• Title/Summary/Keyword: Electronic Security(System)

Search Result 847, Processing Time 0.031 seconds

The Trends of Electronic Security System and Prospects of Security Market (기계경비시스템의 변화와 시장전망)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.147-165
    • /
    • 2003
  • Since Electronic Security System is introduced in Korea in 1981 by foreign technology, Security market has been increasing considerably during short period, and It performs it's security roles well in place of security guards. As electronic and communication technology is highly developed, Electronic Security System and security market structure is changing naturally. Especially high-tech mobile communication technology will change the method of Electronic Security business. Also the pattens of residence and life style, such as the trend toward nuclear family and single life could effect security market. In recent year, new business models that apply the mobile phone and internet is appeared. Although Electronic Security System is changed by the changes of technology, It is very difficult to change the basic elements, such as sensing, alarm signal transfering, and response. The rate of increase of Electronic Security market is expected to matain it's increase pace for the time being. But the development of new system for new protectes such as childeren, old person, vehicle rather than immovable facility is necessary to prepare for the continuous competition.

  • PDF

Security Evaluation Criteria of Electronic Payment System (전자 지불 시스템의 보안 평가 기준)

  • 신장균;황재준
    • Proceedings of the CALSEC Conference
    • /
    • 1999.07b
    • /
    • pp.491-500
    • /
    • 1999
  • Recent increase of commercial network Integration to World Wide Web(WWW) shifts an ordinary commerce to electronic environment. This draws more people to examine re-assurance of their secure transaction. This study investigates current status of security methodology for Electronic Payment System and extracts important axis of security level for electronic payment. Using these axis as security evaluation criteria, the research proposes a security matrix which consists of four different level of security granularity, hence allowing evaluation of a nation-wide credit card based payment system. Feasible usage of this matrix contributes to security analysis of the electronic system as whole, hence providing better secured electronic environment.

  • PDF

Development and Application in Measurement of Security Need Satisfaction From Users of Electronic Security System (기계경비시스템 이용자의 안전욕구충족 척도 개발과 적용)

  • Kim, Chan-Sun
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.47-64
    • /
    • 2008
  • The purpose of this study is to develop the measurement of security needs satisfaction from users of electronic security system, to verify its validity and reliability, and by applying them, to examine the effects between the communities using this system. In 2008, the users of electronic security system in big cities in Seoul(Yong-San, Jong-Lo) and Gyung-Gi Do(Su-Won) for their convenience stores, jewelry shops, communication services, banks, government and public offices, etc. were arranged for a population and 262 of them were used for the final analysis by purposive sampling. This study yields following results. First, the validity of security need satisfaction from users of electronic security system is very high, which means the explanatory adequacy of environmental security need is the highest. Second, the reliability of security need satisfaction from users of electronic security system is very high, in which the reliability value(Cronbach's $\alpha$) of internal consistency is over .765. Third, the security need of electronic security system has the most effects on the group of bank workers. That is, through a close cooperative system between the bank and the service of electronic security system, the more keeping satisfied the environmental, bodily, physical security needs are, the less the in security of this group has. Informational security need has the most effects on convenient store group. It means the service companies of electronic security system offer more services at dawn time and make or supply all sorts of visual information system, which reduces insecurity of the convenient store group.

  • PDF

Building an Electronic Approval Module Using Multi-Level Security (다중등급 보안 정책을 적용한 전자결재 모듈의 개발)

  • 김진성;안병혁
    • The Journal of Information Systems
    • /
    • v.11 no.1
    • /
    • pp.175-198
    • /
    • 2002
  • This paper is to develop a security module for electronic approval systems. Electronic documents are created, transmitted and saved in the company's intranet computer network. Transmitting electronic documents, however, brings us a security problem. Communications among various computer systems are exposed to many security threats. Those threats are eavesdropping, repudiation, replay back etc. The main purpose of this paper is to develop a module which provides the security of electronic documents while they are passed from one place to another This paper applies Multi-Level security to the electronic approval system that guarantees security of electronic documents from many threats. Multi-Level security controls the access to the documents by granting security level to subject users and object electronic documents. To prevent possible replay back attacks, this paper also uses one time password to the system. The security module is composed of client program and server one. The module was developed using Microsoft Visual Basic 6.0 and Microsoft SQL Server 7.0. The code uses Richard Bondi's WCCO(Wiley CryptoAPI COM Objects) library functions which enables Visual Basic to access Microsoft CryptoAPI.

  • PDF

A Study on the Security Vulnerabilities and Defense Mechanism for SET-based Electronic Commerce (SET기반 전자상거래의 보안위협요소 분석 및 대응 방안에 관한 연구)

  • 김상균;강성호
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.2
    • /
    • pp.59-79
    • /
    • 1999
  • In order to construct a successful electronic commerce system, three main essential factors must be satisfied to obtain the best effective outcomes. The three main essential factors are as follows : economic factor, effectiveness factor and convenient factor. In order to understand the role of these three factors, one must have some insight knowledge about security to assist him to implement these three factors in his construction of an electronic commerce system. This paper analyses a implementation mechanism of security systems based on the SET 1.0 standard for electronic commerce systems, thus providing an effective plan for the construction of a security system in the SET-based electronic commerce field. This paper helps to analyse the elements of security vulnerabilities in the SET 1.0 standard implementation and also helps to understand the SET 1.0 protocol.

