• Title/Summary/Keyword: Physical security

Search Result 991, Processing Time 0.024 seconds

The Effect of Organization's Industrial Security Management on Employees' Security Policy Compliance Intention (조직의 산업보안 활동이 구성원의 보안 정책 준수 의도에 미치는 영향)

  • Donghwan Lee;Seungwook Park
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.57-68
    • /
    • 2022
  • As the importance and awareness of security have recently expanded, companies and governments are making continuous efforts and investments for security management. However, there are still many security threats in the organization, especially security incidents caused by internal staff. Therefore, it is very important for members to comply with security policies for organizational security management. Therefore, this study classified industrial security management into technical security, physical security, and managerial security, and applied the theory of planned behavior to investigate the impact relationship on the intention to comply with security policies. SPSS 25 and AMOS 25 were used for statistical analysis, and the study found that technical security had a positive(+) effect on subjective norms, physical security had a positive(+) effect on perceived behavior control, and attitude and perceived behavior control had a positive(+) effect on security policy compliance intention.

An Analysis on the Physical Strength Factor of the Collegians Majoring in Security Services (경호전공대학생의 체력요인 분석)

  • Jeon, Man-Joong
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.431-447
    • /
    • 2007
  • The purpose of this study was to investigate the An analysis on the physical strength factor of the Collegians majoring in Security Services. In order to accomplish this purpose, subjects of this study were 80 person J university student men. Physical fitness tests was grip strength, back strength, sit-ups, stand long jump, 50m run, side step test, shuttle run, 2000m run, standing trunk flexion, and closed eye foot balance. Factor analysis applied for analysis factorial structure of each physical fitness components. The results of this study were as follow; First, the factor affecting the performance of the Collegians majoring in Security Services of their was appeared with the Power, Balance and Strength. Second, the factor affecting the performance of the Collegians majoring in Security Services of their was appeared with the Taekwondo major group with the Balance, Power, Strength and Cardiovascular Endurance. Third, the factor affecting the performance of the Collegians majoring in Security Services of their was appeared with the Judo major group with the Power, Flexibility and Strength. Fourth, the factor affecting the performance of the Collegians majoring in Security Services of their was appeared with the Hapkido major group with the Muscular Endurance, Strength, Cardiovascular Endurance and Flexibility. Fifth, the factor affecting the performance of the Collegians majoring in Security Services of their was appeared with the Gumdo major group with the Cardiovascular Endurance and Power.

  • PDF

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF

An integrated framework of security tool selection using fuzzy regression and physical programming (퍼지회귀분석과 physical programming을 활용한 정보보호 도구 선정 통합 프레임워크)

  • Nguyen, Hoai-Vu;Kongsuwan, Pauline;Shin, Sang-Mun;Choi, Yong-Sun;Kim, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.143-156
    • /
    • 2010
  • Faced with an increase of malicious threats from the Internet as well as local area networks, many companies are considering deploying a security system. To help a decision maker select a suitable security tool, this paper proposed a three-step integrated framework using linear fuzzy regression (LFR) and physical programming (PP). First, based on the experts' estimations on security criteria, analytic hierarchy process (AHP) and quality function deployment (QFD) are employed to specify an intermediate score for each criterion and the relationship among these criteria. Next, evaluation value of each criterion is computed by using LFR. Finally, a goal programming (GP) method is customized to obtain the most appropriate security tool for an organization, considering a tradeoff among the multi-objectives associated with quality, credibility and costs, utilizing the relative weights calculated by the physical programming weights (PPW) algorithm. A numerical example provided illustrates the advantages and contributions of this approach. Proposed approach is anticipated to help a decision maker select a suitable security tool by taking advantage of experts' experience, with noises eliminated, as well as the accuracy of mathematical optimization methods.

Performance Analysis of Physical Layer Security based on Decode-and-Forward using Jammer (재머를 사용하는 복호 후 재전송 기반 물리 계층 보안의 성능 분석)

  • Park, Sol;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.3
    • /
    • pp.71-75
    • /
    • 2018
  • In this paper, we study the secrecy outage probability when using jammer in a relay system based on decode-and-forward. The jammer may be selected among the relays not selected to increase the security capacity in the physical layer so as to generate intentional noise. Jammer noise can equally interfere with the receiver and eavesdropper but can enhance the physical layer security by selecting an optimal jammer that makes the channel quality between the sender-eavesdropper links worse than the channel of the sender-receiver link. In this paper, we compute the theoretical formula of the secrecy outage probability with and without jammers, and compare the theoretical value with the simulation value to prove that the equation is valid.

