• 제목/요약/키워드: Security As A Service

검색결과 2,117건 처리시간 0.017초

클라우드 컴퓨팅 서비스에 관한 정보보호관리체계 (Information Security Management System on Cloud Computing Service)

  • 신경아;이상진
    • 정보보호학회논문지
    • /
    • 제22권1호
    • /
    • pp.155-167
    • /
    • 2012
  • 클라우드 컴퓨팅 서비스는 이용자 요구에 실시간으로 유연하게 컴퓨팅 자원을 제공하고 사용량만큼 과금하는 고효율의 차세대 IT 서비스이다. 그러나 이용자는 데이터를 '위탁'하고, 인프라, 플랫폼, 어플리케이션 서비스를 '제공'받는 '위탁/제공'의 서비스 구조와 적용기술, 자원공유, 데이터센터 위치 등으로부터 비롯된 많은 위협에 직면해 있다. 클라우드 서비스 도입의 가장 큰 걸림돌로 작용하는 보안과 신뢰성을 담보하기 위해서는 객관적인 평가 기준이 필요하다. 지금까지 정보보호관리체계는 조직의 보안관리 및 IT 운영의 보안 지표로 활용되어 왔다. 그러나 클라우드 컴퓨팅 서비스는 기존의 조직 내 IT 환경과는 다른 관점의 보안관리와 평가기준이 필요하다. 본 논문에서는 클라우드 특성에 맞는 정보보호관리체계를 설계하기 위하여 클라우드 서비스의 핵심요소를 위협관리영역으로부터 도출하고 기본적인 보안관리가 누락되지 않도록 기존 정보보호관리체계의 모든 통제영역을 포함하고 있다. 또 온라인 셀프환경에 따른 서비스 이용을 지원하고 서비스 계약, 제공자 사업현황을 포함하는 서비스 보안관리를 추가하여 설계한다.

「경비업법」상 경비원과 「파견근로자보호 등에 관한 법률」상 경비원의 비교에 관한 연구 (A Study on the Comparison between 「SECURITY SERVICES INDUSTRY ACT」 and 「ACT ON THE PROTECTION, ETC. OF TEMPORARY AGENCY WORKERS」 among Security Guards)

  • 노진거;최경철;이영호
    • 시큐리티연구
    • /
    • 제55호
    • /
    • pp.143-167
    • /
    • 2018
  • 경비업법상 경비원은 단순노무 종사자가 아닌 부족한 경찰력을 보완하고 국가중요시설, 산업시설, 공동주택 등의 경비를 전문으로 하는 보안관련 서비스 종사자이다. 그럼에도 불구하고 보안관련 서비스직인 경비업법상 경비원과 단순 노무직인 파견법상 경비원을 혼동 내지 혼용함으로써 경비원의 업무범위에 관한 논란이 끊이지 않고 있다. 경비업법상 경비원의 경우에는 엄격한 결격사유를 규정하고 있으며, 경비원 신임교육 및 직무교육을 받게 하고 있으며, 경비업자가 경비원을 배치하거나 배치를 폐지한 경우에는 관할 경찰관서장에게 신고하게 하는 등 경비원의 자격 등에 대하여 엄격한 제한을 규정하고 있다. 이는 경비업법상 경비원을 파견법상 경비원과 구분하여 전문 서비스직으로서 경비원의 직종을 인정하고자 함에 있다고 할 것이다. 따라서 경비업법상 경비원에 대하여는 경비업무 외 업무를 시켜서는 안 된다. 경비업무 외 업무를 시키고자 할 경우에는 경비업법상 도급계약을 체결할 것이 아니라 파견법상 경비원을 사용하던지 또는 고용계약에 의한 경비원을 고용하여 자체경비를 하여야 할 것이다. 이렇게 경비업법상 경비원을 전문 보안관련 서비스직으로 인정할 때 궁극적으로 경비산업 전반이 발전할 수 있을 것이다.

