• Title/Summary/Keyword: Security Compliance

Search Result 208, Processing Time 0.027 seconds

Responsibility for Dissemination of Inaccurate Information on the Internet

  • Romanova, Vera;Nikitin, Yurii;Vozniuk, Natalia;Sverdlyk, Zoriana;Boichuk, Nelia;Kunderevych, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.137-140
    • /
    • 2021
  • The article is devoted to the study of the issue of liability for the dissemination of inaccurate information on the Internet. The article emphasizes that now the public opinion of socially active segments of the population is mainly formed on the basis of not critical but subjective ("consumer") analysis of the received information. The modern realities show that the main source of its origin is the Internet: electronic media and, above all, the relevant social networks. The problem of dissemination by the mass media of inaccurate information obtained via the Internet is solved; it is seen in bringing the laws of Ukraine, which regulate public relations regarding the dissemination of information, into compliance with the Civil Code of Ukraine. The issues of development and implementation of new legislative acts aimed at regulating the status of subjects of informational relations on the Internet and establishing the grounds for their liability are also investigated.

Conceptual Principles of the Transformation of Industrial Parks into Eco-Industrial Ones in the Conditions of Sustainable Development

  • Shevchuk, Nataliia;Tulchynska, Svitlana;Severyn-Mrachkovska, Liudmyla;Pidlisna, Olena;Kryshtopa, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.349-355
    • /
    • 2021
  • The article investigates the conceptual principles of transformation of industrial parks into eco-industrial ones in the conditions of sustainable development. It is substantiated that the concept of sustainable development in the transformation of industrial parks is to grow industry and jobs, modernize production and introduce innovative technologies, resource and energy efficiency, reduce greenhouse gas emissions and waste storage, social protection of local communities and create favorable infrastructure. It is determined that for the transformation of industrial parks, it is necessary to improve regulatory changes, introduce criteria for compliance of industrial parks and the importance of their consideration, ensure park management by the management company and create favorable incentives for industrial entry into industrial symbiosis. It is proved that industrial parks can be an incentive for industrial development and competitiveness of enterprises. The availability of talented human capital, attractive territories, minerals, energy and mineral resources, developed domestic market, agricultural potential, transport networks is becoming an attractive place for investment and development. Industrial parks need investment. Transformation into eco-industrial parks through the implementation of sustainable development goals opens additional opportunities for access to investment funds and contributes to the implementation of growth and prosperity strategies of the country.

Approach towards qualification of TCP/IP network components of PFBR

  • Aditya Gour;Tom Mathews;R.P. Behera
    • Nuclear Engineering and Technology
    • /
    • v.54 no.11
    • /
    • pp.3975-3984
    • /
    • 2022
  • Distributed control system architecture is adopted for I&C systems of Prototype Fast Breeder Reactor, where the geographically distributed control systems are connected to centralized servers & display stations via switched Ethernet networks. TCP/IP communication plays a significant role in the successful operations of this architecture. The communication tasks at control nodes are taken care by TCP/IP offload modules; local area switched network is realized using layer-2/3 switches, which are finally connected to network interfaces of centralized servers & display stations. Safety, security, reliability, and fault tolerance of control systems used for safety-related applications of nuclear power plants is ensured by indigenous design and qualification as per guidelines laid down by regulatory authorities. In the case of commercially available components, appropriate suitability analysis is required for getting the operation clearances from regulatory authorities. This paper details the proposed approach for the suitability analysis of TCP/IP communication nodes, including control systems at the field, network switches, and servers/display stations. Development of test platform using commercially available tools and diagnostics software engineered for control nodes/display stations are described. Each TCP link behavior with impaired packets and multiple traffic loads is described, followed by benchmarking of the network switch's routing characteristics and security features.

