• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.025 seconds

A Study on the Fire Fighting General Index for Fire Fighting of Crowded Wooden Building Cultural Asset (군집 목조 건축문화재의 화재대응을 위한 소방방재 종합지수 연구)

  • Kwon, Heung-Soon;Lee, Jeong-Soo
    • Journal of architectural history
    • /
    • v.21 no.2
    • /
    • pp.37-52
    • /
    • 2012
  • This research has set up the fire fighting general index for Fire fighting of Crowded Wooden Building Cultural Asset which is composed of traditional wooden building instinct or complex. The results of this study are as follows. First, Fire fighting general index for crowded wooden building cultural asset, it is necessary to set fire fighting priority by considering fire risk and cultural asset characteristic and establish the system to cope with fire disaster in the most effective way by arranging facilities with restricted resource. Second, Fire risk is the index to draw fire and spread risk of cultural asset by applying index calculation processes such as fire load, burning velocity and ignition material spread characteristic to various aspects such as individual building and complex and combining their results. Cultural asset importance index consists of individual building evaluation, publicity security degree, area importance evaluation and historical landscape degree evaluation. Third, for each index combination process, weight of each index is drawn on the basis of AHP analysis result that is performed to the specialists of related fields. The formula to apply and combine it is prepared to apply the model to include meaning of each index and comparative importance degree.

Role of Agroforestry Trees in Sustaining Livelihood: A Case of Communities in Western Himalayas

  • Nagar, Bhuvnesh;Rawat, Sushma;Kumar, Munesh
    • Journal of Forest and Environmental Science
    • /
    • v.33 no.2
    • /
    • pp.91-96
    • /
    • 2017
  • Trees at farm are considered as one of the option to reduce poverty of smallholders by contributing to livelihood security and resilience to climate change. A perception based study was conducted to assess the cultural importance of tree species suitable for practicing agroforestry in randomly selected agroforestry-dominated villages in Alaknanda valley of Western Himalayas during 2015-16. Semi-structured questionnaire was used to collect primary data on the provisioning services of major agroforestry tree species in randomly surveyed 87 households. Based on cultural importance (CI) index value, the most suitable agroforestry tree species was Morus alba (3.32) followed by Celtis australis (3.22), Mangifera indica (3.01), Grewia optiva (2.79), Toona ciliata (2.22), Bauhinia variegata (2.08), Leucaena leucocephala (1.76) and Emblica officinalis (1.74). The preference of use has also been governed based on their indigenous knowledge. This study will also facilitate in evaluating the importance of provisioning services of agroforestry tree species in improving livelihood as well as facilitates smallholder's resilience to climate change in Western Himalayas.

Practice and Improvement Scheme of Management of Human Resources in Korean Private Security Service Industry (한국 민간경비 인적자원 확보관리의 실태 및 개선방안)

  • Suh, Sang-Yul;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.81-99
    • /
    • 2008
  • Despite its legal, systematic and quantitative growth, Korean private security has not been showing satisfactory level of qualitative growth comparing to quantitative growth as it socially shocked with recent occurrence of the events and accidents. People on demand of security are making use of private security service to offset insufficient supply of security power as, especially, the incendiarism at Sungryemun last February brought out security issues for nationally important facilities and cultural assets, and other cases showed that the police would not cope with the appropriate security services under the current security system for protecting the life and property of people. For the supplementation of security power, the private security service is prevalent, but lots of service providers would not overcome its small business scale, except some large-sized security providers. There are some problem occurred as some providers employed staff who would not have the stuff for performing security service and they even committed illegal actions. Some opinions pointed out that it should come up with measures as they socially lose their credit. Therefore, this research suggests the recognition of the importance and the improvement measures of human resources management as follows. Security Service needs: 1. control of criteria for the employment/recruitment of human resources; 2. inducement of qualitative improvement of security service by ensuring excellent quality of human resources; 3. elevation of morale of organizational members with the operation of efficient promotion system; 4. introduction of professional certification system for the inflow of excellent quality of human resources.

  • PDF

Study on Information Security Management System Evaluation Methodology (국내환경에 적합한 정보보호관리체계 평가 방법론에 대한 연구)

  • Hong, Sung-Hyuk;Park, Jong-Hyuk;Seo, Jung-Taek
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.4
    • /
    • pp.384-391
    • /
    • 2008
  • These days, along with the information society, the value of information has emerged as a powerful factor for a company's development and sustainability, and therefore, the importance of the Information Security and Management System (ISMS) has emerged and become an integral part of all areas of business. In this paper, ISMS evaluation methods from around the world are compared and analyzed with the standards of various management guidelines, definitions, management of threats and vulnerability, approaches to result calculations, and the evaluation calculation indexes for domestic to propose the best method to evaluate the Information Security Management System that will fit the domestic environment.