한국 경비업발전 전망에 따른 경호관련학과 교육과정 연구 (A Study on the Education Curriculum for Bodyguarding Related Departments with the Prospect of Security Services)

  • 김영인
    • 시큐리티연구
    • /
    • 제5호
    • /
    • pp.89-108
    • /
    • 2002
  • The prospect of security services industries is as followings. First, integrated security system will be increased in the security service sphere of collective housing such as apartments. Second, the needs to security services with high-tech electronic security system and systematic security service against crimes will be increased. Third, the needs to crime prevention and disaster prevention service including information security service by means of internet and information and communication technology will be increased. Fourth, perhaps domestic market of security service will be reshaped in relation with localization trend and entrance of foreign security service companies to our country. With these conclusions I think that the departments of universities related to security services will focus on their social roles.

  • PDF

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권12호
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

A Security Reference Model for the Construction of Mobile Banking Services based on Smart Phones

  • Shin, Yong-Nyuo;Shin, Woo-Chang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제11권4호
    • /
    • pp.229-237
    • /
    • 2011
  • As smart phones have become widely adopted, they have brought about changes in individual lifestyles, as well as significant changes in the industry. As the mobile technology of smart phones has become associated with all areas of industry, it is not only accelerating innovation in other industries such as shopping, healthcare service, education, and finance, but is also creating new markets and business opportunities. The preparation of thorough security measures for smart phones is increasing in demand. While offering excellent mobility and convenience, smart phones can be exposed to a range of violation threats. In particular, it is necessary to make efforts to develop a security system that can preemptively cope with potential security threats in the banking service area, which requires a high level of reliability. This paper suggests a security reference model that is considered for the smart phone-based joint mobile banking development project being undertaken by the Bank of Korea in 2010. The purpose of this study is to make a security reference model for a reliable smart phone-based mobile financial service, by recognizing the specific security threats directed toward smart phones, and providing countermeasures to these security threats. The proposed mobile banking security reference model is useful in improving system security by systematically analyzing information security threats to the mobile financial service, and by presenting the guideline for the preparation of countermeasures.

경호비서의 역할에 관한 연구 (A Study of the Security and Secretary Service's Roles)

  • 김정숙;박옥철
    • 한국재난정보학회 논문집
    • /
    • 제2권1호
    • /
    • pp.65-80
    • /
    • 2006
  • Security and Secretary Service is the man who maintains safe condition of boss', following him during all daily schedule and help the boss display his supreme business abilities, settling various affairs The purpose of this study is to examine the role of Security and Secretary Service. To understand the role of Security and Secretary Service, interviews with Security and Secretary Service's. synthesizing records inquire and interviews with present workers, was analyzed. As results of the study, the open coding of grounded theory was 85 categories, 22 lower categories, and 13 upper categories; 7 roles of Security and Secretary Service types out of 13 upper categories were attained. Based on this, from the axial coding a paradigm model related to categories was produced and selective coding the core category, story line development and type were analyzed. Therefore, Security and Secretary Service plays roles: Office manager, Training manager, Information manager, Customer relations manager, Facilitator, Health manager, and Safety manager. Compared with Office secretary, It is said that Health manager, and Safety manager are distinguishing roles. Through the coding process based on grounded theory. For this, based on the writer's theoretical sensitivity and constant comparative analysis, theses as well as writing in each field, data from serial publications and others, the statements of interview subjects were constantly compared and analyzed. Based on these analyses, this study suggests the following: First, the intimidate sample survey is need. Second, professional educational content during the training process of Security and Secretary Services should be strengthened. Third, to expect a more professional role of Security and Secretary Services. the systematic support will be required.

  • PDF

IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구 (An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction)

  • 권순재;이건창;김창현
    • 한국경영과학회지
    • /
    • 제32권2호
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.

