• Title/Summary/Keyword: Security Navigation

Search Result 380, Processing Time 0.022 seconds

Government Information Security System with ITS Product Pre-qualification (사전 검증을 통한 행정정보보호시스템 도입 방안)

  • Yeo, Sang-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.763-772
    • /
    • 2009
  • According as information-oriented society is propelled, development of various information security systems is achieved, and introduction of information security system is increasing for service offer securing from nation and public institution. In particular, government information system is increasing interest about security assessment service of government information system because verification about security is weighed first of all. Accordingly, study about various security assessment services is preceded in domestic and overseas. In this paper, analyze security assessment service of Britain and Canada, and we proposed about pre-qualification introduction plan of government information system that can offer user of nation and public institution reliability.

  • PDF

A Study on Method for Network Security Measurement (네트워크 보안성 측정방법에 관한 연구)

  • Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.79-86
    • /
    • 2007
  • In recent, one of the interesting research areas is about quality of network system. Therefore many research centers including ISO are preparing the measuring and evaluating method for network quality. This study will represent an evaluating model for network security based on checklist. In addition, we propose an measuring and evaluating method for network performance. The purpose of two studies is to present the evaluating procedure and method for measuring security of network on set workwill be identified and a measuring method and procedure will be proposed.

  • PDF

Relative priority evaluation of security attributes in cloud computing using fuzzy AHP (Fuzzy AHP를 적용한 클라우드 컴퓨팅 환경에서 보안 속성의 상대적 중요도 평가)

  • Choi, Cheol-Rim;Song, Young-Jae
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1098-1103
    • /
    • 2011
  • In spite of many advantages of cloud computing, security concerns are a barrier in users' adopting the cloud service. In this paper, we evaluate relative priorities between security attributes of ISO 7498-2 standards affecting overall security quality in cloud computing. For an objective evaluation, the fuzzy AHP(Analytic hierarchical process) is applied. The evaluation results represented the relative priority with concrete number can be an effective management method to choose and develop the cloud computing service.

A Study on the Difference between Security Monitoring and Wiretap (보안 모니터링과 감청의 차이점에 관한 연구)

  • Hong, Chang-Hwa;Choi, Min-Kyu;Kim, Tai-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.104-112
    • /
    • 2009
  • Even though security monitoring and wiretap seem to be same things from the current legal point of view, these two concepts are different. But because the researches related to the differences between wiretap and security monitoring, there are some confusions about these concepts, so there are some side effects. In this paper, we try to explain the differences between wiretap and security monitoring in the aspects of object, scope, target and application method.

  • PDF

A Study on Risk Management for Export Control on Strategic Trade in Supply Chain Management

  • Roh, Tae-Hyun;Park, Jin-Hee
    • Journal of Navigation and Port Research
    • /
    • v.37 no.6
    • /
    • pp.709-718
    • /
    • 2013
  • In this study, AHP analysis was conducted through a survey that was organized by 9 job categories. The results show that sustainable operation risks have the highest priority level among all criteria with management interest having the highest priority level within sustainable operation risks related attributes. The most important risk attributes among stakeholder risks appeared to be asset security and cargo and conveyance security, with education and training being the most important among regulatory risks. Effective management and response to the risks from export controls on strategic trade require an understanding of supply chain security and compliance programs, effective training programs, investments for development of security systems that meet international standards. In addition, the government needs to focus on developing professionals and providing support for companies with compliance programs, working closely with businesses.

The Case Study on Weighted DB Security Appliance Development (Light Weighted DB 보안 어플라이언스 개발 사례 연구)

  • Seo, Yang-Jin;Lee, Jae-Pil;Lee, Chang-Hoon;Chang, Hang-Bae
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.397-408
    • /
    • 2010
  • SMEs (Small and Medium-sized Enterprise) have became competitive by improvement of work efficiency due to utilization of DBMS, which is mainly used among large enterprises, but reverse functions such as security events and vulnerabilities have been increasing. SMEs without enough investment on security infrastructure have difficulties with implementing DB security products. Therefore the most of SMEs are exposed to hacking and security accidents defensivelessly. Hence this study offers distributional H/W DB security solution which is affordable for SMEs.

A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services (신규 IT 서비스에 대한 정보보호 등급 인증 타당성 연구)

  • Chang, Hang Bae;Joe, Tae Hee;Kim, Hyo Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.113-119
    • /
    • 2009
  • In this study we analyzed and gauged the information security needs for the new IT service which will be proceeding. Then we designed Information Security Rank Authentication System to raise the level of information security. To achieve this study, we analyzed rank authentication system of the inside and outside of the country and developed the practical propulsive system and the evaluation model which reflects IT service's own feature differing from the general evaluation of IS information security. The result of this study can be utilized to assess the level of domestic IT service information security objectively, and it can be applied as the means of rational decisionmaking for establishing a policy to raise degree of information security of corporations providing IT service.

  • PDF

A Exploratory Study on R&D Strategies Industrial Technology Security (산업기술 보호를 위한 기술적 보안의 탐색적 연구)

  • Kim, Kyung-Kyu;Choi, Seo Yun;Hur, Sunghye
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.120-125
    • /
    • 2009
  • To enhance international competitiveness through the protection of cutting-edge industrial technology, it is essential to establish the policy for strengthening ability to develop industrial security technology and raising international competitiveness. In this study we investigated and analysed not only the ecumenic trend but also the present condition, then we executed the deduction of the industrial security technology development program in a aspect of government and analysed the current status of the technical security technology for developing security technology and increasing leaks of the advanced industrial technology.

  • PDF

A Study on Cyber Security Management Awareness of Vessel Traffic Service Personnel Using IPA (IPA분석을 활용한 해상교통관제 인원의 사이버 보안 관리 인식 연구)

  • Sangwon Park;Min-Ji Jeong;Yunja Yoo;Kyoung-Kuk Yoon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.7
    • /
    • pp.1140-1147
    • /
    • 2022
  • With the development of digital technology, the marine environment is expected to change rapidly. In the case of autonomous vessels, technology is being developed in many countries, and the international community has begun to discuss ways to operate it. Changes in ships cause changes in the marine traffic environment and urge changes to aids to navigation. This study aims to analyze the cyber security management awareness of VTS personnel to improve the cyber security system for aids to navigation. To this end, the current status of cyber security management was reviewed with a focus on VTS, and a survey was conducted on VTS personnel. The survey analysis used the IPA methodology, and as a result of the analysis, a clear difference was observed in the perception of cybersecurity between those with experience in security and those without experience. In addition, technical measures related to cyber-attack detection and blocking should be implemented with the highest priority. The results of this study can be used as basic data for improving the cyber security management system for aids to navigation.

Design of OpenAPI for Application of Maritime Traffic Data (해상교통데이터 활용을 위한 OpenAPI 설계)

  • Kim, Juyoung;Lee, Byunggil;Chung, Byungho;Shin, Sang Uk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.522-524
    • /
    • 2016
  • E-Navigation is required port operation for effective and safety. Maritime traffic data must be exchanged between Vessel Traffic Service Center and ship for e-navigation build. In this paper, We designed Open API system for the exchange and use of maritime traffic data. This system provide Open API data to $3^{rd}$ party.

  • PDF