• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.03 seconds

An Analysis of Security Vulnerabilities Using 5G NAS COUNT (5G NAS COUNT 취약점을 이용한 보안 위협 분석)

  • Kim, Min-Jae;Park, Jong-Geun;Shin, Ji-Soo;Moon, Dae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.565-573
    • /
    • 2022
  • Current mobile communication system is in the mid-process of conversion from 4G LTE to 5G network. According to the generalization of mobile communication services, personal information such as user's identifiers and location information is transmitted through a mobile communication network. The importance of security technology is growing according to the characteristics of wireless mobile communication networks, the use of wireless shared channels is inevitable, and security technology cannot be applied to all network system elements in order to satisfy the bandwidth and speed requirements. In particular, for security threat analysis, researches are being conducted on various attack types and vulnerability analysis through rogue base stations or attacker UE to make user services impossible in the case of 5G networks. In this paper, we established a 5G network testbed using open sources. And we analyzed three security vulnerabilities related to NAS COUNT and confirmed the validity of two vulnerabilities based on the testbed or analyzing the 3GPP standard.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

A Study for New Paradigm Settlement on Business Security Management: Focus on Global Business (산업보안관리에 관한 뉴패러다임의 정립: 글로벌 비즈니스를 중심으로)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.355-386
    • /
    • 2014
  • Current business environment asks the fundamental changes about business security. The essences of these changes are that the security management of today's global business is important task of managers and the security practitioner is professional who needs very specialized education and training with business thinking. Rapid process of globalization of global village tore down the business limit that was restricted on the geological areas' limitation. Rapid business environments' change that is driving depends on development of science and technology with globalization needs new paradigm to keep business continuity. With the process of globalization, Korea, which importance is gradually increasing in the national economy, has trade dependent economic system, which keeps power of national economy through trade, so Korean economic tendency is accelerating. To keep competitiveness in global market, new strategy that is different with existing domestic business management is necessary. That is, capacity of coping with outside risk in domestic business management is established in some degree, but business activities in foreign countries faces at numerous unexpected risks that differ from country to country such as difference with the custom, changes of corporate governance etc. To cope with these new risks effectively, new paradigm for business risk is necessary. Especially, flexibility of thinking like new paradigm is necessary to cope with new security risk effectively. To cope with security risk that occurs in the new business environment effectively and competes against international company in global market, company management and members' changes of cognition about security and innovative changes in security policy is necessary. In the basement of these changes, there is expansion of business security tasks, improvement of report line, enhancement of professionalism and status of security officers, variation of hands-on workers and increasing of investment to the security etc.

  • PDF

A Study on the Improvement of Job Satisfaction of Private Security Guard (민간경비원의 직무만족도 개선방안에 관한 연구)

  • Kim, Joon-Ki;Lee, Sang-Yeol
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.127-148
    • /
    • 2018
  • As the role and the importance of private security are emphasized in an independent way, as well as in a supportive way for police affairs, this study aims to figure out factors affecting job satisfaction of private security guards by investigating their job satisfaction. This study also suggests some solutions for improvement of their job satisfaction, such as enhancing task motivation and professionalism of private security guards. For the research were used SPSS(Statistical Package for the Social Science) WIN 24 programs. Frequency analysis, correlation analysis, multiple regression analysis and Crosstabulation analysis were performed as analytic methods. As a result of the study, the most fundamental factor in the job satisfaction of the private security guards was 'social recognition'. Social recognition forms when private security guards are trusted as professionals and the value of a job is enhanced. The policy recommendations to improve the job satisfaction of private security guards can be explained as follows. First, a government certification system should be established in an attempt to recruit professional private security guards. Second, in order to improve the work ability of private security guards, it is necessary to designate a special educational institution for a private security guards and provide systematic education. Third, the wage of private security guards should be readjusted to a realistic level. Fourth, it is necessary to secure substantial effect on the permission and the supervision of private security business. Finally, the business area based on public interest should be expanded.

