• Title/Summary/Keyword: Security Manager's

Search Result 111, Processing Time 0.025 seconds

A Study of the Security and Secretary Service's Roles (경호비서의 역할에 관한 연구)

  • Kim, Jung-Suk;Park, Aok-Cheol
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.65-80
    • /
    • 2006
  • Security and Secretary Service is the man who maintains safe condition of boss', following him during all daily schedule and help the boss display his supreme business abilities, settling various affairs The purpose of this study is to examine the role of Security and Secretary Service. To understand the role of Security and Secretary Service, interviews with Security and Secretary Service's. synthesizing records inquire and interviews with present workers, was analyzed. As results of the study, the open coding of grounded theory was 85 categories, 22 lower categories, and 13 upper categories; 7 roles of Security and Secretary Service types out of 13 upper categories were attained. Based on this, from the axial coding a paradigm model related to categories was produced and selective coding the core category, story line development and type were analyzed. Therefore, Security and Secretary Service plays roles: Office manager, Training manager, Information manager, Customer relations manager, Facilitator, Health manager, and Safety manager. Compared with Office secretary, It is said that Health manager, and Safety manager are distinguishing roles. Through the coding process based on grounded theory. For this, based on the writer's theoretical sensitivity and constant comparative analysis, theses as well as writing in each field, data from serial publications and others, the statements of interview subjects were constantly compared and analyzed. Based on these analyses, this study suggests the following: First, the intimidate sample survey is need. Second, professional educational content during the training process of Security and Secretary Services should be strengthened. Third, to expect a more professional role of Security and Secretary Services. the systematic support will be required.

  • PDF

A Study on Service Security Framework for SW-IaaS Cloud (SW-IaaS 클라우드 서비스 보안 프레임워크에 관한 연구 - SW-IaaS를 중심으로)

  • Choi, Myeonggil;Park, Choonsik;Jeong, Jaehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.319-325
    • /
    • 2016
  • Cloud computing-related security incidents have occurred recently are beyond the scope of a enterprise's security incident is expanded to the entire range of customers who use the cloud computing environment. The control technology for the overall integrated security of the cloud data center is required for this purpose. This study research integrated and additional security elements for the cloud data center control to understand the existing control technology. It is a better understanding of the IaaS cloud environment to build the IaaS cloud environment by CloudStack. SW-IaaS cloud structure by combining CloudStack and IaaS cloud model presented by NIST is proposed in this study. This paper derive a security framework to consider in each layer of The SW-IaaS cloud components, which are composed of the Cloud Manager, Cluster Manager, and Computer Manager.

Computer Security for Application in the RFID/USN Middleware (RFID/USN 미들웨어에서의 응용S/W 보안)

  • Yang, Seok-Hwan;Lee, Ki-Yeal;Chung, Mok-Dong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.84-88
    • /
    • 2007
  • 최근 다양한 분야에서 안전한 RFID 애플리케이션 개발에 대한 필요성이 증가함에도 불구하고 초기의 많은 개발 비용과 전문적 보안 지식의 부재로 인해 중소 규모의 기업체에서는 안전한 애플리케이션 개발이 어려운 상황이다. 본 논문에서는 쉽고 효율적으로 RFID 미들웨어에 보안기능을 구현할 수 있는 Security Manager를 제안한다. Security Manager는 다양한 암/복호화 알고리즘을 제공하며 새로운 알고리즘을 구현할 경우 쉽게 Security Manager에 추가 및 확장이 가능하다. 또한 Security Manager는 Diffie-Hellman 키 일치 알고리즘, PKI 환경 구축 밀 인증기능을 제공한다. Security Manager는 API형태로 제공되므로 적은 비용으로 쉽고, 효율적으로 RFID 미들웨어에 보안기능을 제공할 수 있으며 개발자가 보인 전문지식이 부족하더라도 API를 이용하여 쉽게 보안 애플리케이션 작성이 가능하다.

  • PDF

A Study on Architecture of Access Control System with Enforced Security Control for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 보안통제가 강화된 접근제어 시스템 설계에 관한 연구)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.71-81
    • /
    • 2008
  • In the paper, we designed a context aware task-role based access control system(CAT-RACS) which can control access and prevent illegal access efficiently for various information systems in ubiquitous computing environment. CAT-RACS applied CA-TRBAC, which adds context-role concept for achieve policy composition by context information and security level attribute to be kept confidentiality of information. CA-TRBAC doesn't permit access when context isn't coincident with access control conditions, or role and task's security level aren't accord with object's security level or their level is a lower level, even if user's role and task are coincident with access control conditions. It provides security services of user authentication and access control, etc. by a context-aware security manager, and provides context-aware security services and manages context information needed in security policy configuration by a context information fusion manager. Also, it manages CA-TRBAC policy, user authentication policy, and security domain management policy by a security policy manager.