A Study on the Programs of the Betterment in Medical Care Guarntee for Korean Seniors (한국 노인의료보장제도의 개선방안에 관한 연구)

  • Cho Young-Hwan;Kim Hyun-Joo;Park Young-Han
    • The Journal of Korean Physical Therapy
    • /
    • v.10 no.1
    • /
    • pp.105-125
    • /
    • 1998
  • We are confronted by increase in old people due to the improvement in medical science, public hygiene and socioeconimic status in 20th century. But our medical security system for old people dees not meet the need for medical service of old people. Current medical insurance system restricts term and extent in allowance although the characteristics of the disease of the aged people need medical care of Bong duration and high cost. And in the medicaid system the speciality of the aged people is not recognized and the budget of the government is scanty. In addition many old people to our country are in economic distress due to low income. But the government authority does not give sufficient consideration for eld people in law, policy and budget. To improve social security system for old people it is necessary to increase the budget for the security of old people, to enhance the traditional respect for the aged, to improve medical security system by improving the accessibility to medical service and by expanding the allowance of medical insurance, and to expand the public welfare institutions. And these are roles for all the family. the society and the nation as well as the aged people themselves.

  • PDF

A study of elderly private security guards about their victimization experience in the workplace and their perception of occupational stress (노인경비원의 폭력피해 경험과 직무스트레스에 대한 연구)

  • Hong, Kook-Pyo;Oh, Kyu-Chul;Lee, Chang-Bae
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.469-492
    • /
    • 2013
  • While the average age of population increases, so as the number elderly workers employed in the private security in Korea. However, not many studies have examined the issues related to elderly security guards so far, especially regarding the experience of workplace violence victimization even though they are quite vulnerable. The current study surveyed elderly private security guards across the nation in an attempt to ask about their workplace violence victimization experience, including both physical and verbal ones. The researchers investigated if victimization experiences affect the elderly security guards' perception of occupational stress. The result indicated that the respondents experienced verbal violence more than physical violence, and perpetrators were usually customers, not their supervisor or coworkers. In addition, those who experienced verbal violence in the workplace, perceived a higher level of occupational stress. The experience of physical violence did not make a significant impact. Policies are discussed in order to decrease workplace violence towards elderly security guards.

  • PDF

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Development of Convergence Security Industry Knowledge Map for the 4th Industrial Revolution Security Infrastructure (4차 산업혁명의 보안 인프라 구축을 위한 융합보안산업 지식 맵 개발)

  • Lee, Daesung
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.173-180
    • /
    • 2019
  • As the 4th Industrial Revolution(Industry 4.0), symbolized as CPS(Cyber Physical System), spreads around the world, it is essential to establish a converged security infrastructure to secure technical stability and reliability of various cyber systems to be implemented in the future. In this study, we will investigate the phenomenon of broad convergence security industry and technology including the concept of life safety in relation to the spread of the 4th industrial revolution, and analyze the possibility of linkage between related knowledge to promote academic-industrial cooperation necessary for the convergence of security. we would like to propose a comprehensive development policy on human resource development, technology development and policy improvement.

Research on Mac OS X Physical Memory Analysis (Mac OS X 물리 메모리 분석에 관한 연구)

  • Lee, Kyeong-Sik;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.89-100
    • /
    • 2011
  • Physical memory analysis has been an issue on a field of live forensic analysis in digital forensics until now. It is very useful to make the result of analysis more reliable, because record of user behavior and data can be founded on physical memory although process is hided. But most memory analysis focuses on windows based system. Because the diversity of target system to be analyzed rises up, it is very important to analyze physical memory based on other OS, not Windows. Mac OS X, has second market share in Operating System, is operated by loading kernel image to physical memory area. In this paper, We propose a methodology for physical memory analysis on Mac OS X using symbol information in kernel image, and acquire a process information, mounted device information, kernel information, kernel extensions(eg. KEXT) and system call entry for detecting system call hooking. In additional to the methodology, we prove that physical memory analysis is very useful though experimental study.