Comparative Analysis on Inter-Countries For the Development of Energy Security Index -Focusing on LNG- (에너지 안보 지표 개발에 관한 국가 간 비교 분석 -LNG를 중심으로-)

  • Hwang, Yun-Seop;Kim, Dong-Yeub;Song, Seok-Won
    • International Area Studies Review
    • /
    • v.13 no.3
    • /
    • pp.191-210
    • /
    • 2009
  • Energy Security has been factor of great importance to national security, economy, society and all other areas. However, it has been in the lack of situation where there is no leading method to measure energy security nor to compare among countries until now. In the research, objective index to assess energy security has been developed and compared among the level of countries in terms of energy importing countries' perspective. Based on the suggested index, comparison for the energy security level has been explained. The implication of the research is that in terms of energy importing perspectives, method to appraise energy security and according to this, energy security rate by each countries with respect to LNG. This method is doubtlessly applicable to comparison of security rate from other resources and fluctuation of energy security by reflecting other factors. Also, discussion about how increased autonomy of resources can impact Korean energy security with regard to recent international energy development. As a consequence, it has revealed that enhanced authority of resources evokes ascendancy of energy security in a positive way.

Job Analysis for IT Security Workers in Defense Industry through DACUM Process (DACUM 기법을 이용한 방위산업체 정보통신보안실무자 직무분석)

  • Woo, Kwang Jea;Song, Hae-Deok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.73-84
    • /
    • 2014
  • As the society turns into more of an information an technology centric society, the importance of information security is being increased these days. Recently, as the number of leaking accidents of personal information and valuable industrial technology is on the rise, every field of industry endeavors to come up with a security solution. In particular, since defense industry is a field where it establishes national defense power that is essential of national security, it requires higher standards of security solutions than any other ordinary fields of industry. According to Defense Industry Security Work Instructions, defense industry firms from security organizations and employ a security worker corresponding to the firm's scale and conditions. In an environment where essential information and technology are stored and managed in information and communication system or storing media, the duty and role of IT security workers are crucial. However, there is a shortage of systematic analysis on the work of IT security workers and development of curriculum to enhance their professionalism. Thus DACUM process, a job analysis technique, was used to identify IT Security workers' duties and responsibilities and verify the validity and credibility of the deducted results from the survey. The findings of this study will help in development of IT security duty in defense industry and can be used as baseline data for the development of curriculum and amendments of related regulations.

A Study on security characteristics and vulnerabilities of BAS(Building Automation System) (BAS의 보안 특성 및 취약점에 관한 연구)

  • Choi, Yeon-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.669-676
    • /
    • 2017
  • Recently, due to the importance of information security, security vulnerability analysis and various information protection technologies and security systems are being introduced as a countermeasure against cyber-attacks in new as well as existing buildings, and information security studies on high-rise buildings are also being conducted. However, security system introduction and research are generally performed from the viewpoint of general IT systems and security policies, so there is little consideration of the infrastructure of the building. In particular, the BAS or building infrastructure, is a closed system, unlike typical IT systems, but has unique structural features that accommodate open functions. Insufficient understanding of these system structures and functions when establishing a building security policy makes the information security policies for the BAS vulnerable and increases the likelihood that all of the components of the building will be exposed to malicious cyber-attacks via the BAS. In this paper, we propose an architecture reference model that integrates three different levels of BAS structure (from?) different vendors. The architectures derived from this study and the security characteristics and vulnerabilities at each level will contribute to the establishment of security policies that reflect the characteristics of the BAS and the improvement of the safety management of buildings.

