• Title/Summary/Keyword: National Security

Search Result 5,206, Processing Time 0.031 seconds

Object Classification Method for Security Model Based on Linux System (리눅스 환경에서 보안 모델을 위한 객체 분류 방법)

  • Im Jong-Hyuk;Park Jae-Chul;Kim Dong-Kook;Noh Bong-Nam
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.228-232
    • /
    • 2006
  • 최근 활발히 개발 중인 보안운영체제의 핵심인 보안커널(security kernel)은 참조모니터(reference monitor)에서 주체(subject)가 객체(object)에 대한 실행(action) 권한을 판단함으로써 접근 제어를 실행한다. 보안운영체제의 대표적인 접근제어모델에는 다중레벨접근제어(MLS: Multi Level Security)모델과 역할기반접근제어(RBAC: Role Based Access Control) 모델 등이 있다. 리눅스 시스템에서 이러한 접근제어모델을 적용하기 위해서 접근 대상이 되는 객체들의 효과적인 분류가 요구된다. 본 논문에서는 리눅스 환경에서 효과적인 접근제어모델을 적용하기 위하여 객체들을 객체 클래스(class)와 유형(type)을 기준으로 분류 하였다.

  • PDF

A Study on the Feature and Countermeasure on Maritime Security threats in Korea (국내 해상보안 위협의 유형별 특성과 대응방안)

  • Lim Hee Jun;Kim Dong Hyug;Son Hyun Min;Lee Eun Bang
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2003.11a
    • /
    • pp.99-104
    • /
    • 2003
  • The maritime security risk has been recognized since the terrorists attacked the world trade center and the Pentagon In this paper, maritime security risk is analyzed on the basis if the data of crime in Korean sea We propose the countermeasures to prevent maritime security threats

  • PDF

Design and Implementation of Security System for War game Simulation System

  • Song Jong Seok;Li Chu Yu;Jin Long;Ryu Keun Ho
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.712-715
    • /
    • 2004
  • War game Simulation System is a simulation system of military operation. In order to ensure all of the data that are running are secure, this system has to emphasize the security policy. In this paper, we analyze the running environment and the weakness of the security about exiting system. For improving the weakness, we design and implement this security system that is consisted of three components: Authentication System, Encryption System and Network Security System. Therefore, we can apply War game Simulation System to security system and improve the secure performance of this one.

  • PDF

Guess-and-Determine Attack on the Variant of Self Shrinking Generator (변형 Self-Shrinking 생성기에 대한 Guess-and-Determine 공격)

  • Lee, Dong-Hoon;Han, Jae-Woo;Park, Sang-Woo;Park, Je-Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.109-116
    • /
    • 2007
  • In this paper, we analyse the security of the variant of Self-Shrinking generator proposed by Chang et al. against a guess-and-determine attack. This variant, which we call SSG-XOR is claimed to have better cryptographic properties than the Self-Shrinking generator in a practical setting. But we show that SSG-XOR is weaker than the Self-Shrinking generator from the viewpoint of guess-and-determine attack.

NATO's Factor in Ensuring the National Security of Modern Ukraine

  • Biloshytskyi, Volodymyr;Hanhal, Artur;Mokliak, Sergii;Pysmennyi, Oleksii;Smolianiuk, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.689-695
    • /
    • 2021
  • The study is based on the elaborated normative and legal documentation regulating the national security of modern Ukraine and the normative and legal documents adopted by NATO in the responding policy to the challenges that arose after 2014. The main advantages of cooperation with NATO are ensuring military security, developing army standards, improving the country's investment climate, and reducing expenditures on the army. The disadvantages of cooperation with NATO in hostilities with Russia are not highlighted. Still, defined obstacles show that Ukraine is not ready to realize entry into NATO in the short term. Such factors include weak information support, corruption, and unclear diplomatic decisions.

