• Title/Summary/Keyword: Operational Security

Search Result 371, Processing Time 0.026 seconds

Cost Management for Security Applications

  • Arshi Naim;Zubairul Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.63-72
    • /
    • 2024
  • This is an extended paper, focusing on the cost management for the organizations dealing with the crucial issues of security systems. Information Technology (IT) is an important and irreplaceable need of society and all working sector's success depends on IT to a greater extent; therefore maintaining security features is one of the most important aspects of IT. When security in the IT sector is discussed, Patch Management (P.Mgnt) has to be taken under account. P. Mgnt includes many concerns and areas to be described for IT security such as methods and problems in updating patch, methods of reducing security risks with P.Mgnt, methods of achieving economies of scale by controlling the operational costs and taking decisions in investing as and when necessary. This paper presents a general definition of Patch management, its benefits and management of working cost through theoretical models, also the paper gives methods of feeding techniques for microstrip patch antenna MPA, showing the contracting and non contracting methods.

A Study on Application Structure for IT Operational Risk in Financial Institute (금융기관의 IT운영리스크 관점에서의 응용프로그램 구조에 관한 연구)

  • Cho, Seong-Cheol;Nam, Cho-Yee;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.705-719
    • /
    • 2014
  • Recently the importance of operational risk is gradually increasing in risk management of financial institute. Especially the service interruption caused by system failure can lead to customer complaints, decrease of profit and customer secession. Thus, financial industry makes diverse effort to minimize the impact caused by the system failure of IT application. Common modules are used in IT system in financial industry to exclude redundant development and to use the system efficiently. However, when a failure in common module is occurred, the risk that affects all the tasks using the common module exists. In this study, the damage affected by a failure in application program is prevented separating common module which has a large risk by task in the perspective of IT operational risk. In order to cope with damage, the research on the factors related to common module is conducted and proposes the separating common module standard for decrease of operational risk of the financial IT.

A Study on the Operational Plan of Information Security Department in Colleges for Educating Information Security Personnel (정보보호 전문인력 양성을 위한 전문대학 정보보안과의 운영방안에 관한 연구)

  • 김경호;김명숙
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.2
    • /
    • pp.13-20
    • /
    • 2004
  • The purpose of this study is to suggest an operational plan for the information security department of colleges. First, the necessity for educating information security personnel was examined. Second, the institutes for educating information security personnel were investigated and the curriculum for information security of the college in Korea were examined. Finally, the challenges were examined and the solutions were suggested.

  • PDF

Directions in Promoting Independence in Operational Control (전시작전통제권 단독 행사 추진의 방향)

  • Park, Seung-Sik
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.351-379
    • /
    • 2006
  • Former ministers of national defense and foreign affairs, intellectuals such as former and incumbent professors, and various NGO groups are demanding the South Korean government to stop promoting independence in operational control which is currently held by the United States Armed Forces in Korea commander. Although the Korea should exercise operational control independently in the future, orientation on the direction which should be taken under consideration in promoting this transfer should be assumed. First of all, South Korea must sufficiently examine the criticisms and dissenting opinions, and reflect them in promoting independence in operational control. From now on, the South Korean government should reflect the opinions of experts in operational control, and must promote the transfer with national consensus. Unilateral enforcement of the transfer may cause serious errors and aggravate conflicts Second, ROKA's exercise of independence in operational control should take place only after gaining restraint on North Korea's attack against the South, and the issues on nuclear weapons and weapons of mass destruction(WMD) has been resolved, and a peace regime has been reached. Furthermore, exercise of independence in wartime operational control should be promoted only if there is a guarantee that international trust and the military collaboration will be restored to a level beyond the present state. Third, the USFK and the Korean-US alliance is providing South Korea with national security, not to mention tremendous diplomatical, and economical benefits However, if the alliance between the two countries become weakened due to the exercise of the independence in operational control, we might suffer a great deal of loss. Even though reasonable justification and external independence may be gained through promoting independence in operational control, it should be promoted in a longitudinal manner because national security problems and conflicts may be intensified, and there is no actual profit in doing so. Fourth, if the Korean-US alliance becomes weakened and therefore the United States decides to discuss eastern-asia strategies, North Korea deterrence strategies, and Japanese rearmament issues with other neighboring countries, South Korea may become diplomatically isolated and a subordinate to surrounding countries, destroying the independence we have now instead of restoring it Therefore searching for means to reinforce international trust and collaboration between South Korea and the United States, and leaving ROKA’s independence in operational control as a long term objective would be a more realistic method.

  • PDF

A Building Method of Designing National Cyber Security Governance Model Through Diagnosis of Operational Experience (정보보안체계 운영경험 진단을 통한 국가 사이버보안 거버넌스 모델 연구 방법)

  • Bang, Kee-Chun
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.205-212
    • /
    • 2018
  • This Study aims to propose a new information security governance model design method for streamlining security governance at national strategic level. The research method of this study is to diagnose our operational experience and to derive a new model design method. In the meantime, national information security activities were perceived to be focused on knowledge transfer, and motivation of activities and securing of executive power were weak. As a result, security blind spots and frequent occurrence of large security incidents have become unresolved challenges. National cyber security governance should be grouped together as a whole systematically from the upper policy to the lower level of performance under the responsibility of the national leader. Based on this approach, this study presented the comprehensive framework of Korean security governance model and embodied it into four architectural designs such as vision, goal, process, and performance, thus deriving the foundation for future national governance model design. Further research is needed to diagnose problems in life cycle flow, security policies based on environmental changes, and new frameworks in which all subjects participate.

