• Title/Summary/Keyword: Security Cooperation

Search Result 874, Processing Time 0.027 seconds

Regulation of International Economic-Legal Cooperation in the Field of Agricultural Production through the Prism of Information Technology Development

  • Matvieiev, Petro;Baadzhy, Nataliia;Gurenko, Maria;Myroshnychenko, Volodymyr;Feofanova, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.143-150
    • /
    • 2021
  • International economic and legal cooperation can ensure the transition of agriculture to the trajectory of sustainable development. The paper considers in detail the set of common goals and problems of an international nature, the solution of which is aimed at global legal regulation of cooperation between states. It is also noted about the impact of information technology on agricultural development. The following methods of scientific cognition are used: a historical, systematic approach to research, method of analysis, and synthesis. Research results: a scientific idea of the importance of international cooperation in general and global collaboration in the field of agricultural production in particular. It is stated that states are obliged to cooperate, regardless of differences in their political, economic, and social systems, in various areas of international relations to maintain international peace, security and promote worldwide economic stability and progress, the common good of peoples. It is emphasized the need to build such relations in the agricultural sector, which take into account the interests of all states.

Analysis of Education Training Program of Information Security Man Power in Domestic (국내 정보보호 교육 훈련 프로그램 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3725-3730
    • /
    • 2009
  • A serious disturbance of the 7.7 DDoS hacking gets a chance of raised awareness for importance of response countermeasure with current status of information security. The critical factor out of countermeasure of information security is the supply of information human power. In this paper, we review program of information security of domestic and foreign, from major courses of domestic university, and category of government about information security, and analyze security education training awareness program of human power in the information security area.

Development of Human Resources at universities for training of specialist in security industries - based on Departments related Security services - (경호·경비분야 전문인력양성을 위한 대학 인적자원개발 - 경호관련학과를 중심으로 -)

  • Kwon, Tae-Il
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.19-38
    • /
    • 2006
  • With rapid social change, security industries were diversified and universities related total security service were founded for training of specialist with a theory and practical affairs. Today, universities must provide an education which fits to job characteristics in rapidly changing society. Also students through this education must find their job properly. The purposes of this study, therefore, are to search a career selection of students majoring in total security service related departments and to study a role of universities for development of specialist related security industries. Revitalization plan of human resources for departments related security services are as follows ; roles of universities: a specialization of curriculum and a diversification of training method. 'academic-industrial cooperation', role of government: 'a legal and institutional policy on academic-industrial cooperation';. Universities, cooperations, government must cooperate mutually for development of specialist related security service field.

  • PDF

A Study on the Mutual Cooperation of Private Security and Local Government (지방자치단체와 민간경비의 상호협력에 관한 연구)

  • Song, Sang-Wk;Lee, Min-Hyong
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.105-128
    • /
    • 2006
  • The suggestions that follow are about the plan for the cooperation between private security and local government and the enhancement of its service for facing the change of public peace environment. Fist, by a local government collecting funds, the business for revitalization of local economics should be done to enhance local economic independence. Second, the autonomous right of a local government should be reinforced and the center for taking complete charge of local security should be established in the self-governing body. Third, the private security should be connected with the local characteristics, the role of which enlarged as well. For this developing the model of security service for the local area and working together between private security and police should be achieved. Fourth, it is necessary for a local government to entrust the private security with its public security service. For this it should be achieved to set up the range of local security service and inform local residents of the advantage of security service entrusted to private security. Finally, in connection with the new system of local police, it is necessary to have clear grasp of the work related to the private security among local police services and private security business and local police should take partial charge of the public peace service. Through the cooperation between private security and local government, the role of private security will be enlarged and its business revitalized as well.

