• 제목/요약/키워드: Security Initiative

검색결과 88건 처리시간 0.03초

중등학교의 보안성 평가를 위한 지표 개발에 관한 연구 (A Study on the development of metrics for security evaluation of secondary schools)

  • 고진홍;안성진
    • 한국사이버테러정보전학회:학술대회논문집
    • /
    • 한국사이버테러정보전학회 2004년도 제1회 춘계학술발표대회
    • /
    • pp.145-151
    • /
    • 2004
  • 학내 전산망은 정보의 주도로 교수학습에 필요한 네트워크 자산을 통한 교육적인 활동을 지원하기 위해서 많은 학교에 설치되었다 반면에 인터넷의 개방성과 학내 전산망의 보안 실태 때문에 내부자나 정보를 얻고자하는 하는 해커들에 의하여 상당한 피해를 당하고 있다. 그러므로, 본 연구에서는 학내 정보자산을 분류하고 보안항목 및 문제점을 제시하고 있다. 마지막으로, 정보자산의 부분별로 효율적이고 조직적으로 평가 지표를 제시하였다.

  • PDF

Smart Security 추진을 통한 인천국제공항의 미래 항공보안 구현 (Realization of Futuristic Aviation Security of Incheon International Airport by implementing Smart Security Project)

  • 임상훈;허백용;황호원
    • 한국항행학회논문지
    • /
    • 제25권6호
    • /
    • pp.492-497
    • /
    • 2021
  • Smart Security는 국제공항협의회가 전 세계 공항, 항공사, 정부 기관과 협력하여 시작한 글로벌 이니셔티브이다. 이 계획의 주요 목적은 승객과 휴대수하물의 검색에 있어 큰 변화(step change), 증가하는 보안 비용, 지속적으로 진화하는 위협 등에 대응하기 위한 것이다. 인천공항은 미래형 보안검색 구현을 위해 스마트 보안검색장비 도입을 추진하여 보안성 강화, 승객편의 및 운영효율성 향상 도모함으로 최고의 보안환경을 구축하여 테러 및 불법방해행위 방지를 위해 최선을 다 하여야한다.

소셜 네트워크 서비스 활용 수업에서의 교육적 효과 고찰 (A study of the educational effects in SNS-utilized instruction)

  • 권명순;간진숙;김진환
    • 컴퓨터교육학회논문지
    • /
    • 제17권6호
    • /
    • pp.135-146
    • /
    • 2014
  • 본 연구는 SNS를 활용한 수업에서 자기중심적 활동과 사회적 상호작용을 추가한 사회적 활동으로 구분하여 자기주도성, 정보기술에 대한 태도 및 자기효능감에 미치는 영향을 비교하였다. 연구방법은 비동등성 실험군 원시실험설계를 활용하였다. 자료 분석은 대응표본(paired t-test) 검증과 내용분석을 실시하였다. 연구결과에 의하면 SNS 수업을 활용한 자기중심적 활동은 자기주도성과 정보기술에 대한 태도에 효과가 있었으며, 사회적 상호작용이 추가된 사회적 활동은 자기주도성, 정보기술에 대한 태도 및 자기효과성에 효과가 있는 것으로 나타났다. 또한 SNS를 활용한 수업의 교육효과에 대한 내용분석에서는 정보의 공유 및 즉시성, 접근성 측면을 장점으로, 정보보안과 사생활 노출은 문제점으로 제시하였다. 즉 SNS를 활용한 수업에서 자기중심적 활동과 사회적 상호작용을 병행 할 경우, 학습자 스스로 계획하고, 실행하는 자기주도성 향상과 학업능력을 나타낼 수 있는 정보기술에 태도가 향상되고 개별 학업 만족도를 나타낼 수 있는 정보기술에 대한 자기효능감이 향상되는 것을 확인 할 수 있었다.