MND-AF application study for anti-drone system (안티드론 시스템의 국방아키텍쳐 프레임워크 적용 연구)

  • Lee, Dong Joon;Kwon, Hyeong Ahn;Kim, Ji Tae;Jung, Gil Hyun;Yang, Sang Woon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.17 no.2
    • /
    • pp.23-36
    • /
    • 2021
  • Recently, the rapid development of drones is increasing as a variety of threats to important facilities of the country. In order to build an anti-drone system that responds to drones with high technical characteristics, standardization is required in terms of operation, system, and technology. By applying the defense architecture framework, it contributes to the establishment of the optimal system by proposing a standardization plan for the operational and system perspectives of the anti-drone system by creating outputs equivalent to the stage of prior research on weapons systems. It is a prerequisite for building a drone system the operational concept of the anti-drone system, the definition of the drone threat, the function of each component, the interface, the definition of data flow, the system performance and effect scale, etc. Management, security officers, and equipment manufacturers of important national and public facilities on site expect that it will be used as an objective standard at the government level for the component technology of the equipment to respond to the drone threat and the performance required in the environment.

Developing Strategies to Improve Operational Test and Evaluation of Weapon System in the Age of the Fourth Industrial Revolution (4차 산업혁명 시대에 적합한 무기체계 운용시험평가 개선전략 도출)

  • Lee, Kangkyong;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.591-601
    • /
    • 2020
  • After North Korea's sixth nuclear test, the operational environment on the Korean Peninsula has fundamentally changed, and the South Korean military faces various security challenges, including a reduction in military service resources and shorter military service periods. In particular, the South Korean military is seeking a new paradigm in military construction amid changes in the defense acquisition environment linked to the push for defense reform 2.0 and the utilization of the fourth industrial revolution. Therefore, this study considered strategies for improving the operational test and evaluation of weapons systems suitable for changes in the defense acquisition environment to effectively prepare for existing military threats and future warfare patterns. For this purpose, external environment analysis and internal capabilities were diagnosed using PEST Analysis and SPRO Analysis, and improvement strategies were derived through SWOT analysis.

The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic

  • Beyari, Hasan;Hejazi, Mohammed;Alrusaini, Othman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3313-3332
    • /
    • 2022
  • This study is an investigation into the factors affecting patient dissatisfaction among Saudi hospitals. The selected factors considered for analysis are security of information sharing, operational practices, disruptive technologies, and the ease of use of EHR patient information management systems. From the literature review section, it was clear that hardly any other studies have embraced these concepts in one as was intended by this study. The theories that the study heavily draws from are the service dominant logic and the feature integration theory. The study surveyed 350 respondents from three large major hospitals in three different metropolitan cities in the Kingdom of Saudi Arabia. This sample came from members of the three hospitals that were willing to participate in the study. The number 350 represents those that successfully completed the online questionnaire or the limited physical questionnaires in time. The study employed the structural equation modelling technique to analyze the associations. Findings suggested that security of information sharing had a significant direct effect on patient satisfaction. Operational practice positively mediated the effect of security of information sharing on patient dissatisfaction. However, ease of use failed to significant impact this association. The study concluded that to improve patient satisfaction, Saudi hospitals must work on their systems to reinforce them against the active threats on the privacy of patients' data by leveraging disruptive technology. They should also improve their operational practices by embracing quality management techniques relevant to the healthcare sector.

A Study on the Procedure Model to Carry on Works of the Private Security Company (민간경비업체의 업무 수행 절차 및 모델 설정에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.47-65
    • /
    • 2003
  • In Korea, Private security companies has steadily grown and amounts to 2,051 places as of November 30, 2002. Private security in korea is carrying out firm name role assignment to have held the police and public peace environment change factors for a standard faithfully, and protects social a little property that is a basic purpose, and it is spare no efforts in loss prevention. In spite of numeral increase of private security companies, private security companies have many problem. Moreover, they mostly did not have any remarkable in-house expertises in their own business under tough conditions. Under the unfavorable circumstances including insufficient investment and education in private security guard, there have been actually little further studies on private security business in practices. So this study mainly focused on addressing the installation security business managed by authorized companies, which amount to 96%(1,963 companies) of total 2,051 domestic security companies. Furthermore, the study formulated and modeled a series of business procedures in private security companies. A series of business procedures of private security companies can be modeled as follows : Setting of a business scope and aim market ${\Rightarrow}$ Marketing, Contact from customers(On-line or Off-line) ${\Rightarrow}$ Diagnosis of security target ${\Rightarrow}$ Submission of security operational plan ${\Rightarrow}$ Estimation of security operational plan ${\cdot}$ decision ${\Rightarrow}$ Contract ${\Rightarrow}$ Employment, selection of security guards ${\Rightarrow}$ Nomination of security guard instructors ${\Rightarrow}$ Education & training of security guards ${\Rightarrow}$ subscribe to insurance of damage liability ${\Rightarrow}$ Commitment and placement of security guards ${\Rightarrow}$ Establishment and preparation of security planning ${\Rightarrow}$ Field management and procurement of relevant security service.

  • PDF

A Study on IT Outsourcing Policy Based on Operational Risks of Financial Industries (금융보안 리스크 기반의 IT도급 정책 연구)

  • Choi, Chang-Lai;Yun, Jang-Ho;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.681-694
    • /
    • 2014
  • For the continuous financial incidents occurred in 2011, Korean government has announced the amendment on electronic finance supervision regulation including human resources, organization and budget. The major part of the regulation is mainly focused on human resources and budget. It states that company has to employ at least 5 percent of IT staff out of total staff, and at least 5 percent of security staff in IT staff employment number. Budget for security should be at least 7 percent of total IT budgets. This paper studies IT outsourcing policy based on operational risks of financial industries caused by amendment of regulation. This paper provides the policy decision procedure for resolving the 3rd party problems and suggests the effective operation policy to 3rd party for the program quality improvement and case studies at the IT task classification.