• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.032 seconds

A Study on the Assessment Measures for Availability of Information Assets (정보 자산에 대한 가용성 평가 방안에 관한 연구)

  • Kim, MinSu;Lee, Byoungcheon
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.53-58
    • /
    • 2020
  • In this study, it suggests the High Availability (HA) implementation plan of building a continuous service infrastructure as a strategy ensuring availability, as the importance of availability securing corporate business continuity emerges in the knowledge and information society. However, if the reliability of the criticality assessment of information asset is not ensured, it requires assessment measures for availability that can be managed by mapping with service maintenance assessment items, which are availability criteria based on the asset criticality evaluated through the asset value matrix because it is difficult to maintain security in conjunction with the value of real assets. Therefore, this study suggests the assessment measures for availability of information assets.

A Study on the Factors Affecting the Establishment of Personal Information Management Systems (PIMS)

  • Seo, Young-Soo;Lee, Seong-Il;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.3
    • /
    • pp.31-47
    • /
    • 2012
  • As the dependence on information is increasing, the protection of personal information (PI) becomes a critical issue for the organizations, causing not only financial loss but also negative impacts on corporate images and reputations. To date, academic research in this area is scarce. This study analyzes the factors affecting the establishment and/or implementation of Personal Information Management System (PIMS) and provides direction for the practice. In this study, we assume that PIMS is one of the new technology adopted by organizations, and Unified Theory of Acceptance and Use of Technology (UTAUT) model is selected as a base model for the study. Using structural equation modeling technique, both measurement and structural models are validated, and hypotheses are tested. Major findings of the study include (1) the major driver of the organizations attempting to adopt PIMS seems to be the improvement of the business outcomes, (2) organizational capability and resource are important in the establishment of PIMS, and (3) the perceived difficulty of the establishment of PIMS is not affecting the intention to adopt PIMS. Since the importance of personal information security is high, establishment of PIMS is becoming one of the critical issues in the organizations. The establishment of PIMS should be encouraged to strengthen the competitiveness of businesses and to enhance the security level of the entire nation. It is expected that this study may contribute to developing plans and policies for establishment of PIMS in practice, and to providing a foundation for further research in this area.

The Social Security Pension Reform Debate between the World Bank and the ILO/ISSA (World Bank와 ILO/ISSA의 사회보장연금 민영화 논쟁에 관한 연구)

  • Won, Seok-Jo
    • Korean Journal of Social Welfare
    • /
    • v.46
    • /
    • pp.290-318
    • /
    • 2001
  • In 1981, Chile has fundamentally reformed the public pension system from the pay-as-you-go system (PAYGs) to the full funding defined contribution system managed by the private funding companies. The Chilean privatization reform influenced not only the neighbor South American countries but also the advanced countries. The United Kingdom contracted out the state earning related pension system. Australia and Sweden recently introduced the private investment accounts system. And now the hot debates on the privatization of the social security pension is going on in the United States of America. This wind of privatizing the public pension system is being backed up by the New Liberalism, the nowadays' strongest ideology. Besides, the theoretical and idealogical debate between the World Bank and the ILO/ISSA was happened in the middle of 1990s. The World Bank, the supporter of the international financial capital, insisted the introducing of the full funding individual accounts system and the abolition of the existing PAYGs. The ILO/ISSA apposed the World Bank's policies and advocated the moderate reform of the PAYGs. In this paper, I reviewed the Chilean reform, the World Bank's report and the opposing argument of the ILO/ISSA against it, and analysed the core issues of the two sides. Also, I tried to present the suggestions to the Korean public pension systems. Through the discussing the debate, we made certain of the importance of the basic issues in the social security system like equity vs. adequacy, inter-generational redistribution vs. intra-generational redistribution and welfare vs. economy, once again.

  • PDF

Design and Implementation of a Real-time Integrated Analysis Framework based on Multiprocessor Search Modules against Malicious Codes (악성코드 대응 MPSM기반 실시간통합분석체계의 설계 및 구현)

  • Moon, Yoon Jong
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.69-82
    • /
    • 2015
  • This dissertation introduce how to react against the cybercrime and analysis of malware detection. Also this dissertation emphasize the importance about efficient control of correspond process for the information security. Cybercrime and cyber breach are becoming increasingly intelligent and sophisticated. To correspond those crimes, the strategy of defense need change soft kill to hard kill. So this dissertation includes the study of weak point about OS, Application system. Also this dissertation suggest that API structure for handling and analyzing big data forensic.

Performance Comparison of Security System with Various Collaboration Architecture (다양한 연동 구조를 통한 보안 시스템의 성능 비교)

  • 김희완;서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.235-242
    • /
    • 2004
  • As e-business being rapidly developed the importance of security is on the rise in network. Intrusion detection systems which are a core security system detect the network intrusion trial. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network and the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) and CNP (Contract Net Protocol) for detecting intrusions. In this paper, we propose the effective method comparing the blackboard architecture to contract net protocol.