  • PDF

북한의 불법 해상활동에 대한 해양차단에 관한 연구 (Maritime Interdiction against the DPRK's Illicit Maritime Practices)

  • 김정수
    • Strategy21
    • /
    • 통권46호
    • /
    • pp.29-56
    • /
    • 2020
  • Despite the deep concerns against the DPRK and the harsh sanctions imposed on it, the country renders the sanctions futile by facilitating various illegal trades such as the ship-to-ship transfers of petroleum or coal. Recently, the international community went into paying attention to solve this matter. Among the measures the community can take, "reinforcing the search and inspection of the DPRK related vessels transiting in the high and territorial seas" is the best policy approach to reduce the sanction evasion and provide the international community with considerable bargaining advantages. This measure requires the forceful action by legal enforcement agencies, also known as VBSS. (Visit, Board, Search, and Seizure) It would make the deals prohibited by the UNSCRs (United Nation Security Council Resolutions) less profitable by reducing the expected return on the deals and increasing the cost for them. So, it would make the illegal deals under the table less attractive. The DPRK has been able to render the sanctions futile by exploiting the limitations of the current maritime sanctions. The resolutions are short of being specific about law enforcement, and the PSI (Proliferation Security Initiative) is legally nonbinding. However, if the UNSCRs and the PSI are combined, they can generate a new source of power and exploit the weakness of the DPRK. Noting that the recent UNSCRs stipulated all the legal discussions in the resolutions are confined and applied only to the DPRK, the PSI can target the commercial trade as well as the WMD-related materials in the case of the DPRK's illegal maritime practices. Therefore, the PSI endorsing partners should go beyond mere commitments. They should discuss action plans to implement the maritime interdictions to the extent that they discourage the DPRK and its business partners continuing the illegal activities.

미래 융합환경 기반의 정보보호 직업군 설계 (A Design on Information Security Occupational Classification for Future Convergence Environment)

  • 이윤수;신용태
    • 한국전자거래학회지
    • /
    • 제20권1호
    • /
    • pp.201-215
    • /
    • 2015
  • 정보화 시대를 넘어 융합의 시대로 나아감에 따라 고도화된 보안위협이 발생하고, 그에 따라 정보보호에 대한 필요성 및 중요성은 더욱 커져가고 있다. 그러나 그간의 국내 연구들은 정보보호 기술 직업군 위주의 단편적인 분류를 수행하고 있으며 미래 융합환경에 대한 고려가 부족한 실정이다. 따라서, 본 논문에서는 미래 융합환경에 대비한 정보보호 직업분류체계 및 필요역량을 설계하기 위해서 기존 정보보호 직업군 분류체계 및 직업군별 필요역량에 대한 선행연구 분석을 통해 정보보호 인력의 정의를 내린 후 직업군 분류를 실시하고 직업군별 필요역량을 도출하였다. 세부적으로 미래 융합환경에 대해 고려하여 정보보호 직업분류체계를 구성한 미국의 NICE(National Initiative for Cybersecurity Education)를 기반으로 하여 국내 실정에 적합한 형태로 직업군 및 직업군별 필요역량을 재분류하고 타당성을 검증하였다. 본 연구결과는 미래 융합환경에 적합한 정보보호 인력의 수급차 해소 및 처우개선을 위한 기초 자료로서 활용할 수 있을 것이다. 또한 향후 연구를 통해 정보보호 직업군별 필요역량을 이용하여 해당 직업군에 필요한 융합적인 직무역량을 습득할 수 있는 표준화된 교육 훈련방법을 마련하는데 활용할 수 있을 것으로 기대된다.

중국의 해양강국 및 일대일로 구상과 미래 한·중 협력 전망 (Implications of China's Maritime Power and BRI : Future China- ROK Strategic Cooperative Partnership Relations)

  • 윤석준
    • Strategy21
    • /
    • 통권37호
    • /
    • pp.104-143
    • /
    • 2015
  • China's new grand strategy, the "One Belt, One Road Initiative" (also Belt Road Initiative, or BRI) has two primary components: Chinese President Xi Jinping announced the "Silk Road Economic Belt" in September 2013 during a visit to Kazakhstan, and the "21st Century Maritime Silk Route Economic Belt" in a speech to the Indonesian parliament the following month. The BRI is intended to supply China with energy and new markets, and also to integrate the countries of Central Asia, the Association of Southeast Asia Nations (ASEAN), and the Indian Ocean Region - though not Northeast Asia - into the "Chinese Dream". The project will be supported by the Asian Infrastructure Investment Bank (AIIB), due to open in 2016 with 57 founding members from all around the world, and China has already promised US$ 50 billion in seed funding. China's vision includes networks of energy pipelines, railways, sea port facilities and logistics hubs; these will have obvious commercial benefits, but also huge geopolitical significance. China seems to have two distinct aims: externally, to restore its historical sphere of influence; and internally, to cope with income inequalities by creating middle-class jobs through enhanced trade and the broader development of its economy. In South Korea, opinion on the BRI is sharply polarized. Economic and industrial interests, including Korea Railroad Corporation (KORAIL), support South Korean involvement in the BRI and closer economic interactions with China. They see how the BRI fits nicely with President Park Geun-hye's Eurasia Initiative, and anticipate significant commercial benefits for South Korea from better connections to energy-rich Russia and the consumer markets of Europe and Central Asia. They welcome the prospect of reduced trade barriers between China and South Korea, and of improved transport infrastructure, and perceive the political risks as manageable. But some ardently pro-US pundits worry that the political risks of the BRI are too high. They cast doubt on the feasibility of implementing the BRI, and warn that although it has been portrayed primarily in economic terms, it actually reveals a crucial Chinese geopolitical strategy. They are fearful of China's growing regional dominance, and worried that the BRI is ultimately a means to supplant the prevailing US-led regional security structure and restore the Middle Kingdom order, with China as the only power that matters in the region. According to this view, once China has complete control of the regional logistics hubs and sea ports, this will severely limit the autonomy of China's neighbors, including South Korea, who will have to toe the Chinese line, both economically and politically, or risk their own peace and prosperity.

