• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.034 seconds

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control (데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Kim, Mi-Kyoung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.

Information Security and Its Awareness in Local Governments (지방자치단체의 정보보호 현황 및 인식의 변화 분석)

  • Noh, Jae In;Seo, Jin-Wan
    • Informatization Policy
    • /
    • v.23 no.1
    • /
    • pp.20-37
    • /
    • 2016
  • As the numbers of various cyber-crimes have sharply increased, the importance of securing information has also been emphasized. Despite the government's constant efforts to solve the issue, they hardly work in practice, and cases related to information security are still on the rise. This study investigates the reasons for the discrepancy that occurs when a solution is put to action. The research analyzes the recent shift in the administrative system with regard to information security and officials' awareness of the shift, focusing on members of local government. The results of the study confirm a steady attempt including changes in institutions at the level of the central government. However, there is still a lack of personnel and budget support at the local government level as well as not much change in the awareness of information security.

A Study on Threat Analysis of PC Security and Countermeasures in Financial Sector (금융권 PC보안 위협 분석 및 대응방안에 관한 연구)

  • Han, Kyung-Hee;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.283-290
    • /
    • 2015
  • As society has evolved to the knowledge and information society, the importance of internal information of the company has increased gradually. Especially in financial institutions which must maintain the trust of customers, the disclosure of inside information is a big problem beyond the a company's business information disclosure level to break down sales-based businesses because it contains personal or financial transaction information. Recently, since massive outflow of internal information are occurring in several enterprises, many companies including financial companies have been working a lot in order to prevent the leakage of customer information. This paper describes the internal information leakage incidents occurred in the finance companies, the PC security vulnerabilities exists despite the main security system and internal information leakage prevention and suggests countermeasures against increasing cyber infringement threats.

A Study of Security Policy for U-Healthcare Service (U-Healcare 서비스를 위한 보안정책에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.747-751
    • /
    • 2013
  • Researches on U-Healthcare service integrating medical information and IT technologies are actively conducted. U-Healthcare service is the next generation's medical paradigm that ensures conveniences to many users so that the society recognizes the importance and attempts for commercialization through various business model are performed. To form such U-Healthcare service market safely, various policies on the social structure should be established through the standard and the medical law to systemize of the medical information led by the governmen. Especially, the government's security policy to ensure the safety for the government leading visualization of U-Healthcare should be firmly established. Firstly, this paper presents U-healthcare Service and policy guideline. Secondly, it analyzes security threatening factors for the safe U-Healthcare service. By classifying the analyzed security threatening factors based on three major elements of the security, Confidentiality, Integrity and Availability of security policy for each element is proposed.

An Study on the Effects of ISMS Certification and the Performance of Small and Medium Enterprises (중소기업에 대한 ISMS 인증효과와 영향요인에 관한 연구)

  • Kim, In Kwan;Park, Jaemin;Jeon, Joong Yang
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.47-60
    • /
    • 2013
  • This paper focuses on the role of international standards related to industrial technology and to analyze determinants to affect ISMS and its performance. Particularly its financial and operational performance were measured by survey aiming at an influence of certification and its performances. The variables explaining the performance were drawn out from factor analysis and then critical variables to affect performance were discovered by ANOVA and regression analysis. As a result of the analysis considering heteroscedastic and factor analysis, type of business and firm size were not significantly related to the performance but the existence of information security unit, investment in information security and the status of security consciousness in executives and employees were positively related. As a result, this study shows that security certification should be implemented with suitable capabilities and the investments to protect from leaking industrial technology and proved the importance of the security certification as an infrastructures and system.

Job Analysis on Port Security Operation using a DACUM Method (데이컴 기법을 활용한 항만안전운영에 관한 직무분석)

  • Park, Doojin;Kim, Hyunduk
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.3
    • /
    • pp.151-165
    • /
    • 2012
  • This study is to develop a job model through job analysis on port security operation using a DACUM Method. Total 8 duties and 59 tasks are drawn through job analysis on port security operation. DACUM committee evaluated the degree of importance, difficulty and frequency of execution by each work with ABC rankings. In dosing so, job analysis model on port security operation by completing a DACUM research chart including job, duty and task in the field of port security operation is concluded. Such a Job model development could be used as a basic data and information for developing a short and long-run education programme in the field of port security operation.