Research of Improvement, and System of the Information Security Management Evaluation (보안관리수준 평가 체계에 대한 분석 및 개선안 연구)

  • Min, Byung-Gil;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.101-112
    • /
    • 2006
  • It will not be able to guarantee the secure operation for the information and communication systems with only technical security. So, ISMS(Information Security Management System) research and standardization are active going on. Korea published "The national cyber security management regulation" and "The national cyber security manual" in 2005. According to the regulation and manual, the government organ and public institution must accomplish the security management assessment to itself for systematic management of an information security. We studied related standards and security management systems of the Australia and the USA, and analyzed the security management evaluation system in "The national cyber security manual" in efficient security management focus. We presented the improvement direction of national security evaluation system through the research. We propose the additional control, selective control set and improvement of the evaluation process for efficient security management. Proposed system possible composition of suitable to each organ and flexible adaptation of rapidly changed information environment.

  • PDF

Research on Expansion and Improvement Approaches of Information Security Budget for Cybersecurity Enhancement (정보보호 기반 강화를 위한 정보보호 예산 확대 및 개선 방안 연구)

  • Bae, Sunha;KIM, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1279-1294
    • /
    • 2016
  • Information security to use information technology(IT) in safety and reliability environment is becoming of great importance. In advanced countries including United States and United Kingdom are consistently expanding budget for information security. Korea also has been a growing interest in information security and Korea government announced plan to develop information security into next-generation growth engine. However, information security budget has increased slightly in recent years, so many national institutions and state governments have budget shortfall to perform information security work. Moreover budget items do not include generic contents about information security and there are confined to some security SW, HW and services. It is necessary to expand information security budget for enhancement national capabilities of information security. In this paper, we analyze the IT and information security budget situation for Korea and United States and propose effective budget expansion and improvement approaches for Korea.

On the Study of College Student's Security Awareness - On the fucus of college student's survey & seminar for unification and security - (대학생 안보의식 제고 방안 연구 - 대학생 통일안보 대토론회 및 설문조사 결과를 중심으로 -)

  • Kim, GyuNam
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.99-106
    • /
    • 2013
  • The definition of the national security is that the lives of its people and the property of the country must be kept from the enemies. The people in the country must have the awareness of national security in their mind, and the fate of the country relies on the security awareness of the people. Most of college students are to have their own goals trying to fulfil in their life. If the national security is not guaranteed, it will not be possible to achieve their dreams and goals. Currently, most of college students have been trained only for passing college entrance exams in their growth processes, and some of them are confused with political, social, and cultural identity. College students are spending most of time on the preparation for getting employment, so they are indifferent to the national security of their country. After the seminar for college student's unification and security, we will survey how much they could be changed and propose the guidelines for college student's security awareness.

A Building Method of Designing National Cyber Security Governance Model Through Diagnosis of Operational Experience (정보보안체계 운영경험 진단을 통한 국가 사이버보안 거버넌스 모델 연구 방법)

  • Bang, Kee-Chun
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.205-212
    • /
    • 2018
  • This Study aims to propose a new information security governance model design method for streamlining security governance at national strategic level. The research method of this study is to diagnose our operational experience and to derive a new model design method. In the meantime, national information security activities were perceived to be focused on knowledge transfer, and motivation of activities and securing of executive power were weak. As a result, security blind spots and frequent occurrence of large security incidents have become unresolved challenges. National cyber security governance should be grouped together as a whole systematically from the upper policy to the lower level of performance under the responsibility of the national leader. Based on this approach, this study presented the comprehensive framework of Korean security governance model and embodied it into four architectural designs such as vision, goal, process, and performance, thus deriving the foundation for future national governance model design. Further research is needed to diagnose problems in life cycle flow, security policies based on environmental changes, and new frameworks in which all subjects participate.

On the Study of National Security and Corresponding Strategies gainst Inside Enemies - A Case Study of German Unification Process - (국가안보와 내부의 적 대응방안 연구 -독일 통일과정 사례를 중심으로-)

  • Kim, Gyu Nam
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.11-18
    • /
    • 2013
  • What is national security? National security is reduced for state national security. At present, national security threats can be divided into main enemies and potential ones and main enemies are separated inside and external ones. Arnold Toynbee said, "The destruction of the state is starting not from outside but from inside". This means we must be aware of inside enemies. How much do we know of the internal enemies who are trying to divide the people and overthrow the state? This paper focuses on corresponding strategies to depend our democratic state against inside enemies who penetrate all sectors of society and fabricate rumors, incite violence, and even try to overthrow our legitimate state with the base on the lessons of past West Germany case.