System for Preventing License Compliance Violations in Docker Images (도커 이미지 라이선스 컴플라이언스 위반 방지 시스템)

  • Soonhong Kwon;Wooyoung Son;Jong-Hyouk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.397-400
    • /
    • 2024
  • 2013년 도커가 등장한 이후, 컨테이너 기술을 기반으로 한 프로젝트 및 사업이 지속적으로 활성화되고 있는 추세이다. 도커 컨테이너는 커널을 포함하고 있지 않음에 따라 기존 가상머신에 비해 경량화된 형태로 애플리케이션을 프로비저닝하는데 활용될 수 있다. 또한, 도커에서는 퍼블릭 도커 이미지 레포지토리인 Docker Hub를 통해 개발된 도커 이미지가 공유 및 배포될 수 있도록 하여 개발자들이 자신의 목적에 부합하는 서비스를 구축하는데 많은 도움을 주고 있다. 최근에는 클라우드 네이티브 환경에 대한 수요가 증가하면서 컨테이너 기술이 더욱 각광받고 있는 실정이다. 이에 따라 도커 이미지 및 이를 기반으로 한 도커 컨테이너 환경에 대한 보안을 위한 연구/개발은 다수 이루어지고 있으나, 도커 이미지 라이선스 컴플라이언스 이슈에 대한 논의 및 민감 데이터 보호 방안에 대한 연구/개발은 부재한 상황이다. 이에 본 논문에서는 도커 이미지 라이선스 컴플라이언스 위반 방지 시스템을 제안하여 도커 이미지 업로드시, Docker Hub 내 도커 이미지와 유사도 검사를 수행할 수 있는 방안을 제시하고자 하며, 도커 이미지 내 민감 데이터를 식별하고 이를 보안할 수 있는 방안에 대해 제시하여 신뢰할 수 있는 도커 컨테이너 공급망을 구축할 수 있음을 보인다.

The Impact of Cognitive Factors of IS Security Risk Management(ISM) on Awareness and Intention to Develop ISM (보안관리 인지 요인이 조직의 정보시스템 보안위험관리에 대한 인식 및 개발의지에 미치는 영향)

  • Kim, Sanghyun;Song, Youngmi
    • Information Systems Review
    • /
    • v.14 no.2
    • /
    • pp.21-46
    • /
    • 2012
  • Organizations that make widely use of information technologies can be more efficient. But, the dependence of information technologies leads to an increase in threat of security. This is the reason why organizations are investing in security risk management (SRM) which is designed to protect of information assets. Noting a lack of empirical research in SRM, we investigate the key factors having a direct effect on performance of SRM. Particularly, this study focused on identifying factors influencing awareness of SRM and Intention to develop SRM in Organization. Based on relevant literature review, six motivating factors, including Behavior for Security Management, Compliance with Security Policy, perceived Benefits, Perceived Sacrifice, Social Pressure, Experience of Security Risks, were initially identified. The results indicated that most perception factors were positively related to Organization's intention to develop SRM and awareness of SRM, which then had positive impact on performance of SRM. But Perceived Sacrifice was not significantly related to two variables which is Organization's intention to develop SRM and awareness of SRM.

  • PDF

A Study on Securing Stability following the proposal and Application of Integration Procedure following the Diversification Process of Information Security Policies (정보보안 정책의 다변화 과정에 따른 일원화 절차의 제안과 적용에 따른 안전성 확보에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.405-410
    • /
    • 2018
  • Distribution of a series of procedure for establishment and revision for various instructions on information security for public institutions and diversified process of performance system following the compliance with the instruction are applied to the integrated procedure that any revision or change has led to the studies that are applied on the basis of all environment requirements and the facilitation of such studies in the integrated procedure for the entire information security. However, as the difference of possessing the work territory for each institution, maintaining and securing the security with the heterogeneous type for subject, the information still displays the issues to link to a series of process to the procedure to secure the foregoing as stability, In addition, the notice should be made by the public institutions for the result structured and notified on the basis of budget and the additional time and expenses for re-distributing to the private institutions would be another issue for the part to accomplish the purpose of such study. Therefore, under this study, the subject of information security of similar institutions should be sorted out and statistically classified, and it proposes the integration procedure through a series of diversity and multi-change process and summarize the same in the proposed procedure to engage in studies to secure the optimal stability.