A Survey of Homomorphic Encryption for Outsourced Big Data Computation

  • Fun, Tan Soo;Samsudin, Azman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3826-3851
    • /
    • 2016
  • With traditional data storage solutions becoming too expensive and cumbersome to support Big Data processing, enterprises are now starting to outsource their data requirements to third parties, such as cloud service providers. However, this outsourced initiative introduces a number of security and privacy concerns. In this paper, homomorphic encryption is suggested as a mechanism to protect the confidentiality and privacy of outsourced data, while at the same time allowing third parties to perform computation on encrypted data. This paper also discusses the challenges of Big Data processing protection and highlights its differences from traditional data protection. Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.

Democratic Values, Collective Security, and Privacy: Taiwan People's Response to COVID-19

  • Yang, Wan-Ying;Tsai, Chia-hung
    • Asian Journal for Public Opinion Research
    • /
    • 제8권3호
    • /
    • pp.222-245
    • /
    • 2020
  • In the pandemic crisis, many governments implemented harsh interventions that might contradict democratic values and civil liberties. In Taiwan, the debate over whether or not to reveal personal information of infected persons to limit the coronavirus's spread poses the democratic dilemma between public health and civil liberties. This study examines whether and explains how Taiwan's people respond to the choice between individual privacy and collective security. We used survey data gathered in May 2020 to show that, first, the democratic values did not deter the pursuit of collective safety at the cost of civil liberty; rather, people with higher social trust were more likely to give up their civil liberties in exchange for public safety. Second, people who support democratic values and pursue collective security tend to avoid violating privacy by opposing the release of personal information. This study proves that democratic values do not necessarily threaten collective safety and that the pursuit of common good can co-exist with personal privacy.

미정부의 빅데이터를 위한 보안정책 (The Security Policy for Big data of US Government)

  • 홍진근
    • 디지털융복합연구
    • /
    • 제11권10호
    • /
    • pp.403-409
    • /
    • 2013
  • 본 논문은 미국 정부의 빅데이터 정책과 보안 이슈에 관해 고찰하였다. 빅데이터 R&D 이니셔티브 전략과 계획, NITRD 프로그램, 정부기관의 빅데이터 전략을 소개하였고, 또한 미군에서 빅데이터 운용환경, 군사 작전에 사용되는 빅데이터 정보, 주요 연구기관과 주제, 보안가이드라인 등에 대해 살펴보았다.

Tangible Tele-Meeting in Tangible Space Initiative

  • Lee, Joong-Jae;Lee, Hyun-Jin;Jeong, Mun-Ho;Jeong, SeongWon;You, Bum-Jae
    • Journal of Electrical Engineering and Technology
    • /
    • 제9권2호
    • /
    • pp.762-770
    • /
    • 2014
  • Tangible Space Initiative (TSI) is a new framework that can provide a more natural and intuitive Human Computer Interface for users. This is composed of three cooperative components: a Tangible Interface, Responsive Cyber Space, and Tangible Agent. In this paper we present a Tangible Tele-Meeting system in TSI, which allows people to communicate with each other without any spatial limitation. In addition, we introduce a method for registering a Tangible Avatar with a Tangible Agent. The suggested method is based on relative pose estimation between the user and the Tangible Agent. Experimental results show that the user can experience an interaction environment that is more natural and intelligent than that provided by conventional tele-meeting systems.