• Title/Summary/Keyword: Department of Security Service

Search Result 676, Processing Time 0.02 seconds

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Introduction to IPSEC(Internet Protocol Security) (인터넷 보안 프로토콜 IPSEC)

  • Choi, Y.B.;Hwang, S.O.;Lee, J.S.;Yoon, K.S.;Kim, M.J.
    • Electronics and Telecommunications Trends
    • /
    • v.14 no.6 s.60
    • /
    • pp.51-63
    • /
    • 1999
  • IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security among hosts rather than users unlike the other security protocols. Recently, IPSEC is emphasized as one of the important security infrastructures in the NGI (Next Generation Internet). It also has suitable features to implement VPN (Virtual Private Network) efficiently and its application areas are expected to grow rapidly. In this paper, the basic concepts and related standard documents of IPSEC will be introduced.

The Investigate of Security Service History focused on 1920s after the Provisional Government in Korea (임시정부 수립 후 1920년대에 전개된 경호 활동 고찰)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.53-68
    • /
    • 2008
  • The purpose of this study is to investigate about security service history as enlightenment period from the provisional government to 1920s. This study used materials by historical facts for the regulations and books in provisional government, newspapers in 1920s. There are four parts conclusion of this study: police department of provisional government, security service agency in the provisional government, security service agents of an independence movement, the general society of Korea. Firstly, Kim Gu, a prominent Korean nationalist leader, was understand of security service which was to protect provisional government from the enemy. So, Kim Gu participated in training of security service agents in the police department of provisional government. Secondly, there was security service agency in the provisional government. In 1920s, security service agency and agents appeared for the first time in regulations of the provisional government. At the beginning of the security service agency's appearance was influenced on background and circumstances for Korean independence activist who helped the independence of Korea from Japan. Thirdly, security service agents leaded an active for independence movement of the private organizations in 1920s. They carried on an independence movement in defiance of Japanese coercion as nationalist in Korea history. Fourthly, security service came out the general society of Korea in 1920s. The security service was not just for safety, but also for its security system and peace of mind, which were influenced by the political situation, social environment in 1920s. For the this reason, now security service has safety perception in Korea despite the historical progress.

  • PDF

The Security Service History focused on 1930s in Korea (1930년대에 전개된 경호 활동 고찰)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.23-41
    • /
    • 2009
  • The purpose of this study is to investigate about security service history on 1930s in Korea. This study used materials by historical facts for the regulations, books and newspapers in 1930s. In 1930s, security service was unknown details of the historical contents so far. There are four parts conclusion of this study: police department of provisional government, security service agency in the provisional government, security service agents of an independence movement, the general society of Korea. Firstly, Korean regional government in Manchuria, which Kokminbu(國民府) organized the security service agency(警護局) for protect government and public security. Most importantly, the security service agency appearanced an important place which were the independence movement and self-governing administration for Koreans in Manchuria. And the security service agency was required by the security service regulations(警護條例) as law. Secondly, diversity activities of security service in police were exposed the duty as 'car escort service(車輛警護)' for offenders, the 'township office guard' from mobsters, 'woodland protect service(林野警護團)' for fire-raisers. security service as police officer were widely application for protection and safety from danger. Thirdly, Mass society was needed to service for public security in daily events such as 'noted singer meeting', 'funeral procession to the graveyard', 'athletic meeting' as private establishment of security service agency in nowadays. people were wanted the private security service(私警護) from 1930s to present. Fourthly, Overseas security service mentioned in attack of politician, protect from poison and security service about train vessel fleet. In 1930s, security service is comprehensive protection which were not only bodyguard, but also safeguard for hazardous materials.