고용형태에 따른 직무정체성, 공직봉사동기 및 조직충성도에 대한 연구 : 공항 특수경비원들의 인식을 중심으로 (A Study for the Perception of Job Identity, Public Service Motivation and Organizational Committment focusing on Airport Security Agents)

  • 박성식;조성환;김광옥;정주용
    • 한국항공운항학회지
    • /
    • 제25권4호
    • /
    • pp.31-43
    • /
    • 2017
  • Airport security staff are outsourced workers, whose status is a special security agent under the security service law in Republic of Korea, who are subject to persuing both profitability and public concern at the same time. This paper has chosen the sample of security staff working at Incheon airport. This is because airport security staff is being outsourced, this paper had made an empirical research such areas as the perception of job identity, public service motivation and organizational commitment through job satisfaction. According to statistical research, it was found the perception on job identity by airport security staff had a significant negative effect on both job satisfaction and organizational commitment. The more they have perceived their status as non-permanent status, the less they had job satisfaction and commitment at the same time as a special security agent at airport. Their perception of job identity had a significant effect on such public service motivation factors as 'absorbing public concern' and 'a solicitude'. Lastly, their motivation factors had also significant positive effect on job satisfaction and organizational commitment.

u-방범서비스와 유용성 및 시민만족의 관계 (On the Relationship of u-Security Service, Usefulness and Citizen Satisfaction)

  • 최창선;황찬규
    • 한국전자통신학회논문지
    • /
    • 제9권8호
    • /
    • pp.875-882
    • /
    • 2014
  • 본 논문은 u-방범서비스와 유용성 및 시민만족의 관계에 대한 연구이다. 독립변수로 u-방범서비스요인을, 매개변수로 유용성을, 종속변수로 시민만족으로 구성하였다. SPSS 18.0을 이용하여 요인분석, 신뢰도분석, 다중회귀분석, 경로분석을 실시하였다. 결과는 다음과 같다. 첫째, u-방범 서비스 요인이 유용성에 정적 영향을 미친다. 즉, '공공안전', '시스템품질', '서비스품질' 활동이 잘 이루어질수록 유용성은 높다. 둘째 u-방범 서비스 요인이 시민만족에 정적 영향을 미친다. 즉, '공공안전', '시스템품질', '서비스품질' 활동이 잘 이루어질수록 시민만족은 높다. 셋째, 유용성이 시민만족에 정적 영향을 미친다. 즉, "경제유용성", "안전유용성"이 향상될수록 시민만족은 높다. 넷째, u-방범 서비스는 유용성 및 시민만족에 직간접적인 영향을 미친다. 즉, 유용성은 u-방범 서비스와 시민만족을 매개하는 중요한 변수이다.

Research on Application of Service Design Methodology in IOT Environment

  • Kim, Byung-Taek;Cho, Yun-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권3호
    • /
    • pp.53-60
    • /
    • 2017
  • The purpose of this study is to provide empirical and quantitative analysis on user's perceived privacy, security, and user satisfaction when providing visualization information about objects and service provider behaviors that users can not perceive in internet service process. Through previous research, we have examined the importance of privacy and security factors as a key factor to be considered for the characteristics of the Internet of things and the Internet of things. In addition, service blueprint, which is one of the service design methodologies to examine the flow of service usage in providing Internet service of things, was examined. In the flow of things internet service utilization, it is found that the things that are out of the user's cognitive area and the behavior of the service provider take up a large part. Therefore, the hypothesis that the trust of the Internet service security and the satisfaction of the user experience can be improved by providing the security visualization information about the behavior of the object and the invisible service provider in the non-contact aspect of the user and the object. In order to verify the hypothesis, we conducted experiments and questionnaires on the use of virtual objects' internet environment and conducted statistical analysis based on them. As a result, it was analyzed that visual information feedback on non - contact and invisible objects and service provider's behaviors had a positive effect on user's perceived privacy, security, and satisfaction. In addition, we conclude that it can be used as a service design evaluation tool to eliminate psychological anxiety about security and to improve satisfaction in internet service design. We hope that this research will be a great help for the research on application method of service design method in Internet environment of objects.