  • PDF

Block Based Blind & Secure Gray Image Watermarking Technique Based on Discrete Wavelet Transform and Singular Value Decomposition

  • Imran, Muhammad;Harvey, Bruce A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.883-900
    • /
    • 2017
  • In this paper block based blind secure gray image watermarking scheme based on discrete wavelet transform and singular value decomposition is proposed. In devising the proposed scheme, security is given high importance along with other two requirements: robustness and imperceptibility. The use of discrete wavelet transform not only improves robustness but the selection of bands with high tolerance towards noise caused an improvement in terms of imperceptibility. The robustness further improved due to the involvement of singular vectors along with singular values in watermark embedding and extraction process. Finally, to achieve security, the selected DWT band is decomposed into smaller blocks and random blocks are chosen for modification. Furthermore, the elements of left and right singular vectors of selected blocks are chosen based on their dependence upon each other for watermark embedding. Various experiments using different images as host and watermark were conducted to examine and validate the proposed technique. Additionally, the proposed technique is tested against various attacks like compression, affine transformation, cropping, translation, X shearing, scaling, Y shearing, filtering, blurring, different kinds of noises, histogram equalization, rotation, etc. Lastly, the proposed technique is compared with state-of-the-art watermarking techniques and their comparison shows significant improvement of proposed scheme over existing techniques.

Intrusion Detection System based on Cluster (클러스터를 기반으로 한 침입탐지시스템)

  • Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.10 no.3
    • /
    • pp.479-484
    • /
    • 2009
  • Security system of wireless network take on importance as use of wireless network increases. Detection and opposition about that is difficult even if attack happens because MANET is composed of only moving node. And it is difficult that existing security system is applied as it is because of migratory nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system using cluster head in order to detect malicious attack and use resources efficiently. we used method that gathering of rules is defined and it judges whether it corresponds or not to detect intrusion more exactly. In order to evaluate performance of proposed method, we used blackhole, message negligence, jamming attack.

  • PDF

World Food Perspective and Food Security in Korea (세계 식량전망과 한국의 식량대책)

  • Kim Kwang Ho
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 1998.10a
    • /
    • pp.189-209
    • /
    • 1998
  • Food resources have been supplied more and more by crop land expansion, technological Improvement for higher crop yield, establishment of irrigation system, and input of fertilizers, chemicals and others, to sustain a world population increase currently about 6 billion. Food demand will be significantly increased in the 21st century due to population increases of 90 million per year and more consumption of meat with per capital income increase. But food production increase will be limited by difficulty of crop/irrigation land expansion and small or decreasing effectiveness of fertilizer use. Development of new techniques for higher yield per ha is only one way to meet future food demand increase. Optimistic prospect for food demand/supply balance was reported by FAO until 2010, and IFPRI until 2020. However, Worldwatch Institute warned world food supply will be less than expected demand by 500 million tons of cereal grains in 2030. It is necessary to establish a national plan to meet expected worldwide shortage of food resources in 21 century. What planning should be under taken to meet the upcoming century of food shortage in Korea whose food self-sufficiency rate is only $30{\%}$. It is recommended that (1) keep paddy field area as much as 1,100 thousand ha, (2) expansion of barley and wheat cultivation on all paddy area in winter season, (3) continue development of new technology to get international superiority of food resources produced in Korea, (4) expand nationwide the importance of food security under the current financial crisis encountered In Korea, and for food security in the future unified Korean peninsula.

  • PDF

A study on the improvement of BCM industry through legal systems (BCM(재해경감활동관리)산업 활성화를 위한 법·제도 개선 방안 연구)

  • Han, Jong-U
    • Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.93-100
    • /
    • 2015
  • Although many years passed since 'The Legislative bill on the support of voluntary activities of enterprises for disaster reduction'(hereinafter referred to as 'enterprise disaster reduction act') has been first enacted in 2007, BCMS is still not activated in our society. In contrast, after 911 Terror, importance of BCM is getting magnified and standardization research & institutionalization i s a lso proceeding i all over world. Lately, Disaster preventing activities is urgently needed like the sinking of 'Sewol ferry'. So the purpose of this paper is proposed for establishment of 'BCMS' and activation of the certificate system for Best-Run Business by analyzing the problem of 'enterprise disaster reduction act' and weak of activation as following. First, propel changing the policy of self-regulated participation to mandatory about the certificate system for Best-Run Business from public entity to government ministry and it is able to activate by propelling demo business of the certificate system for Best-Run Business. Second, public entity that has been given the certificate system for Best-Run Business by affiliating with Disaster Management Assessment of government management can be exempted from Disaster Management Assessment or those entity can arrange for connectivity acquisition method of 'Excellent rate'. Third, to publicize the activation of the law mentioned above, makes public entity r ecognizable by incorporating 'BCMS' into National safety management plan and establishment of National critical infrastructures security plan. Fourth, it should be reviewed to improving the related act regarding to inclusion of public organizations as well as private enterprises.

  • PDF

Quality Evaluation Model on Information Protection Product (정보보호제품 품질 평가 모델에 관한 연구)

  • Yoon, Hyung-Deuk;Lee, kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1535-1547
    • /
    • 2017
  • The purchase of information protection products accounts for the largest portion of corporate information protection activity budgets. However, there are no evaluation factors and evaluation models that should be applied to objectively compare information protection products, and therefore, product selection is difficult. Therefore, in this study, we study the inherent quality characteristics of information security products and select evaluation factors accordingly. The selected evaluation factors are analyzed and a quality determination model is given by weighting according to importance. The target is limited to the network information protection product and can be extended to all information protection products.