Multi-Attribute Threat Index for Information Security : Simulation and AHP Approach (정보보호를 위한 다속성 위협지수 : 시뮬레이션과 AHP 접근방법)

  • Lee, Kang-Soo;Kim, Ki-Yoon;Na, Kwan-Sik
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.117-130
    • /
    • 2008
  • Multi-attribute risk assessments provide a useful framework for systematic quantitative risk assessment that the security manager can use to prioritize security requirements and threats. In the first step, the security managers identify the four significant outcome attributes(lost revenue, lost productivity, lost customer, and recovery cost). Next. the security manager estimates the frequency and severity(three points estimates for outcome attribute values) for each threat and rank the outcome attributes according to AHP(Analytic Hierarchy Process). Finally, we generate the threat index by using muiti-attribute function and make sensitivity analysis with simulation package(Crystal Ball). In this paper, we show how multi-attribute risk analysis techniques from the field of security risk management can be used by security managers to prioritize their organization's threats and their security requirements, eventually they can derive threat index. This threat index can help security managers to decide whether their security investment is consistent with the expected risks. In addition, sensitivity analysis allows the security manager to explore the estimates to understand how they affect the selection.

Design of Intrustion Prevention System(IPS) in Linux Environment (리눅스 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.1-7
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing Power. while in Previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, Political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

Design of Intrusion Prevention System(IPS) in Linux Environment (Linux 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.21-26
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing power. while in previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately. That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

A LOW-COST PROTOCOL IN SENSOR NETWORK UBIQUITOUS ENVIRONMENT

  • Lee Dong-heui;Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.766-769
    • /
    • 2005
  • In a ubiquitous environment made up of multiple sensors, most sensors participate in communications with limited battery, and the sensor node isn't able to participate in communications when all the battery is used up. When an existing authentication method is used for the sensor node which has to participate in a long term communication with limited battery, it creates a problem by making the length of network maintenance or sensor node's operation time relatively shorte. Therefore, a network structure where RM (Register Manager) node and AM (Authentication Manager) node are imported to solve the energy consumption problem during a communication process is presented in this thesis. This offers a low power protocol based on safety through a mutual authentication during communications. Through registration and authentication manager nodes, each sensor nodes are ensured of safety and the algorithm of key's generation, encryption/descramble and authentication is processed with faster operation speed. So the amount of electricity used up during the communications between sensor nodes has been evaluated. In case of the amount of electrical usage, an average of $34.783\%$ for the same subnet and 36.855 for communications with two different subnets, are reduced. The proposed method is a protocol which maintains the limited battery for a long time to increase the effectiveness of energy usage in sensor nodes and can also increase the participation rate of communication by sensor nodes.

  • PDF

A Study on the Effect of Leadership Type of Police Manager on Working Attitude of Policeman (경찰관리자의 리더십 행동유형이 경찰관의 직무태도에 미치는 영향에 관한 연구)

  • Lee, Sang-Won
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.257-280
    • /
    • 2004
  • This study has purpose on revealing with corroborative evidence how police manager's leadership type effects on working attitude of policeman. This study is composed of the introduction in the first chapter, theological consideration of leadership and working attitude in the second chapter, research plan and analysis in the third chapter and finally the conclusion in the fourth chapter. For the political suggestion, the program's operated by police organization can be altered its efficiency by organizing groups applying what kind of leadership to how it wed. Considering to its characteristic of police organization, the leadership is not only important factor effecting on outcome of organization but also core activity achieving the goal of organization to police manager.

  • PDF

A study on the Relationship between Organizational Member′s Information Security Mind and Organizational Information Security Level (조직구성원의 정보보안 의식과 조직의 정보보안 수준자의 관계 연구)

  • 정해철;김현수
    • The Journal of Information Technology and Database
    • /
    • v.7 no.2
    • /
    • pp.117-134
    • /
    • 2000
  • This study examines the relationship between the organizational member's information security mind and organizational information security level. The influential relationships among organizational members' information security mind are investigated, and the relationship between organization's information security level and information security mind has been analyzed. As a result, too manager's information security mind is shown to give the biggest influence to other group in the organization. A strong positive correlation exists between organizational member's information security mind and the level of organization's physical, technical, managerial information security. However, there is no significant difference in information security level by types of business. In the future, a more profound study on information security mind is necessary. And alternative methods of information security level estimation need to be studied.

  • PDF