  • PDF

Research on Technical Requirements of Security for Migration, Combination, and Separation of Web-Contents and Development of Cooperation Service Framework in N-Screen Services (N-스크린서비스 환경에서 웹콘텐츠 이동/결합/분리를 고려한 보안 기술 분석 및 협업 서비스 프레임워크 개발)

  • Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.169-176
    • /
    • 2014
  • According to explosion of smart-devices, demands on N-screen services based on cooperation of multiple screens are rapidly increasing. These N-screen services can provide new user-experience (UX) to users. That is, it can provide technical advances to users. On the other hand, it causes new security problems. In this paper, we analyze conventional web-security attacks, and we propose and analyze new security requirements for migration, combination, and separation of web-contents based on N-screen service scenarios. Also, we develop N-screen cooperation service framework in order to ensure user security.

Security Architecture and Model in Aeronautical Communication Network (항공통신 네트워크에서 보안구조 및 모델)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.1
    • /
    • pp.122-127
    • /
    • 2009
  • In this paper, it is reviewed security architecture and proposed security model about secure aeronautical system, which is considering in the cynical research topics out of aeronautical traffic system. The reviewed contents is treated about security model fur domestic aeronautical system with international security technology trends in the basis of security technology related aeronautical services. In the security framework of aeronautical communication network, it is analyzed data link security technology between air and ground communication, and security architecture in according to aeronautical system, and presented security architecture of U information HUB model. The security architecture of U-information HUB includes the internetworking scope of airline, airport network, airplane network, and related government agency, etc.

Development of Security Level Evaluation Tool(ISSPET) Based on Information Security System (정보보호 시스템기반의 보안 수준 평가 도구(ISSPET) 개발)

  • Soh, Woo-Young;Kim, Wan-Kyung;Kim, Seak-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1911-1919
    • /
    • 2009
  • Currently, the evaluation technology for the security systems of risk analysis level measurement is maintained by only the developed countries including U.S and U.K, and the evaluation technology and its infrastructure are insufficient for the evaluation technology of security threat analysis level measurement in Korea. Therefore this paper presents the development of the security control items and the evaluation tool(ISSPET) for the security level performance. It is expected to evaluate the security management level of the current system and its security environment through analyzing the security management level of security systems using ISSPET.

Study on Security Considerations in the Cloud Computing (클라우드 컴퓨팅에서의 보안 고려사항에 관한 연구)

  • Park, Choon-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1408-1416
    • /
    • 2011
  • Cloud computing provides not only cost savings and efficiencies for computing resources, but the ability to expend and enhance services. However, cloud service users(enterprisers) are very concerned about the risks created by the characteristics of cloud computing. In this paper, we discuss major concerns about cloud computing environments including concerns regarding security. We also analyze the security concerns specifically, identify threats to cloud computing, and propose general countermeasures to reduce the security risks.

NATO's Factor in Ensuring the National Security of Modern Ukraine

  • Biloshytskyi, Volodymyr;Hanhal, Artur;Mokliak, Sergii;Pysmennyi, Oleksii;Smolianiuk, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.689-695
    • /
    • 2021
  • The study is based on the elaborated normative and legal documentation regulating the national security of modern Ukraine and the normative and legal documents adopted by NATO in the responding policy to the challenges that arose after 2014. The main advantages of cooperation with NATO are ensuring military security, developing army standards, improving the country's investment climate, and reducing expenditures on the army. The disadvantages of cooperation with NATO in hostilities with Russia are not highlighted. Still, defined obstacles show that Ukraine is not ready to realize entry into NATO in the short term. Such factors include weak information support, corruption, and unclear diplomatic decisions.

Design on Security Protocols Reflecting Collaboration in Workflow Management Systems (협업 기반 워크플로우 관리시스템의 보안 프로토콜 설계)

  • Choi, Myeong-Gil;Lee, Dong-Ho;Hwang, Won-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1271-1278
    • /
    • 2008
  • As the collaboration of WFMS(workflow management systems) in enterprises increases, security protocols could be considered a critical factor affecting secure operation of WMFS. The security protocol of WFMS could not reflect the nature of collaboration in WFMS, resulting to collaboration of WFMS on Internet causing the operation problems of WFMS. This study suggests collaboration based security protocols based on the collaboration of WFMS on Internet. To reflect the nature of collaboration in WFMS, this study analyzes security requirements for WFMS. Based on security requirements, this study suggests a security architecture and security protocols for WFMS using security agents.