• Title/Summary/Keyword: Security Case

Search Result 1,810, Processing Time 0.032 seconds

A Case Study on NAC System Implementation for Infringement Prevention of Information Assets (정보자산 침해방지를 위한 NAC 구축 사례 연구)

  • Song, Yung Min;Hong, Soon Goo;Kim, Hyun Jong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.6
    • /
    • pp.107-117
    • /
    • 2014
  • The importance of a network security to protect infringement of corporate assets has been issued due to the increasing various threats such as warm virus, vicious codes, and hacking. Thus, the goal of this research is to discover the procedure and methods for a NAC system implementation. In this case study, we suggest that the critical management issues during the implementing a NAC system as well as measure its performance in qualitative and quantitative perspective. The contribution of this paper is both to lead to the further research in this network security field and to provide a guideline for companies willing to introduce a NAC system.

Developed Optimizing File Delete Detection Model (최적화된 디지털 증거 파일삭제 탐지 모델)

  • Kim, Yong-Ho;Yoo, Jae-Hyung;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.111-118
    • /
    • 2008
  • Computer forensics have been used for verify a crime when industry secret information or cyber crime occurred. However, these methods are simple analysis which cannot find the problem of deleted files. Therefore these cannot be a trusty evidence in a law court. We studied with focus on connectivity principle because it has never tried yet. In this paper, we developed optimizing detection model through systemized analysis between user-delete method and operating system-delete method. Detection model has 3 cases; Firstly, case of deleted by a user, secondly, case of deleted by application. Thirdly case of deleted by operating system. Detection model guarantees optimized performance because it is used in actual field.

  • PDF

The Role of Information Systems in Supporting Knowledge Management in King Abdulaziz University: Case Study

  • Najdi, Roaa Nabil;Komosany, Nabil Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.133-149
    • /
    • 2021
  • The purpose of this study is to explore the role of information systems in the implementation of knowledge management, at King Abdul-Aziz University (KAU) in Jeddah, by highlighting the importance of information systems and their implementation of the knowledge processes. The researcher used the case-study method to explore the importance of information systems in supporting the implementation of knowledge management at the university. Moreover, the study has used the questionnaire as a tool for collecting information and obtaining feedbacks from the administrators at the university, and a random sample was chosen to identify the study community. The study resulted that there is a statistical indication of the importance and degree of the use of electronic systems in the university by the administrators. The study sample members believe that the university is keen to provide information systems, where systems analyze data and convert them into knowledge information that benefits the senior management at the university. Members of the study sample emphasize the importance of electronic information systems at the university, which in turn saves time and effort in extracting information, reports, statistics and providing them easily to senior management. The study also concluded with some recommendations, such as emphasizing the importance of knowledge management as one of its top priorities, spreading the knowledge culture, instilling a vision of knowledge among individuals, and emphasizing the importance of information systems.

A Study on the Estimation of Required Seaborne Trade Volume and Carrier Volume of Each Vessel Type in Case of Emergency (우리나라 비상사태시 소요물동량 및 선종별 소요선대 추정 연구)

  • Young-Gyun Ahn
    • Korea Trade Review
    • /
    • v.45 no.1
    • /
    • pp.1-11
    • /
    • 2020
  • The maritime industry is important for Korean international trade, as more than 99 percent of its imports and exports are moved by maritime transportation. However, if maritime transportation is stopped in the event of an emergency, such as war or natural disaster, there is a danger that imports and exports may cease abruptly. Coping with this risk is why the Ministry of Oceans and Fisheries, manages the 'National Necessary Shipping System.' This system requires that the government estimates the size of ships necessary in the case of an emergency, and the ships designated as National Necessary Vessels should transport goods in the case of actual emergencies. This study seeks to estimate the appropriate size of ships required in an emergency using the latest data and applying a quantitative methodology. This study provides useful reference materials for policy authorities. In particular, it is meaningful that this study estimates the required number of ships of each vessel type, reflecting the recent trend of large-scale ships and expanding global trade.

A Study on the Protecting of Personal Information in Offline Transactions : Focused on the Housing Lease Agreements (오프라인 거래에서 개인정보 보호방안 : 주택임대차계약을 중심으로)

  • Kim, HyoSeok;Park, Soon-Tai;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.243-252
    • /
    • 2020
  • Recently, the proportion of housing lease has been increasing to an overwhelming level in line with the increase of single-person households and the change in the form of housing. In the normal case, the use of rental-type housing is subject to a housing lease agreement through a licensed real estate agent. In the event of a transaction conclusion, licensed real estate agent shall issue a contract containing the personal information of the lessee, the renter, and the licensed real estate agent to the transaction party. In this case, it is necessary for the lessee to provide the contract to a third party. This paper analyzes relevant laws and regulations and the status of housing transactions, focusing on personal information processed between offline housing lease agreements. And when issuing a contract through IRTS, we propose a way to protect personal information by providing a third party in three forms: information Data Subject-based, Purpose of usage-based De-identification, and Certificate of Contract.