Analysis on Media Reports of the 「Security Services Industry Act」 Using News Big Data -Focusing on the Period from 1990 to 2021-

  • Cho, Cheol-Kyu;Park, Su-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.199-204
    • /
    • 2022
  • The purpose of this study is to broaden the understanding of the Security Services Industry Act, and also to examine the meanings of various phenomena by analyzing the media report big data rather than the researchers' perspective on the Security Services Industry Act. In the research method, this study searched for a keyword 「Security Services Industry Act」 that prescribes the security work as an important subject of crime prevention and maintenance of public order in Korea. The data was searched from 1990 to 2021 the BIG KINDS could provide. Also, for the concrete analysis during the period of data search, it was divided into settlement period(1976~2001), growth period-quantitative(2002~2012), and growth period-qualitative(2013~2021). In the results of this study, the media report perception of the Security Services Industry Act is continuously emphasizing the social roles and importance of private security according to the flow of time. The consequent marketability of private security will play great roles in the protection of people's lives and properties in the combination with various other industries in the future. However, the private security industry that provides public peace service together with the police, could be rising as an element that hinders the development of private security industry because of various social issues caused by legal regulations and illegal problems, so it would be necessary to more strengthen its responsibility and roles accordingly.

An Exploratory Study for Designing Researcher-Centric Research Security Information Requirements (연구자 중심의 연구보안 정보요구사항 설계를 위한 탐색적 연구)

  • SoYoung Han;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.11 no.1
    • /
    • pp.23-37
    • /
    • 2023
  • As the importance of R&D increases amid the paradigm of technology hegemony competition, countries around the world are increasing investment in R&D, at the same time, making effrots to portect R&D. Centering to technology-leading countries, such as Korea, the United States and Japan, they reorganize research security regulations to protect national R&D; however, the burden of compliance for researcher and research institutes is still high. Korea enacted the National R&D Innovation Act and the Enforcement Decree of the same Act to establish an integrated and systematic research security support system, but research institutes and researchers still lack understanding and practice of research security. In order to strengthen researcher's research security compliance, this study organized information requirements for each security management area through domestic and foreign research security laws and prior research analysis, and designed research security information requirements items centered on researchers. The designed information requirements are meaningful in that they were designed by considering both the management area and the stage of R&D, focusing on researchers performing R&D in the field. Based on the designed information requirements items, it is expected that systematic security management will be possible at the research site, which will ease the security burden of researchers and improve research security compliance at the research and development site.

  • PDF

An Importance-Performance Analysis of the Healthcare Reform on a Doctor-Designation System - Focused on the Perception of Medical Providers' at Tertiary Hospital in Seoul - (선택진료제도 개편에 대한 중요도-성취도 분석(IPA) - 서울시내 상급종합병원 의료종사자 인식을 중심으로 -)

  • Park, Hye Jin;Kim, Hyo Jeong;Kim, Young Hoon
    • Korea Journal of Hospital Management
    • /
    • v.23 no.1
    • /
    • pp.28-40
    • /
    • 2018
  • Purpose: The purpose is to understand the perception of medical providers at tertiary hospitals in Seoul on the importance-performance of the reform on a doctor-designation system, and to provide the policy suggestion of the perception on such a system. Methodology: To achieve the purpose, this study utilized structured survey tools to conduct a questionnaire survey of nursing, administrative and medical technology professionals at six tertiary hospitals in Seoul. An importance-performance analysis was utilized for an analysis that showed the perception of the reform on a doctor-designation system. Findings: First, it was identified that those medical providers had the highest perception of the importance about the performance of the reform on a doctor-designation system. Second, according to the result of action grid of an importance-performance analysis (IPA), it can be identified that in the 2nd stage of 'Concentrate here' included are the items as to design and effect of medical care quality and subsidies & patient infection and safety and control fees, effect of income security of the method for compensating for loss established by the government and offering sufficient information on general medical services and doctor-designation medical services. In the 1st stage of 'Keep up the Good Work', and the 2nd stage of 'Concentrate here' included is the item as to the performance of patients of the reform on a doctor designation system. Practical Implications: There could be identified the effect of the reform bill on the perception of medical providers. It is expected that a better environment would be provided for patients to use a hospital and for medical providers to offer medical services, if the goverment makes efforts to improve methods for compensating for loss and continuous monitoring of the performance of patients.