• Title/Summary/Keyword: Information Security Strategy

Search Result 473, Processing Time 0.027 seconds

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

The Role of Bank Payment Obligation under SWIFTNet's Trade Service Utility (SWIFTNet TSU BPO의 역할)

  • Lee, Bong-Soo
    • International Commerce and Information Review
    • /
    • v.17 no.2
    • /
    • pp.3-18
    • /
    • 2015
  • This thesis examines the performance and improvement strategy of SWIFTNet TSU's BPO for computerization and suggests the following results: First, the URBPO should be legally complemented, and the SWIFT and banks need to keep improving the systems to meet trade parties' diverse needs. Second, the SWIFTNet TSU's BPO should have an institutionally unified sharing platform with security, stability and convenience. In other words, it is needed to develop services which meet e-payment paradigm and international and regional environments through continued analysis on market changes and flow. Third, in order for the SWIFTNet TSU BPO to evolve into a perfect global system, there should be an innovative payment solution which can meet all trade parties all over the world. For this, technology standardization for a worldwide e-trade payment system is essential. Lastly, based on the results derived from this study, an analysis framework with which more diverse and practical environmental variables can be analyzed should be developed.

  • PDF

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Current State of Domestic Records and Record Management Related to Dispatch of ROK Armed Forces (한국군 해외파병 관련 국내 기록의 현황과 기록관리 실태)

  • Yoo, Jeong A;Yim, Jin Hee
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.3
    • /
    • pp.287-319
    • /
    • 2016
  • Dispatch of ROK Armed Forces is a significant contemporary event that enhances the ROK's position in the international communities and ensures the solid national security by contributing international peace keeping operations. Indirectly, dispatch of armed forces also can contribute to strengthen the national defense. However, despite its importance, record management related to the dispatch is not done properly. Because variable records produced in the process of dispatching troops are transferred to distributed archives, searching or accessing each record is not easy and making a collection from a series of record related to certain dispatch is more difficult. Moreover, since most transferred records were produced in the public domain, production and management of record in the aspect of archive of everyday life is needed. In this paper, we summarize the current state of domestic records by dispatch procedure, organization, and dispatched troops. And we also explore the problem of record management.

A Study on Logistics Distribution Industry's IoT Situation and Development Direction (국내외 물류산업의 사물인터넷(IoT) 현황과 발전방향에 관한 연구)

  • Park, Young-Tae
    • Management & Information Systems Review
    • /
    • v.34 no.3
    • /
    • pp.141-160
    • /
    • 2015
  • IoT(Internet of Things) has become a major issue as new type of convergence technology, expending existing of USNs(Ubiquitous Sensor Networks), NFC(Near Field Communication), and M2M(Machine to Machine). The IoT technology defines as a networking for things, which can establish intelligent links collaboratively for sensing networking and processing between each other without human intervention. The purpose of this study is to investigate to forecast the future distribution changes and orientation of contribution of distribution industry on IoT and to provide the implication of distribution changes. To become a global market leader, IoT requires much more development of core technology of IoT for distribution industry, new service creation and try to use a market-based demand side strategy to create markets. So, to become a global leader in distribution industry, this study results show that first of all establishment of standardization of IoT, privacy safeguards, security issues, stability and value were more important than others. The research findings suggest that the development goals of IoT should strive to boost the creation of a global leader in distribution industry and convenience to consider consumers' demands as the most important thing.

  • PDF

A Study about problem and a correspondence strategy along a beauty culture-Ubiquitous implementation (미용 부분의 유비쿼터스 구현에 따른 문제점과 대응전략에 관한 연구)

  • Lim Jin-Sook;Kang Jang-Mook
    • Journal of Digital Contents Society
    • /
    • v.5 no.3
    • /
    • pp.163-170
    • /
    • 2004
  • Ubiquitous is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the informatization revolution that Cyber Space saw a prime while world wide web service was expended was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous technology. Also, I presented the plan that derivation tried a problem about Ubiquitous, and can solve an each problem. Specially, infringement about personal privacy very has a lot of possession to occur in the world that radio communication between all appliances is possible. It is Ubiquitous by becoming the data which is useful to thorough preparation about the Ubiquitous world to come with presenting policy a little technical solution plan about this to the future Republic of Korea. many company has been cracked by crackers information security and everyday new computer virus come out.