  • PDF

The Operating Status of Security Alarm Systems and the Polices for Inproving the Operational Quality (기계경비시스템 운용현황 고찰과 운용품질개선 방안)

  • Sin, Sang-Yeop
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.197-218
    • /
    • 2004
  • This study has been conducted to provide data that contribute to increasing efficiency of 'Private Security', which is cooperated by customer, security companies and the police which carried out 'Public Law Enforcement' and controls security companies. To reach this purpose, we investigated the status of the 'Security Alarm Systems' operated by security service companied in Korea, analyzed arising problems, considered the polices for improving the operational quality. 'Electronic Security Systems' will increase working efficiency in performing 'Private Security'. There can be no two opinions on this matter. Therefore, it can be supposed that the improvement of operational quality of 'Electronic Security System' is an important factor to accomplish security services. 'Security Alarm System' is one of the 'Electronic Security System'. The critical problems in operating 'Security Alarm system' are unnecessary response by false alarm and nuisance alarm. To reduce the problems, it is suggested that security specialist officially licensed should improve security planning, installation and maintenance, and the 'Alarm Verification System' should be introduced with appropriate facilities.

  • PDF

IC Card Security System for CEPS in Internet (CEPS 인터넷 서비스를 위한 IC카드 기반의 보안 시스템 구축)

  • Lee, Jong-Hoo;Ra, Eun-Ju;Baek, Sang-Soo;Ji, Seok-Jin;Lee, Yong;Ryu, Jae-Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.23-37
    • /
    • 2002
  • As the world-wide use of the Internet increases rapidly due to development of computer network the Electronic Commerce for business by treating it is growing as compared to the traditional one for the information exchange in the academic and research areas. The Electronic Payment System used for EC includes the Payment Broker System and the Electronic Purse System. And usually Electronic Purse System operates with IC cards. Saving the money in IC card has a high portability and security. Therefore, the Electronic purse System based on IC card is recently issued in the EC. In this paper, we design and implement of a IC card security system for Common Electronic Purse Specifications in Internet. CEPS is a Electronic Purse System proposed VISA, and conform EMV(Europay Mastercard VISA) security structure. With our system, users easily use Electronic Purse System with only Web browser and IC card. Original EMV paid no regard to using in the Internet. But our system, conforming to CEPS and EMV, is easily used in the Internet.

Design of Security Mechanism for Electronic Document Repository System (전자문서 보관 시스템을 위한 보안 메커니즘 설계)

  • Kim, Jeom-Goo;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.99-111
    • /
    • 2011
  • The management and deposit of paper document costs are increased gradually. Specially, it is too expensive to safekeeping paper document in the warehouse. Also paper based document system is exposed in several security problems. Therefore, demands of transformation process from paper document into electronic ones are quietly needed. Electronic document repository system is one of the best solutions for solving paper based document system issues. Electronic document repository system can reduce overall costs and provides some advantages in comparison with paper based document system. But, electronic document repository system has no formal methodology for guarantee safeties. Therefore, we suggest a security mechanism for establish electronic document repository system. Suggested security methodology can help for design of more secure electronic document repository system.

Electronic Security Control Center Building Process and Security and Management Measures (시스템경비 관제시설의 구축과 보안 및 경영대책)

  • Ha, Kyung-Su;Cho, Cheol-Kyu;Kim, Pyong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.113-121
    • /
    • 2015
  • This research suggests construction processes and security solutions for security control center as management measures for security management improvement in domestic electronic security companies. Security control center (SCC) is the central nerve of electronic security service, and no matter how well the on-site response system has been built, if SCC ceases to work due to an incident or disaster or security control personnel are harmed, the electronic security system cannot perform its proper functions. It is divided to a spatial structure, the infrastructure, control equipment, control solutions and operating structure in a construction process in the security control center. And a solution can be presented for physical security, information security, and personnel security in the way to security solutions.

A Study on the Measures for the Development of Electronic Security in the 4th Industrial Revolution Era (4차 산업혁명 시대 Electronic Security 발전 방안에 관한 연구)

  • Kim, Min Su
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.109-114
    • /
    • 2020
  • Currently, in the 4th industrial revolution era(4IR), the convergent infrastructure has been established by actively utilizing data based on the existing digital technological innovation in the 3rd industrial revolution. Thus, the technological innovation based on the knowledge-information society needs to put innovative efforts for creating new business models in various areas. Thus, this study aims to present an Electronic Security Framework by suggesting the Cyber-Physical Security System(CPSS) that could more accurately predict and efficiently utilize it based on structured data obtained by collecting, analyzing, and processing an enormous amount of unstructured data which is a core technology distinguished from the 3rd industrial revolution.