A Study on the Safety Management Procedures during Theme Groups Experiential Learning Experiences (단체 테마 현장체험학습의 안전관리에 관한 연구)

  • Bang, Sungmin;Kim, Changho
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.63-72
    • /
    • 2015
  • This study aims to examine the state of accidents and related issues related to Theme Groups experiential learning experiences of students and suggest ways to improve security measures to prevent future incidents. Case studies of the sunken Sewol ferry and the collapse of the gymnasium at Mauna resort in Gyeongju are conducted by analyzing the existing literature and the data collected from the media sources and related agencies. With a basis on the findings of the analyses, it is suggested that legal foundation and disaster and risk management systems (systematic revision of the laws, raised safety awareness among citizens, production and education of security managers, formation of disaster management organizations, establishment of headquarters in case of emergency and installation of first aid facilities, improved national response system, enforcement of disaster drills, introduction of assessment system, etc.) must be established to contribute to creating a safer society.

A Study on the Analysis and Classification of Cyber Threats Accor ding to the Characteristics of Computer Network of National·Public Organizations (국가·공공기관 전산망 특성에 따른 사이버 위협 분석 및 분류에 관한 연구)

  • Kim, Minsu;Park, Ki Tae;Kim, Jongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.197-208
    • /
    • 2020
  • Based on the network infrastructure advanced in the information knowledge society, the structure of computer net work is operated by establishing the composition of network in various forms that have secured the security. In case of computer network of national/public organizations, it is necessary to establish the technical and managerial securit y environment even considering the characteristics of each organization and connected organizations. For this, the im portance of basic researches for cyber training by analyzing the technical/managerial vulnerability and cyber threats based on the classification and map of cyber threats according to the characteristics of each organization is rising. T hus, this study aims to analyze each type of external/internal cyber threats to computer network of national/public o rganizations established based on the dualistic infrastructure network of internet and national information network, a nd also to present the cyber threat framework for drawing the elements of cyber security training, by drawing and analyzing the actual elements of cyber threats through the case-based scenario.

Comparative Analysis on Security Needs Satisfaction and Life Satisfaction of Electronic Security System Users by City Size (도시크기에 따른 기계경비시스템 이용자의 안전욕구충족과 생활만족 비교분석)

  • Yoo, Young-Chang;Lee, Jong-Hwan;Kim, Chan-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.330-341
    • /
    • 2010
  • The purpose of this study is to have comparative analysis on the differences between metropolis and provincial city's electronic security system users' security needs satisfaction and life satisfaction. This study sampled total 400 users with using purposeful sampling after selecting specific metropolis and provincial cities as population. It was conducted on 4 realms-bank, jewelry store, convenience store and communication industry- with two times. First one was on June, 2008, it was conducted in Seoul, 5 areas divided based on Hangang, which are Gang-dong, Gang-seo, Gang-nam, Gang-buk, and civic center. We sampled 40 electronic security system users of each area which are 200 in sum. Second one was on January, 2009, with users in Cheonan and Asan, 200 was sampled in the same way with metropolis; 100 users of each city. The reliability of the questionnaire showed Cronbach's ${\alpha}$ value over .812. The results are as follows. First, there showed difference on physical security needs satisfaction of electronic security system users with the size of city. In other word, users in metropolis have higher environmental, psychological, and informational security needs satisfaction than users in provincial city. Second, there is also difference in life satisfaction. Namely, users in metropolis have higher security needs satisfaction than users in provincial city. Third, security needs satisfaction of electronic security system users by city size effects life satisfaction. That is, in case of users in metropolis, the more physical, environmental, and informational security needs satisfaction it shows, the more life satisfaction it showed.

Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident (정보보안사고가 투자주체별 투자성과에 미치는 영향: 개인정보유출사고 중심으로)

  • Eom, Jae-Ha;Kim, Min-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.463-474
    • /
    • 2016
  • As IT environment has changed, paths of information security in financial environment which is based on IT have become more diverse and damage caused by information leakage has been more serious. Among security incidents, personal information leakage incident is liable to give the greatest damage. Personal information leakage incident is more serious than any other types of information leakage incidents in that it may lead to secondary damage. The purpose of this study is to find how much personal information leakage incident influences corporate value by analyzing 21 cases of personal information leakage incident for the last 15 years 1,899 listing firm through case research method and inferring investors' response of to personal information leakage incident surveying a change in transaction before and after personal information leakage incident. This study made a quantitative analysis of what influence personal information leakage incident has on outcome of investment by types of investors by classifying types of investors into foreign investors, private investors and institutional investors. This study is significant in that it helps improve awareness of importance of personal information security by providing data that personal information leakage incident can have a significant influence on outcome of investment as well as corporate value in Korea stock market.

Case Study on Expert-type Director of Presidential Security Service (전문형 대통령경호실장에 대한 사례연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.221-246
    • /
    • 2013
  • The purpose of this research is to analyze authority and expertise of internally-selected Director of Presidential Security Service (PSS) through case-studies of the 9th Director of PSS Sang-Bum Park and the 13th Director of PSS Sang-Kuk Yeom, and to provide suggestions as to how to improve the expertise of PSS director and how to make PSS more trusted by the president and citizens. To do so, this study employs qualitative research on various references while acquiring testimonies from an expert group. The result of the research is as follows. First, the 9th Director of PSS Sang-Bum Park and the 13th Director of PSS Sang-Kuk Yeom are categorized as non-authoritative Director of Presidential Security Service. Second the 9th Director of PSS Sang-Bum Park and the 13th Director of PSS Sang-Kuk Yeom are categorized as expert-type Director of Presidential Security Service. It must be acknowledged that the authority of PSS directors does not come from close relationship with president or physical distance, but from legality and professionalism. Therefore, when appointing a person who is in charge of his/her own safety, the president must consider national security and professionalism in order to succeed as a ready president.

  • PDF