  • PDF

Research on the type of technology convergence in the medical device industry based on topic modeling and citation analysis (토픽모델링과 인용 분석에 기반한 의료기기 산업의 기술융합 유형 연구)

  • Lee, Seonjae;Lee, Sungjoo;Seol, Hyeonju
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.7
    • /
    • pp.207-220
    • /
    • 2021
  • Industrial convergence is manifested in various forms by various drivers, and understanding and categorizing the direction of convergence according to the factors in which the convergence occurs is an essential requirement for the establishment of a company's customized convergence strategy and the government's corporate support policy. In this study, the type of convergence is analyzed from the perspective of knowledge flow between heterogeneous technologies, and for this purpose, the result of topic modeling of the text information of the patent and the citation information of the corresponding patent allocated for each topic are used. The methodology presented through case studies in the medical device field is verified. Through the proposed methodology, companies can predict the flow of convergence and use it as decision-making data to create new business opportunities. It is expected that the government and research institutions will be usefully used as basic data for policy preparation.

Status and Trend of Foreign Underground Data Centers (해외 지하 데이터센터의 현황과 동향 분석)

  • Lee, Chulho;Choi, Soon-Wook;Kang, Tae-Ho;Chang, Soo-Ho
    • Tunnel and Underground Space
    • /
    • v.29 no.1
    • /
    • pp.52-63
    • /
    • 2019
  • It is highly in demand to establish a bunker-type underground data center to ensure the safety of national critical data, such as financial information and medical information, and prevent those outflow of national important data. In particular, the security of a data center which is a key national structure has become a social issue due to EMP weapon and earthquakes, but data centers in the nation have not been able to deal with it properly. Therefore, it is necessary to develop an underground data center that is safe from human-induced and natural disasters while reducing power costs by utilizing the benefits of underground spaces such as constant temperature and isolation. In this analysis, the status and trends of data centers around the world were analyzed and based on those trend analyses, the research strategy for underground data center were discussed.

A Study on the Evaluation Method of Defense Technology Valuation Using the Readability Level Assessment of Core National Defense Technology (국방 핵심기술의 성숙도(Readiness Level)평가를 활용한 국방기술가치평가 방안 연구)

  • Lee, Hyung-Seog;Shin, Chung-Jin;Kang, Seok-Joong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1710-1719
    • /
    • 2019
  • This study is intended to understand defense technologies that require the convergence of various technologies and the integration of systems, and to propose valuation methods that reflect the characteristics of each field. The measure of technology level, integration (system integration technology) between technologies, preparation of manufacturing, and maturity scale of the weapons system to be valued are measured according to the items of measurement factors to verify system performance, and to present a framework for estimating the quantitative values of core technologies using system maturity. Considering the characteristics of each technology field, the research suggests a proper valuation method. In evaluating the value of defense technologies, A proposal is made to evaluate the value of defense technology by competent technical experts in each field, using SRL, which can be evaluated according to the evaluation criteria reflecting the technical characteristics of each field, and to evaluate the completion of the entire system in quantitative terms.

Assessment of public knowledge, perception, and acceptance of nuclear power in Bangladesh

  • Md Iqbal Hosan;Md Jafor Dewan;Md Hossain Sahadath;Debasish Roy;Drupada Roy
    • Nuclear Engineering and Technology
    • /
    • v.55 no.4
    • /
    • pp.1410-1419
    • /
    • 2023
  • Public perception plays a crucial role in the successful completion of a nuclear power project. As a newcomer country to nuclear power, there are lots of misconceptions among the Bangladeshi people about nuclear energy. Consequently, it is crucial to minimize all the doubts among mass people and build up their positive outlook toward nuclear power. This demands a comprehensive survey to figure out the public opinion, concerns, false impressions, and knowledge gap regarding nuclear power. In the present study, these issues were addressed by a survey that was responded to by 661 persons for the 24 survey questions. The questions were categorized based on information, knowledge, faith, benefit, awareness, and technology. Feedback and responders' basic demographic and socioeconomic information were collected from various locations in Bangladesh through online and in-person surveys. The responses were analyzed in both statistical and descriptive ways. Some of the feedback was found to vary with age, sex, and education level while others were quite independent of these parameters. It is found that socioeconomic development and energy security can be achieved by the inclusion of nuclear energy in the power system master plan of the country. However, huge knowledge gaps and misconceptions were found among the public regarding nuclear energy. As per feedback, political instability and corruption may affect the national nuclear power project in Bangladesh. Low faith in the existing rules & regulations for nuclear power programs was also observed. The result of this study will be handy to develop the communication and public awareness strategy for a successful nuclear power project in Bangladesh.