• Title/Summary/Keyword: Security Planning

Search Result 465, Processing Time 0.027 seconds

The Operating Status of Security Alarm Systems and the Polices for Inproving the Operational Quality (기계경비시스템 운용현황 고찰과 운용품질개선 방안)

  • Sin, Sang-Yeop
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.197-218
    • /
    • 2004
  • This study has been conducted to provide data that contribute to increasing efficiency of 'Private Security', which is cooperated by customer, security companies and the police which carried out 'Public Law Enforcement' and controls security companies. To reach this purpose, we investigated the status of the 'Security Alarm Systems' operated by security service companied in Korea, analyzed arising problems, considered the polices for improving the operational quality. 'Electronic Security Systems' will increase working efficiency in performing 'Private Security'. There can be no two opinions on this matter. Therefore, it can be supposed that the improvement of operational quality of 'Electronic Security System' is an important factor to accomplish security services. 'Security Alarm System' is one of the 'Electronic Security System'. The critical problems in operating 'Security Alarm system' are unnecessary response by false alarm and nuisance alarm. To reduce the problems, it is suggested that security specialist officially licensed should improve security planning, installation and maintenance, and the 'Alarm Verification System' should be introduced with appropriate facilities.

  • PDF

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.2
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Stepwise process of Military force acquisition strategy considering Defense Planning and Management System (국방기획관리체계를 고려한 단위사업획득전략의 단계화 작성방안 - '사업추진기본전략'을 중심으로 -)

  • Shin, Hee-Rae
    • Journal of National Security and Military Science
    • /
    • s.13
    • /
    • pp.109-136
    • /
    • 2016
  • Define the importance and role of the acquisition strategy based on the Defense Acquisition Management System, diagnose and analyze the actual state of document preparation. We analyzed the timing and details of the basic strategy of the project in 2015 and suggested a supplementary plan to improve the efficiency of Military force improvement projects in conjunction with the Defense Planning and Management System. It is necessary to reduce the preparation period including the policy decision making process and then divide it into planning and programming stages to complement the role of acquisition strategy. In order to apply these improvements, the necessary revision of laws and regulations to be reviewed is referred to, enabling continuous research.

  • PDF

Policy Plans for the Maintenance of Public Security of Living During the War (전시 국민생활안정 유지방안)

  • Kil, Byung-Ok
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.131-172
    • /
    • 2007
  • Government duties in the cases of crisis are aimed at supporting efficient military operations in the fields of non-military affairs and resource mobilization, maintenance of government functions, and search for the public security of living during the war. In crisis, the government must change its functions into the total-war system with all resources available for the efficient performance of military operations, war economy, public safety and security as well as government continuance. The main contents of "Chung-Mu Plan" include the alternative measures to control the circulation of life necessities, emergency electricity, water and gas; recover public facilities from the disaster; and accommodate the wounded and refugees. Governments have practiced Ul-chi and ChungMoo exercises to improve government's management capabilities and master standard operating procedures including systematic distribution plans in the national and local level. However, such plans have not yet sufficient enough for the maintenance of public security of living. In addition to the conceptual ambiguity, major problems are the inappropriate system of the war economy, legal institutions, and administrative SOPs for the efficient maintenance of it. Thus, for the betterment of national crisis management system, the government should have the manual stated from every step and level dealing with crisis to the legal institutions. It is important to empower the National Emergency Planning Commission for the policy consistency and efficient/effective implementation. The comprehensive plans must have an integrated cooperative system of the central/local governments, military and civil society with actual practices and exercises for the maintenance of the public security of living.

  • PDF

A Study on the Interior Environmental Planning Factors for Improving Safety and Security in Early Children Facilities (안전성 향상을 위한 유아시설 실내환경 계획요인에 관한 연구)

  • Byun, Gi-Dong;Kwon, Ju-Yeong;Ha, Mi-Kyoung
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.2
    • /
    • pp.197-205
    • /
    • 2015
  • Recently in most homes, children are mostly cared in early childhood education facilities. However, the increased number of safety accidents on children cared in such facilities has become a social issue. For that, the purpose of this study is to suggest interior environmental planning elements to improve safety level of early childhood education facilities. This study was carried out by performing literature review analysis and survey. First, in total of 42 environmental planning elements that can be applied domestically were derived from analyzing safety related guidelines for children facilities located both domestically and internationally then a survey was carried out targeted for teachers and staffs in the facilities on importance of the factors. The results of this study are as followings. First, it is required to intensify the level of safety related training for teachers and staffs in the facilities including better treatment for them. Second, the necessity of safety environment by each space in such facilities is required to be approached upon the level of child activities. Third, facilities planning and finalizing planning are important for improving safety of early childhood education facilities. Forth, from factor analysis on the extracted environmental planning elements that are considered as important by the teachers from both day care centers and kindergartens, they were categorized in 5 groups including 'collision and fall prevention plan', 'physical characteristic consideration plan', 'evacuation safety plan', 'lock security plan' and 'outer control plan'. It is fair to say that constructing a better safety environment for children can be achieved by the environmental planning factors by this study.