The Effect of Service Quality Perceived by Users of Security Safety System on Corporate Image and Customer Satisfaction (경비안전시스템 이용자들이 인식하는 서비스품질이 기업이미지와 고객만족도에 미치는 영향)

  • Choi, Jeong-Il;Chang, Ye-Jin
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.163-179
    • /
    • 2019
  • The purpose of this study is to analyze the effect of service quality of security safety system users on corporate image and customer satisfaction. To confirm this through empirical analysis, a survey was conducted on about 200 users nationwide for about 40 days from May 2 to June 12, 2019. The survey was composed of "service quality, corporate image and customer satisfaction". The empirical analysis was conducted mainly on the analysis of importance, reliability, validity and correlation. This study used SPSS WIN 18.0 to calculate structural equations and exploratory factors. The research results are as follows: The users of the security safety system showed that the better the service quality, the better the corporate image. The better the corporate image, the higher the customer satisfaction. Also, the better the service quality, the higher the customer satisfaction. Therefore, each security safety system company should steadily improve the service quality to improve customer satisfaction.

A Meta-analysis of Korean Gamification Research Trends for Security Education Design (보안 교육 설계를 위한 국내 게이미피케이션 연구동향 메타분석)

  • Kim, Jong Wan;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.81-95
    • /
    • 2021
  • This study is to design a security game to proceed in the future based on the results of analyzing 105 research trends on gamification from 2018 to 2021 according to research period, research purpose, research subject, research topic, research method, game method, and emphasis factors. was trying to find an answer to Gamification showed a trend of increasing research related to 2021 due to the increase in the importance of non-face-to-face education in 2020, and there were not many studies targeting middle and high school students, colleges, and adults. Security-related research was a relatively incomplete and limited field, as only a small number of studies on raising awareness were conducted due to access restrictions. In the future, by referring to various research cases and statistics analyzed in this study, we will try to actually implement security education cases through gamification.

CTD-Edu: Cell-Based Three-Dimensional Education Model for Information Security Education (실무중심 정보보안 교육을 위한 셀 기반 입체교육 모델)

  • Choi, Sang-Yong;Kim, Jeong-Sahm;Lee, Kyu-Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1031-1043
    • /
    • 2021
  • Recently, the importance of information security has become greater. For this reason, the number of departments related to information security at universities and professional educational institutions is increasing. It is analyzed that the curriculum of such educational institutions has a lot to do with the job competency mentioned in NCS in relation to major subjects. This has the advantage of providing a standardized level of education for each job competency. However from the perspective of students there may be limitations on duplicate curriculum quality of education according to the level of teachers and timely acquisition of necessary elemental skills. In this paper we analyze the curriculum of universities and professional educational institutions and propose a cell-based three-dimensional education model to address the limitations of students. We verified based on the college curriculum that the proposed model can effectively improve its limitations.

Near Realtime Packet Classification & Handling Mechanism for Visualized Security Management in Cloud Environments (클라우드 환경에서 보안 가시성 확보를 위한 자동화된 패킷 분류 및 처리기법)

  • Ahn, Myong-ho;Ryoo, Mi-hyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.331-337
    • /
    • 2014
  • Paradigm shift to cloud computing has increased the importance of security. Even though public cloud computing providers such as Amazon, already provides security related service like firewall and identity management services, it is not suitable to protect data in cloud environments. Because in public cloud computing environments do not allow to use client's own security solution nor equipments. In this environments, user are supposed to do something to enhance security by their hands, so the needs of visualized security management arises. To implement visualized security management, developing near realtime data handling & packet classification mechanisms are crucial. The key technical challenges in packet classification is how to classify packet in the manner of unsupervised way without human interactions. To achieve the goal, this paper presents automated packet classification mechanism based on naive-bayesian and packet Chunking techniques, which can identify signature and does machine learning by itself without human intervention.

  • PDF