  • PDF

A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.65-71
    • /
    • 2017
  • This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

A Study on Personal Information Control and Security in Printed Matter (출력물에서의 개인 정보 제어 및 보안에 관한 연구)

  • Baek, Jong-Kyung;Park, Jea-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.5
    • /
    • pp.2415-2421
    • /
    • 2013
  • Widespread personal data utilization has led personal data protection to its importance at core, and serious data spill has increased constantly as a result. Though various types of protection systems for data spill have been suggested, all these met failures in detection of personal data when printed out or preventing fatal data exposure without any protections when data spill happens. I propose API-Hook method which detects and controls personal data within printouts, and prevents data leakage through masking on the printed-out data. Also, it is verified if security is guaranteed on the documents containing personal data when implementing. In order to obtain security, it is essential to put more weights on the balance with availability than confidentiality.

A Method of Internal Information Acquisition of Smartphones (스마트폰 내부 정보 추출 방법)

  • Lee, Yunho;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1057-1067
    • /
    • 2013
  • The market share of smartphones has been increasing more and more at the recent mobile market and smart devices and applications that are based on a variety of operating systems has been released. Given this reality, the importance of smart devices analysis is coming to the fore and the most important thing is to minimize data corruption when extracting data from the device in order to analyze user behavior. In this paper, we compare and analyze the area-specific changes that are the file system of collected image after obtaining root privileges on the Android OS and iOS based devices, and then propose the most efficient method to obtain root privileges.

The design of Biometrics System to enhance the security through the Distributed Stored of Multiple Split bio_Templates (생체정보 다분할 분산저장 기법을 통한 보안성 향상의 생체인증 시스템 설계)

  • Hong, Yoon Kee;Yoon, Ji Won
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.31-39
    • /
    • 2016
  • The biometrics information is very useful by the convenience of ownership and using. but the risk of crime of malicious re-uses and infringement of personal privacy exist because the biometrics information is impossible to change typically when the illegal interception occurred from others. therefore the importance of security on stored management of biometrics information has been increased steadily. the existing biometric authentication system has been stored only encrypted complete template at a single storage place. In this paper, we designed the Distributed Stored of Multiple Split bio_Template System that a template is divided in different ways by each user and stored in other storage places from personal information to relieve user's anxiety about the saved template and illegally leaked through restored only template to authenticate and then delete.

A Study of Aspheric Mirror Optical Design to Improve Luminous Intensity Uniformity of LED Security Lights (LED 보안등의 광균일도 향상을 위한 비구면 Mirror형 광학 설계에 관한 연구)

  • Jung, In-Ho;Yoon, Cheol-Yong;Ye, In-Soo;Hyun, Dong-Hoon
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.20 no.1
    • /
    • pp.114-119
    • /
    • 2011
  • There is a limit to technology of improving luminous intensity uniformity and glare, known as a weakness of existing LED lamp. Because of Using many LED, LED lamp not only waste energy but have bad effect on efficiency. Our goal is to develop security lights solution which is contented with suitable area in KS(Korean Industrial Standards) and to remove glare by combining asphere in optical system with different concept. To improve luminous intensity uniformity, a reflect mirror system was used after an aspheric optical system design for this study. We made a mirror and measured it after analysing luminance changes depend on aspheric shapes with simulation program to see if aspheric shapes effect luminance distribution. We made progress to find problems and improve them by comparing measured data and analysed data. This result of the study will contribute to industry of LED lighting through developing solution of emotional illumination of LED security lights by knowing the importance of reflectivity with this study and improving luminous intensity uniformity with solving the problem.

Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption

  • Youn, Taek-Young;Jho, Nam-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1249-1262
    • /
    • 2020
  • Along with the increase of the importance of information used in practice, adversaries tried to take valuable information in diverse ways. The simple and fundamental solution is to encrypt the whole data. Since the cost of encryption is increasing along with the size of data, the cost for securing the data is a burden to a system where the size of the data is not small. For the reason, in some applications where huge data are used for service, service providers do not use any encryption scheme for higher security, which could be a source of trouble. In this work, we introduce a new type of data securing technique named Trapdoor Digital Shredder(TDS) which disintegrates a data to multiple pieces to make it hard to re-construct the original data except the owner of the file who holds some secret keys. The main contribution of the technique is to increase the difficulty in obtaining private information even if an adversary obtains some shredded pieces. To prove the security of our scheme, we first introduce a new security model so called IND-CDA to examine the indistinguishability of shredded pieces. Then, we show that our scheme is secure under IND-CDA model, which implies that an adversary cannot distinguish a subset of shreds of a file from a set of random shreds.