• Title/Summary/Keyword: Executive protection

Search Result 29, Processing Time 0.023 seconds

A Trend Analysis and Technology Application of Defense Technology Protection (방위산업 기술보호 동향분석 및 기법적용)

  • Lee, Hyo Keun;Lee, Woon Soon;Oh, Yoo Jin;Park, ShinSuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.579-586
    • /
    • 2017
  • The defense industry has become a global industry, and military technology is actively being traded between countries to increase their military capabilities. The Republic of Korea has been ranked one of the top 10 countries for exports of military technology. To maintain competitive advantages in the global defense industry, it is essential to protect key technologies employed by exported weapon systems. Various techniques have been developed for protection of confidential technologies in weapon systems, and the U.S. DoD has been leading the development of the protection techniques. This paper reviews current anti-tampering techniques that prevent leakage of key technology from weapon exportation or pillage. Based on the protection techniques employed by the U.S. DoD Anti-Tamper Executive Agent, this paper suggests novel design methods for protection of confidential technologies. The proposed design methods were tested on an actual weapon system.

Mobile Agent Protection Scheme through Execution Tracing of Agent Code and Status (에이전트 코드와 상태 추적을 통한 이동에이전트의 보호 기법)

  • 정창렬;고진광
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.743-750
    • /
    • 2003
  • With the expansion of computer technology the mobility of a mobile agent code having the flexibility in the dispersive computer situation is used to set up the applications distributed on the Internet. As it also has the ability to transmit the mobile code of a mobile agent and to receive it from a far-off host, the executive circumstances of the host system in which an agent is executed have to access to an agent code and the executive state capable of executing an agent code. Therefore, it is difficult to prevent the forgery, the alteration and the wrong execution of an agent from a malicious host. This dissertation suggests the mechanism which can protect an agent from the malicious action through the executive pursuit of a code-named mobile agent. The security of this mechanism is verified through the protective process of a mobile agent in this mechanism.

A tamper resistance software mechanism using MAC function and dynamic link key (MAC함수와 동적 링크키를 이용한 소프트웨어 변조 방지 기법)

  • Park, Jae-Hong;Kim, Sung-Hoon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.11-18
    • /
    • 2013
  • In order to prevent tampering and reverse engineering of executive code, this paper propose a new tamper resistant software mechanism. This paper presents a cryptographic MAC function and a relationship which has its security level derived by the importance of code block instead of by merely getting the encryption and decryption key from the previous block. In this paper, we propose a cryptographic MAC function which generates a dynamic MAC function key instead of the hash function as written in many other papers. In addition, we also propose a relationships having high, medium and low security levels. If any block is determined to have a high security level then that block will be encrypted by the key generated by the related medium security level block. The low security block will be untouched due to efficiency considerations. The MAC function having this dynamic key and block relationship will make analyzing executive code more difficult.

A Study on Streamlining the Legal Framework for the Efficient Management of Protection and Security of the Government Complexes (정부청사의 효율적 방호·보안관리를 위한 법령체계 정비방안에 대한 소고)

  • Shin, Hyeong-Seok
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.39-57
    • /
    • 2019
  • The executive authority of the Ministry of Public Administration and Security on the 'management of security of the government complexes' is not sufficiently secured only with the organization law, the Government Organization Act. It is needed to establish an administrative actions law, an individual law that sets detailed contents and limitations of the executive authority to be stipulated. The current regulation, Regulation on the Management of the Government Complexes which is a Presidential Decree, is a legal decree that lacks a legal basis. The decree does not match with the current constitutional framework and raises the issue of its legality. The regulation may have the characteristics as a public property management law so far as it stipulates such matters as supply and maintenance management for the complexes, acquisition and disposition of complexes, facilities management of complexes, etc. However, the regulation includes high authority actions by an administrative organization, such as facilities security and order maintenance including restriction and control of access. This makes the regulation have the characteristics of a public property policy act as well. To supplement the legal framework for this situation, it is needed to level up some of the provisions relating to protection and security management to the level of an act as they stipulate high authority actions by an administrative organization. Other matters in the Regulation on the Management of the Government Complexes such as provisions relating to supply and allocation of complexes, etc. may be maintained as they are. In addition, the protection officers (general service official) does not own legal authority and have limitations on securing the capability to deal with the situations on implementing the on-site protection duty. Therefore, it is needed for the protection officers to secure protection duty-related authority by stipulating in a law. The main contents of the law on the protection and security of the government complexes may be those matters providing reservations on the implementations of laws. These may include the limitation of rights of and charging obligations on the people such as restricting the actions of personnel in the complex, rights and obligations of protection personnels relating to their duties, use of weapons, training of protection personnel, penal provisions, etc. These legal reservations should be included in an individual act.

A Study of Environmental Management Investment Allocation

  • Tien, Shiaw-Wen;Chang, Ting-Ting;Chung, Yi-Chan;Chen, Ching-Piao;Tsai, Chih-Hung
    • International Journal of Quality Innovation
    • /
    • v.9 no.2
    • /
    • pp.57-77
    • /
    • 2008
  • The $21^{st}$ century is a new century of environmental protection. Environmental protection is one of the most important subject matters yet to come. Moreover, as the public pays more attention to environmental problems, enterprises should increase their investment in environmental management. Therefore, determining the investment level for environmental management and allocating the investment to associated environmental management activities has become a major task. The principal and agent theory and sales response functions are used for analysis in this research. The allocation of capital investment in environmental management is found to have significant impact on the aggregate sales response, aggregate profit and investment level. Therefore, in preparing the budget for environmental management, enterprises should focus on investment allocation decisions, determine the investment level and allocation method using integrated means, and apply submarket data in the allocation decision-making process. In other words, in setting the investment level, executive management should take managers' willingness into consideration. In allocating capital investment, managers should identify the optimal allocation method based on submarket characteristics.

