• 제목/요약/키워드: Security Elements

검색결과 548건 처리시간 0.03초

기계경비시스템의 변화와 시장전망 (The Trends of Electronic Security System and Prospects of Security Market)

  • 정태황
    • 시큐리티연구
    • /
    • 제6호
    • /
    • pp.147-165
    • /
    • 2003
  • Since Electronic Security System is introduced in Korea in 1981 by foreign technology, Security market has been increasing considerably during short period, and It performs it's security roles well in place of security guards. As electronic and communication technology is highly developed, Electronic Security System and security market structure is changing naturally. Especially high-tech mobile communication technology will change the method of Electronic Security business. Also the pattens of residence and life style, such as the trend toward nuclear family and single life could effect security market. In recent year, new business models that apply the mobile phone and internet is appeared. Although Electronic Security System is changed by the changes of technology, It is very difficult to change the basic elements, such as sensing, alarm signal transfering, and response. The rate of increase of Electronic Security market is expected to matain it's increase pace for the time being. But the development of new system for new protectes such as childeren, old person, vehicle rather than immovable facility is necessary to prepare for the continuous competition.

  • PDF

전사적 정보보호 아키텍처에 근거한 금융 정보보호 모델 설계 (Design of Financial Information Security Model based on Enterprise Information Security Architecture)

  • 김동수;전남재;김희완
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.307-317
    • /
    • 2010
  • The majority of financial and general business organizations have had individual damage from hacking, worms, viruses, cyber attacks, internet fraud, technology and information leaks due to criminal damage. Therefore privacy has become an important issue in the community. This paper examines various elements of the information security management system and discuss about Information Security Management System Models by using the analysis of the financial statue and its level of information security assessment. These analyses were based on the Information Security Management System (ISMS) of Korea Information Security Agency, British's ISO27001, GMITS, ISO/IEC 17799/2005, and COBIT's information security architecture. This model will allow users to manage and secure information safely. Therefore, it is recommended for companies to use the security management plan to improve the companies' financial and information security and to prevent from any risk of exposing the companies' information.

감시경계 로봇의 그래픽 사용자 인터페이스 설계 (A Graphical User Interface Design for Surveillance and Security Robot)

  • 최덕규;이춘우;이춘주
    • 로봇학회논문지
    • /
    • 제10권1호
    • /
    • pp.24-32
    • /
    • 2015
  • This paper introduces a graphical user interface design that is aimed to apply to the surveillance and security robot, which is the pilot program for the army unmanned light combat vehicle. It is essential to consider the activities of robot users under the changing security environment in order to design the efficient graphical user interface between user and robot to accomplish the designated mission. The proposed design approach firstly identifies the user activities to accomplish the mission in the standardized scenarios of military surveillance and security operation and then develops the hierarchy of the interface elements that are required to execute the tasks in the surveillance and security scenarios. The developed graphical user interface includes input control component, navigation component, information display component, and accordion and verified by the potential users from the various skilled levels with the military background. The assessment said that the newly developed user interface includes all the critical elements to execute the mission and is simpler and more intuitive compared to the legacy interface design that was more focused on the technical and functional information and informative to the system developing engineers rather than field users.

Analysis and Comparison of Sorting Algorithms (Insertion, Merge, and Heap) Using Java

  • Khaznah, Alhajri;Wala, Alsinan;Sahar, Almuhaishi;Fatimah, Alhmood;Narjis, AlJumaia;Azza., A.A
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.197-204
    • /
    • 2022
  • Sorting is an important data structure in many applications in the real world. Several sorting algorithms are currently in use for searching and other operations. Sorting algorithms rearrange the elements of an array or list based on the elements' comparison operators. The comparison operator is used in the accurate data structure to establish the new order of elements. This report analyzes and compares the time complexity and running time theoretically and experimentally of insertion, merge, and heap sort algorithms. Java language is used by the NetBeans tool to implement the code of the algorithms. The results show that when dealing with sorted elements, insertion sort has a faster running time than merge and heap algorithms. When it comes to dealing with a large number of elements, it is better to use the merge sort. For the number of comparisons for each algorithm, the insertion sort has the highest number of comparisons.

퇴직 특정직 경호공무원의 재취업에 미치는 영향요인에 관한 탐색적 연구 (Exploratory study on impacting elements on retired special security government official's reemployment)

  • 김범석
    • 시큐리티연구
    • /
    • 제27호
    • /
    • pp.51-80
    • /
    • 2011
  • 우리나라 퇴직 특정직 경호공무원들의 재취업에 미치는 영향요인에 관한 탐색적 연구를 위해 20년 이상 근무하고 퇴직한 경력자와 취업지원 및 컨설팅업체 담당자에 대한 인터뷰 면접을 실시하였다. 분석 결과 첫째, 재취업 기회 및 정보의 절대 부족과 취업분야와 수요기관 요구 수준과 현 직위, 보수와 불일치, 경험과 전문성 부족, 취업지원 및 교육프로그램 부재 등을 들 수 있다. 둘째, 취업대상자들의 눈높이가 높고 정규직이나 장기간 근무할 수 있는 신분이 보장되는 직업을 선호하는 것으로 나타나 재취업이 어렵다는 점이다. 셋째는 재취업에 대한 의식과 준비가 미흡하거나 자력으로 취업하기 보다는 기관에 너무 의존하거나 다양한 기업이나 분야에 진출하는데 필요한 경력 및 자격의 제한 등이 가장 큰 장애요인으로 작용하고 있다는 점이다. 마지막으로 재취업에 있어서 사회적 네트워크 및 인맥의 중요성 인식과 함께 취업에 도움이 될 만한 개인의 사회적 자본 활용의 규모가 크지 않은 것으로 나타났다. 따라서 본 연구를 통해 나타난 분석결과를 토대로 성공적인 재취업을 지원하는데 적극 반영할 필요가 있다.