  • PDF

Study for academic establishment of phase of Department of Security Service (경호학의 학문적 위상정립을 위한 고찰)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.197-205
    • /
    • 2013
  • Security Service is the study for social safety and maintenance of order. Compared with the industrial circle, it has only been 18 years, though, many-sided scholars have been interested in this field and tried. The present Security Service, however, has several problems, so it is difficult to gain recognition as the value of learning. To achieve this, several kinds of prior tasks should get solved. First, Preparation for agreement between Industry and University about the academic concept and establishment of range. Second, Set up the School Register System for the academic establishment of identity. Third, Preparation of the plan for the organization of education system. Fourth, Study Direction different from the industrial world. (Unconcern) Therefore, the alternatives centered on some prior tasks will be suggested to enhance the identity and value of Security Service as the study.

A Study on the Civil Maritime Guarder to Enhance the Service of Coast Guard (해양경비 서비스 개선을 위한 경비지도사 제도에 관한 연구)

  • Jin, Sung-Yong;Park, Sung-Yong;Ju, Jong-Kwang;Lee, Eun-Bang
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2007.11a
    • /
    • pp.115-119
    • /
    • 2007
  • The system of civil security service is analyzed and reviewed in order to induce it to maritime security domain. A system of civil maritime guarder who provides security service and cooperates with coast guard at sea is proposed. It is expected not only that some expecters on the field of maritime security service are built up but that the Qualities of security services are improved in considering characteristics of sea control and coast guard.

  • PDF

A Security Reference Model for the Construction of Mobile Banking Services based on Smart Phones

  • Shin, Yong-Nyuo;Shin, Woo-Chang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.229-237
    • /
    • 2011
  • As smart phones have become widely adopted, they have brought about changes in individual lifestyles, as well as significant changes in the industry. As the mobile technology of smart phones has become associated with all areas of industry, it is not only accelerating innovation in other industries such as shopping, healthcare service, education, and finance, but is also creating new markets and business opportunities. The preparation of thorough security measures for smart phones is increasing in demand. While offering excellent mobility and convenience, smart phones can be exposed to a range of violation threats. In particular, it is necessary to make efforts to develop a security system that can preemptively cope with potential security threats in the banking service area, which requires a high level of reliability. This paper suggests a security reference model that is considered for the smart phone-based joint mobile banking development project being undertaken by the Bank of Korea in 2010. The purpose of this study is to make a security reference model for a reliable smart phone-based mobile financial service, by recognizing the specific security threats directed toward smart phones, and providing countermeasures to these security threats. The proposed mobile banking security reference model is useful in improving system security by systematically analyzing information security threats to the mobile financial service, and by presenting the guideline for the preparation of countermeasures.

A Study on Measurements of IT Security Service Quality : Feasibility of Quantitative Measures (IT 보안 서비스 품질의 측정 방법에 관한 연구 : 정량 지표의 사용 가능성)

  • Kyung, Ji Hoon;Kim, Chong Su
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.30-38
    • /
    • 2015
  • IT security service provides customers with the capability of protecting the networked information asset and infrastructures, and the scope of security service is expanding from a technology-intensive task to a comprehensive protection system for IT environment. To improve the quality of this service, a research model which help assess the quality is required. Several research models have been proposed and used in various service areas, but few cases are found for IT security service. In this work, a research model for the IT security quality has been proposed, based on research models such as SERVQUAL and E-S-QUAL. With the proposed model, factors which affect the service quality and the best quality measure have been identified. And the feasibility of using quantitative measures for quality has been examined. For analysis, structural equation modeling and various statistical methods such as principal component analysis were used. The result shows that satisfaction is the most significant measure affected by the proposed quality factors. Two quality factors, fulfillment and empathy, are the main determinants of the service quality. This leads to a strategy of quality improvement based on factors of emotion and perception, not of technology. The quantitative measures are considered as promising alternative measures, when combined with other measures. In order to design reliable quantitative measures, more work should be done on target processing time and users' expectation. It is hoped that work of this research will provide efficient tools and methods to improve the quality of IT security service and help future research works for other IT service areas.

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.

The Security Life Cycler Energy Service Platform for Universal Middleware (유니버설미들웨어기반 생명주기 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1197-1202
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support start, stop and updating of the security module by applying the security policy module layer concept. It is modular system enabling to design of dyanmic models in the smart grid, the service was intended to be standardized and applied to the security service platform.