composition performance of keyword-based and word-embedding approach, to examine which method exhibits superior performance in terms of quantitative and qualitative perspectives. As a result, the keyword-based approach showed superior performance in core document identification and semantic information representation, while the word embedding approach showed superior performance in F1-Score and Accuracy, association intensity representation, and large-volume document processing. This study can be utilized for more realistic associated knowledge service management, reflecting the needs of companies and users.

Functional Requirements of Data Repository for DMP Support and CoreTrustSeal Authentication

  • Kim, Sun-Tae
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.7-20
    • /
    • 2020
  • For research data to be shared without legal, financial and technical barriers in the Open Science era, data repositories must have the functional requirements asked by DMP and CoreTrustSeal. In order to derive functional requirements for the data repository, this study analyzed the Data Management Plan (DMP) and CoreTrustSeal, the criteria for certification of research data repositories. Deposit, Ethics, License, Discovery, Identification, Reuse, Security, Preservation, Accessibility, Availability, and (Meta) Data Quality, commonly required by DMP and CoreTrustSeal, were derived as functional requirements that should be implemented first in implementing data repositories. Confidentiality, Integrity, Reliability, Archiving, Technical Infrastructure, Documented Storage Procedure, Organizational Infrastructure, (Meta) Data Evaluation, and Policy functions were further derived from CoreTrustSeal. The functional requirements of the data repository derived from this study may be required as a key function when developing the repository. It is also believed that it could be used as a key item to introduce repository functions to researchers for depositing data.

A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework (보안전문인력 양성을 위한 직업분류체계별 정보보호 핵심지식 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.113-125
    • /
    • 2015
  • Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.

Methodological Principles of Didactics Ddevelopment in Educational Activity of Higher Eeducation Institutions

  • Bortniuk, Tetiana;Smyrnova, Tetiana;Tkachenko, Tetiana;Yakymenko, Svitlana;Pushkar, Larysa;Desiatnyk, Kateryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.394-398
    • /
    • 2022
  • The article determines that the study of the development of scientific and didactic knowledge about the educational process in higher education should be built mainly on the basis of qualitative research methods that ensure the identification and understanding of the changes taking place in didactic knowledge, in the unity of their internal and external manifestations. On the basis of the epistemological model of the study of science, a generalized model of didactic knowledge about the educational process in higher education, including didactic relations as a theoretical core, subject of research, research methods and positions of researchers, ways of interaction between science and educational practice, and thematic structures of didactic knowledge; scientific and methodological problems of didactic knowledge about the educational process in higher education at the present stage of its developments due to the post-nonclassical transformation and orientation of research towards the humanitarian ideal of scientific character.

Advanced approach to information security management system utilizing maturity models in critical infrastructure

  • You, Youngin;Oh, Junhyoung;Kim, Sooheon;Lee, Kyungho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4995-5014
    • /
    • 2018
  • As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities. Currently, these methods of measuring information security are a concrete method of recommendation in related standards. However, the security controls used in these methods are lacking in connectivity, causing silo effect. In order to solve this problem, there has been an attempt to study the information security management system in terms of maturity. However, to the best of our knowledge, no research has considered the specific definitions of each level that measures organizational security maturity or specific methods and criteria for constructing such levels. This study developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. The proposed model is simulated using the thermal power sector in critical infrastructure of the Republic of Korea to confirm the possibility of its application to the field and derive core security processes and goals that constitute infrastructure security maturity. The findings will be useful for future research or practical application of infrastructure ISMSs.

A Study on the Measures for the Development of Electronic Security in the 4th Industrial Revolution Era (4차 산업혁명 시대 Electronic Security 발전 방안에 관한 연구)

  • Kim, Min Su
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.109-114
    • /
    • 2020
  • Currently, in the 4th industrial revolution era(4IR), the convergent infrastructure has been established by actively utilizing data based on the existing digital technological innovation in the 3rd industrial revolution. Thus, the technological innovation based on the knowledge-information society needs to put innovative efforts for creating new business models in various areas. Thus, this study aims to present an Electronic Security Framework by suggesting the Cyber-Physical Security System(CPSS) that could more accurately predict and efficiently utilize it based on structured data obtained by collecting, analyzing, and processing an enormous amount of unstructured data which is a core technology distinguished from the 3rd industrial revolution.

A Conceptual Study on Outsourcing Strategy in Betel Industry (관광호텔 아웃소싱 전략에 관한 개념적 고찰)

  • 정연홍;하용규
    • Culinary science and hospitality research
    • /
    • v.8 no.3
    • /
    • pp.123-146
    • /
    • 2002
  • Outsourcing is procuring of outside resources, other than core resources for core competence, by a contract, from which a corporate can focus its core resources on core business. The outsourcing strategies of Korea tourist hotel business are in a rudimentary stage, which has been limited in simple work areas such as housekeeping services, room maid services, parking control services, security services, janitor services, laundry services, facility management, shuttle bus services, and sterilization services and their purposes are mainly to retrench a burden of employment or firm-fixed expenses. Therefore, the outsourcing strategies of Korea tourist hotel business have the following problems. First, their outsourcing has introduced only for the purpose of retrenching expenses. Second, it tends to deteriorate service quality, due to lack of pre-training. Third, it tends to concentrate their attentions only on simple repetition works. Fourth, their outsourcing is slow adjusted to the needs of business cultures. Outsourcing services in Korea tourist hotel business have never contributed to their basic concepts such as 1) maintenance or enhancement of core competences, 2) promotion of business efficiency through service quality improvement and expense retrenchment, and 3) achievement or enhancement of competitive advantage through enlarging their specialties, cultivating their market, learning new knowledge, and developing their asset. Therefore, this study is to insist on fife necessity of overcoming simple repetitive service outsourcing in tourist hotel business. In order to build a core competence and/or achieve a competitive advantage, the scopes of outsourcing services should be enlarged in Korea tourist hotel business.

  • PDF

Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process: focus on Information Security (계층분석과정을 이용한 융합보안을 위한 물리 보안 이벤트 활용: 정보 보안 중심)

  • Kang, Koo-Hong;Kang, Dong-Ho;Nah, Jung-Chan;Kim, Ik-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.553-564
    • /
    • 2012
  • Today's security initiatives tend to integrate the physical and information securities which have been run by completely separate departments. That is, the converged security management becomes the core in the security market trend. However, to the best of our knowledge, we cannot find any solutions how to combine these two security events for the converged security. In this paper, we propose an information security object-driven approach which utilizes the physical security events to enhance and improve the information security. For scalability, we also present a systematic method using the analytic hierarchy process finding the meaningful event combinations among the large number of physical security events. In particular, we show the whole implementation processes in detail where we consider the information security object 'illegal computing system access' combined with two physical security devices - access controller and CCTV+video analyzer system.