The Fair and Equitable Treatment Standards through the Arbitral Award Cases under International Investment Disputes (국제투자분쟁에서 중재사례를 통해 본 공정.공평대우의 기준)

  • Choi, Young Joo;Hwang, Ji Hyeon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.57
    • /
    • pp.61-78
    • /
    • 2013
  • The purpose of this study is to clarify the standard of fair and equitable treatment. Although most international investment treaties prescribe fair and equitable treatment that is the obligation to provide fair and equitable treatment to foreign investor, there is no clear definition and specific elements of fair and equitable treatment. Through the arbitral award cases we can find that tribunals have interpreted to include six principles; Due process & Protection from denial of justice, Good faith, Reasonableness & Nondiscrimination, Compliance with contractual obligation, Full protection and security, Transparency & Protection of the investor's legitimate expectations. This study suggest that host countries and investors focus on international trends concerning investment disputes in order to avoid future disputes. So future disputes can be prevented and prepared in advance.

  • PDF

Research on Effect of Installing light shield of Existing Security Lights for Preventive Measures for Light Pollution (빛공해 방지 대책을 위한 기존 보안등기구의 차광판 설치 효과 연구)

  • Han, Seung-Hun;Gu, Jin-Hoi;Lee, Yoon-Gyeong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.3
    • /
    • pp.7-13
    • /
    • 2014
  • As issues on light pollution is being raised recently, movements to prevent light pollution is being implemented by each local government, such as by enforcing the Light Pollution Act from February 2013, in order to require compliance with the light-emitting permission level of existing lighting facilities. However, despite the regulations, no specific measures on products are being prepared. Thus, this Research has designed a light shield as a measure to minimize the burden of the effectiveness and time required for development and the burden of the cost necessary to re-install existing light facilities in its entirety and reviewed the effect of the measure through the BUG ratings.

A Study on the Improvement of Import Clearance System for Express Consignments by Increase of Electronic Commerce (전자상거래 확대에 따른 특송물품 수입통관시스템의 개선방안에 관한 연구)

  • Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.6 no.3
    • /
    • pp.183-201
    • /
    • 2004
  • Recently, Electronic commerce market is growing sharply for the expansion of internet and development of means of air transportation. Import Clearance System for express consignments, introduced in Korea, confers some benefit upon express consignments, ie. prompt clearance, simplification of the clearance procedure, exemption of necessary documents. But it has some problems such as lack of social security and trade compliance. So it requires some improvements as follows. Firstly, it has no legal background to clear all articles valued at US$100 or less carried by an express consignment operator. So customs brokers, not express consignment operators, should clear that articles. Secondly, it should be presented necessary documents including commercial invoice to prevent a wrong price declaration in entering express consignments valued at US$100 or less. Thirdly, X-ray inspectors must enhance their inspection ability. Customs must provide education programs for X-ray inspectors to improve their inspection ability. Lastly, Cargo selectivity system for express consignments have to be improved to operate effectively.

  • PDF

Problems and Improvement of Privacy Impact Assessment (개인정보영향평가의 문제점과 개선방안)

  • Choi, Young-hee;Han, Keun-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.973-983
    • /
    • 2016
  • It's been almost 6 years since PIA was implemented based on legislation. So I analyzed problems of PIA from the perspective of ITSM 3 elements. I mainly took account of quality improvement of the report when I assessed systems processing personal informations. So, I propose in terms of logical validity improvement of assessment report. The improvements on 4 different outputs for each phase are many cases that I assessed systems processing personal informations. And I propose improvements on qualified assessors having capability of GRC and on process for managing the assessment system. To settle down PIA system as the reasonable and effective assessment system even after 2016, the statutory deadline for completion of PIA, assessors and appointed assessment firms and authorities should cooperate to complete the assessment system.