• Title/Summary/Keyword: Secret Service

Search Result 115, Processing Time 0.024 seconds

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Analysis of Threats and Countermeasures on Mobile Smartphone (스마트폰 보안위협과 대응기술 분석)

  • Jeon, Woong-Ryul;Kim, Jee-Yeon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.153-163
    • /
    • 2011
  • Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

A Study on the System of Confidential Record Management of the USA (미국의 비밀기록관리제도에 관한 연구 -대통령의 행정명령(EO)을 중심으로-)

  • Kim, Geun Tae
    • The Korean Journal of Archival Studies
    • /
    • no.59
    • /
    • pp.159-206
    • /
    • 2019
  • This study aims to analyze the details of the executive order of the president of the United States, which have been developed in the country's administrative system to institutionalize the guarantee of the people's right to know the classified records, as well as to protecting national secrets. This study also aims to present any implications for the development of the classified record management system of Korea. To this end, the previously issued EO concerning the classified records management were reviewed in terms of its classification, safeguard, and declassification. The analysis results showed that the EO by the president established and prescribed the special access program for national secrets, the system to exempt and suspend the automatic declassification, and the sanctions for protecting national secrets. The EO also established and prescribed the appointment system for the person with the authority to classify record, automatic declassification program, and Mandatory declassification review system, as well as the procedures for historical researcher and certain former government personal to access the classified records with the purpose of guaranteeing people's right to know. As a result, this study identified implications for the development of Korea's classified record management system, as follows : First, it is necessary to restructure the current classified record management system, by changing the operations that is dependent on the director of the National Intelligence Service to the one that is dependent on the President. Second, it is necessary to legislate a separate special law for the classified record management system. Third, a standing supervisory body should be established for the integrated management and for the consistent and routine supervision of the classified record management. Fourth, it is necessary to establish procedures to further review the classification of classified record to correct the defects of the current classification system, which has been abused and mismanaged by the national agencies and organizations that produce classified record.

A Study on the Experience of Physical Therapy Accident in The Physiotherapist (물리치료사에 있어서 물리치료 사고의 경험에 관한 연구)

  • Kim, Jong-Dae
    • Journal of Korean Physical Therapy Science
    • /
    • v.9 no.1
    • /
    • pp.69-80
    • /
    • 2002
  • The objective of research provides the physical therapy of good quality to the patients to search for the problem pant against a physical therapy accident and it simultaneously respects physical therapy company law, the possibility of preparing a system defensive ability in order to be. The data were collected from 2000 October 1 to December 30th, and analyzed by a frequency and a percentage, oneway ANOVA, Scheffe method, $x^2$ official approvals. Conclusion (1) the accident where the patient falls from inside the treatment 'room is many and occasionally' 29.3% (63 people) with was many most. (2) Because of a mistake by a part-time therapist in holiday or a colleague therapist to do, the fracture or bum accident happens 12.5% (27 people), by a assist nurse due to more showed 12.1% (26 people) experience degree in the patient. (3) From physical therapy process breakdown of the medical treatment machinery and tools or it is in malfunction to do and the experience which has a failure to physical therapy is one enemy 68.1% (147 people) was in item. Also it treats and the patient or in the protector it sends an explanation in advance not to be, the experience which it enforces 50% (108 people), of service hour treatment equipment the medical treatment directives broad way of the doctor is accurate in insufficiency and does not enforce the experience is 45.4% (98 people), the patient whom I am treating Hot Pack (electricity has pack inclusion) with to do, the art dealer (over at 1 buffoonery) the experience which it puts on 27.1% (58 people), The patient whom I am treating is the electrotherapy flag (electricity has pack exclusion) with to do, the art dealer (1 degree art dealer over) the experience which it puts on 16.3% (35 people), the experience boat song the patient against a fracture from physical therapy process 9 person (4.2%) was visible an experience degree. (4) With hospital infection to do, from the patient the experience and the therapist which receive a problem proposal were caused by with hospital infection and the answer back regarding the experience which tries to receive a treatment appeared 6% (13 people), 42% (9 people) with each. (5) It listened to the treatment hour patient or the appeal of the protector and especially it does not appear to be being important it was not and and the management which is special it did not take, also the experience where the condition of the patient is deteriorated after that was 10.3% (22 people). (6) The condition or state of the patient does not agree with the medical treatment instruction of the doctor not to be, amendment one experience was 67.5% (145 people). (7) The experience degree of the physical therapy accident which relates with physical therapy recording and a secret maintenance 59.7% (129 people) 'is many and occasionally it is,' it showed an answer back and e it showed a most high accident experience degree. (8) The business overweight of physical therapy company 43.3% (93 people) with was high most from recognition degree of the physical therapy company against a physical therapy accident. (9) Against the question which asks the responsibility subject matter of physical therapy accident the whole answer back volition 42.8% did it is a joint responsibility where the multi person relates. (10) The accident occurs most the hour unit which plentifully in the afternoon 64.3% (133 people) with appeared from the recognition degree against the frequency hour unit of physical therapy accident. (11) Physical therapy it bought and after the various medical treatment accident which relates against the attitude of the, patient side against the physical therapy company it understood and trillion it was many most with 33.3% to be finished. (12) After physical therapy accident the management against the physical therapy company of the hospital authorities concerned above all do not experience 70.6% (149 people), from event right and wrong submission 22.7% (48 people), warning management 2.8% (6 people), the event report requirement and money compensation were each 0.5% (1 person). (13) As the prevention book of physical therapy accident most it is important, the fact which it thinks that, the persons supplement of physical therapy company 58.8% (127 people) with was high most. (14) It related with a physical therapy accident and the medical law 43.5%, civil law 23.9%, was visible the answer back ratio of the criminal law 13.7% from the degree which probably is a relation law.

  • PDF