  • PDF

사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구 (A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA)

  • 장영천;강경란;최봉완
    • 한국군사과학기술학회지
    • /
    • 제20권3호
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

DATA MINING-BASED MULTIDIMENSIONAL EXTRACTION METHOD FOR INDICATORS OF SOCIAL SECURITY SYSTEM FOR PEOPLE WITH DISABILITIES

  • BATYHA, RADWAN M.
    • Journal of applied mathematics & informatics
    • /
    • 제40권1_2호
    • /
    • pp.289-303
    • /
    • 2022
  • This article examines the multidimensional index extraction method of the disability social security system based on data mining. While creating the data warehouse of the social security system for the disabled, we need to know the elements of the social security indicators for the disabled. In this context, a clustering algorithm was used to extract the indicators of the social security system for the disabled by investigating the historical dimension of social security for the disabled. The simulation results show that the index extraction method has high coverage, sensitivity and reliability. In this paper, a multidimensional extraction method is introduced to extract the indicators of the social security system for the disabled based on data mining. The simulation experiments show that the method presented in this paper is more reliable, and the indicators of social security system for the disabled extracted are more effective in practical application.

지능형 빌딩 시스템(IBS)의 등급 결정을 위한 ANP 모형 -IBS 구현 이득을 기준으로- (An Analytic Network Process Model for Ranking Decision of Intelligent Building System)

  • 유수현;김승권
    • 산업공학
    • /
    • 제13권2호
    • /
    • pp.234-245
    • /
    • 2000
  • In this paper, the conceptual framework of IBS(Intelligent Building Systems) is redefined, and we propose two ANP(Analytic Network Process) models for ranking IBS. Traditional models have ranked IBS according to technical features or the number of elements in IBS. But, we consider relative functional importance among IBS elements for efficient building operation. According to the structure of interactive-relationship among IBS elements, we present two types of model. The one is Model A that is composed of both hierarchical and network structures. It has $12{\times}12$ supermatrix consists of interdependent relationship between 6 benefit elements(Productivity, Saving, Safety, Convenience, Pleasantness, Environment Affinity) and 6 IBS elements(Building Operation, Security, Safety, Telecommunication(TC), Office Automation(OA), other elements). Each of 6 IBS elements has subelements in hierarchical structure. The other is Model B that has $25{\times}25$ supermatrix consists of interdependent relationship between 6 benefit elements and 19 IBS sub elements. Merits and demerits of each model are discussed in detail.

  • PDF

글로벌 기업의 공급사슬보안 및 위험관리전략에 관한 연구 (A Study on the Supply Chain Security and Risk Management Strategies of Global Companies)

  • 양정호
    • 경영과정보연구
    • /
    • 제27권
    • /
    • pp.149-172
    • /
    • 2008
  • Since the 9/11 terror attack, the event which caused supply chain disruption, supply chain security has becomes more important than ever before. Furthermore, such company's logistics strategies conflicting supply chain security as increased global sourcing, JIT manufacturing are increasing supply chain vulnerability. It could burden for global companies to strengthen supply chain security because not only it requires additional investment cost but also changes of companiy's global logistics strategy. However, on the other hand, supply chain visibility and resilience can be improved through supply chain security. In addition, it allows companies to stabilize supply chain structure as well as rapid and flexible response to market demand. The key issue is balancing between efficiency and supply chain security. To do this, identifying risk elements under the supply chain and assessing vulnerability of each supply chain components should be performed before developing efficient supply chain security management system without obstructing supply chain efficiency.

  • PDF

패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인 (A Study on Factors Influencing User's Security Behavioral Intention for Choosing Password)

  • 김종기;강다연;전진환
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제17권1호
    • /
    • pp.23-43
    • /
    • 2008
  • Nowadays, openness and accessibility of information systems increase security threats from inside and outside of organization. Appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. This study emphasizes on choosing passwords from perspective of information security and investigated user's security awareness affecting behavioral intention. The research model proposed in this study includes user's security belief which is influenced by risk awareness factors such as information assets, threats and vulnerability elements. The risk awareness factors ale derived from risk analysis methodologies for information security. User's risk awareness is a factor influencing the security belief, attitude toward security behavior, and security behavioral intention. According to the result of this study, while vulnerability is not related to the risk awareness, information assets and threats are related to the user's risk awareness. There is a significant relationship between risk awareness and security belief. Also, user's security behavioral intention is significantly affected by security attitude.