Analysis of the Importance and Priority of HRM Factors in Private Security (민간경비 인사업무의 중요도 및 우선순위에 대한 고찰)

  • Kwon, Jung-Eon
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.55-81
    • /
    • 2018
  • The purpose of this study is to find significant activities in human resource management (HRM) to solve growing-pains caused by the rapid external growth in private security business. To this end, we applied the HRM factors suggested by the National Job Capability Standard (NCS) to the private security and investigated the relative importance using the Analytic Hierarchy Process (AHP). The results were as follows. First, the importance of 4 HRM criteria in the private security was ranked in order of recruitment, operation, benefit, and retirement. Particularly, the relative importance of recruitment reached 63.8%. Second, the composite importance was calculated by dividing the 4 HRM criteria into 14 capability sub-criteria and 46 capability alternatives. As a result, personnel planning and hiring at the recruitment turned out as the areas that needed the most improvement. In addition, the operating and planning of education involved in the highest rank, 8th and 10th respectively. Based on these results, we suggested critical HRM factors for developing the private security business as well as proposed research directions and methods for further studies.

A Parallel Approach to Navigation in Cities using Reconfigurable Mesh

  • El-Boghdadi, Hatem M.;Noor, Fazal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.1-8
    • /
    • 2021
  • The subject of navigation has drawn a large interest in the last few years. Navigation problem (or path planning) finds the path between two points, source location and destination location. In smart cities, solving navigation problem is essential to all residents and visitors of such cities to guide them to move easily between locations. Also, the navigation problem is very important in case of moving robots that move around the city or part of it to get some certain tasks done such as delivering packages, delivering food, etc. In either case, solution to the navigation is essential. The core to navigation systems is the navigation algorithms they employ. Navigation algorithms can be classified into navigation algorithms that depend on maps and navigation without the use of maps. The map contains all available routes and its directions. In this proposal, we consider the first class. In this paper, we are interested in getting path planning solutions very fast. In doing so, we employ a parallel platform, Reconfigurable mesh (R-Mesh), to compute the path from source location to destination location. R-Mesh is a parallel platform that has very fast solutions to many problems and can be deployed in moving vehicles and moving robots. This paper presents two algorithms for path planning. The first assumes maps with linear streets. The second considers maps with branching streets. In both algorithms, the quality of the path is evaluated in terms of the length of the path and the number of turns in the path.

Exploring the Association between Board Structure and Information Security Breaches

  • Hsu, Carol;Wang, Tawei
    • Asia pacific journal of information systems
    • /
    • v.24 no.4
    • /
    • pp.531-557
    • /
    • 2014
  • Although the area of information security planning and management has gained an increased attention, not much discussion was available on the role and the impact of the board members towards a firm's security management and governance decisions. In this research, we draw on corporate governance and the organizational demography literature to conduct an exploratory empirical study on the association between the board structure of a firm and the possibility of information security breaches. Our results show that the board size, the average age/tenure and the heterogeneity of age could reduce the possibility of security breaches while the proportion of independent directors and the heterogeneity of tenure could increase it. Our findings shed lights on the important role played by the board when managing information security risks in organizations.

Comparing Zoom's Security Analysis and Security Update Results (줌의 보안 취약점 분석과 보안 업데이트 결과 비교)

  • Kim, Kyuhyeong;Choi, Younsung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.55-65
    • /
    • 2020
  • As corona began to spread around the world, it had such a big impact on many people's lives that the word "Untact Culture" was born. Among them, non-face-to-face meetings naturally became a daily routine as educational institutions and many domestic and foreign companies used video conferencing service platforms. Among many video conferencing service platforms, Zoom, the company with the largest number of downloads, caused many security issues and caused many concerns about Zoom's security. In this paper, Zoom's security problems and vulnerabilities were classified into five categories, and Zoom's latest update to solve those problems and the 90-day security planning project were compared and analyzed. And the problem was solved and classified as unresolved. Three of the five parts have been resolved but are still described as how they should be resolved and improved in the future for the two remaining parts.