Developing a Safety Scaffold Monitoring System Using Wireless Sensor Network Technology

  • Tserng, H. Ping;Huang, Hung-Jui;Li, Xin-Yan;Huang, Han-Tang
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.324-327
    • /
    • 2015
  • Scaffold is the most commonly used equipment in various types of construction works. Since various types of construction works use the same scaffold equipment, it becomes more difficult to be controlled and managed, thus resulting hazard frequently. According to the information announced in July 2012 by Council of Labor Affairs Executive Yan, the site collapse or incomplete anti-falling protection has led the site to accident frequently, and this is the main reason that causes construction industry occupational disasters. The labor death occupational hazard ratio rises up to 13% in scaffold activity, and the Council of Labor Affairs Executive Yan has showed that the death ratio is higher when using the scaffold in construction site, the total number of death has reached to 139 from 2005 to 2010. In order to ensure the safety of scaffold user, this study tends to build a wireless sensor monitoring system to detect the reliability and safety of the scaffold. The wireless sensor technique applies in this study is different with the traditional monitoring technique which is limited with wired monitoring. Wireless sensor technique does not need wire, it just needs to consider the power supply for establishing the network and receiving stable information, and it can become a monitoring system. In addition, this study also integrates strain gauge technique in this scaffold monitoring system, to develop a real-time monitoring data transfer mechanism and replace the traditional wired single project monitoring equipment. This study hopes to build a scaffold collapse monitoring system to effectively monitor the safety of the scaffold as well as provide the timesaving installation, low-cost and portable features.

  • PDF

Mechanisms of Protection of the Rights and Interests of Entrepreneurs in Russia

  • Turanin, Vladislav Yurievich;Kistenev, Vitaliy Valentinovich;Posokhova, Yana Vitalievna;Kisteneva, Olga Alekseevna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.291-293
    • /
    • 2022
  • The implementation of the legal mechanism to protect the rights and interests of entrepreneurs in Russia has its unique features. When the rights and interests of a businessman are threatened with infringement, specific legal remedies may be applied, by means of which the violated rights and interests are restored and, thereby, the opportunity to resume entrepreneurial activity is created. The paper explores extrajudicial ways to protect the rights and interests of entrepreneurs in Russia. The study analyzes the forms of self-help, arbitral tribunal, resolution of applications and complaints by executive authorities, the notariate, and work with the business ombudsman and civil society institutions.

Development and Application of Dry Process Caisson for Maintenance of Submerged Barber Structure

  • Lee, Joong-Woo;Lee, Seung-Chul;Oh, Dong-Hoon;Kwak, Seung-Kyu;Lee, Jeong-Su
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2006.10a
    • /
    • pp.105-114
    • /
    • 2006
  • Together with the trend of enhancement in domestic industrial development and economic progress due to import and export, the demand for construction of the roads, bridges, especially port facilities, and several coastal protection and ocean structures is increasing rapidly. MOMAF of Korean Government is driving construction of 9 new ports and renovation of the existing fishery ports. Among these structures most of bridge base, wharves, dolphins, quays, and jetties are being newly built of steel or concrete pile. As the base, supporting bulkheads, and piles are underwater after construction, it is difficult to figure out the status of structures and not enough to get maintenance and strengthen the structures. Every year, moreover, these works suck the government budget due to higher incomplete maintenance expense for protection from corrosions of structures and increased underwater construction period. for the purpose of cutting down the government budget, it is necessary to extend the life cycle of the existing structures. We developed a new method for maintenance of submerged structures near the waterline by allowing dry work environment with the floating caisson. The method shows easy to move around the working area and handle. It also showed not only a significant reduction of maintenance expenses and time for anti-corrosion work but also better protection. This will be a milestone to reduce the maintenance and construction expenses for the shore and water structures.

  • PDF

Study the role of information security personnel have on an organization's information security level (정보보호담당자의 역할이 조직의 정보보호수준에 미치는 영향)

  • Choi, Dong-Keun;Song, Mi-Sun;Im, Jong In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.197-209
    • /
    • 2015
  • The issue of information security within an organization began to be recognized as risk of the organization. Because of this, not only ISO(Information Security Officer) but an executive or CEO were forced to resign. In addition, it brought about heavy financial damage to the company and made the company difficult to restore trust to customers. At a time when inadvertent disclosure of personal information has become accepted as a matter of survival because of having a bad effect within an organization, how the information security specialist causes influence on information protection level of the organization. For these reasons, targeting the information security specialists of various industry sectors, we'll analyse how task performance rate of the information security specialist within an organization cause influence to the information security level. The goal of this study is for the company to raise the task proportion of information security specialist and to improve the information protection level of the organization.

A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure (트럼프 행정부의 주요기반시설 사이버보안 정책분석에 관한 연구)

  • Kim, Geunhye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.907-918
    • /
    • 2019
  • The purpose of this study is to understand the cybersecurity policies and critical infrastructure protection of the United States through analyzing Donald Trump's administration executive orders, the national cyber strategy, and the legislation. The analysis has three findings. First, the Department of Homeland Security (DHS) became a main agent in the cybersecurity while the role of the White House was reduced. Second, Trump's administration expanded its role and mission in the policy area by extending the meaning of critical infrastructure. Third, in the case of cyber threats, the government can be involved in the operation of critical infrastructures in the private sector. The opinions of the professional bureaucrats and DHS were more reflected in the direction of the cybersecurity policy than those of the White House. In contrast to Barack Obama's administration, the Trump administration's cybersecurity strategies were not much studied. This study provides insights for improving cybersecurity policies and critical infrastructure protection.