• Title/Summary/Keyword: Security Planning

Search Result 465, Processing Time 0.024 seconds

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.

An Offensive Change of Japan's Defense Strategy and Strategic Implication to the South Korea Navy: Focusing on the Japan's Amphibious Rapid Deployment Brigade Creation (일본 방위전략의 공세적 변화가 한국 해군에 주는 전략적 함의 - 일본 '수륙기동단(水陸機動團)' 창설에 대한 분석을 중심으로 -)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.42
    • /
    • pp.83-113
    • /
    • 2017
  • After defeat in World War II, Japan's Peace Constitution committed the country to forego the acquisition of offensive military capabilities. However, in the midst of the post-cold war period, Japan began to change its security posture in line with the so-called 'normal state theory', which called for a more robust defense posture and expanded security activities. The second Abe administration promoted these security policies by issuing a National Security Strategy as well as a new National Defense Program Outline(NDPO) in 2013 and by establishing new security institutions such as the National Security Council. The Abe administration also adopted the new concept of a 'Unified Mobile Defense Force' in the 2013 which replaced the 'Dynamic Defense Force' as a new criteria for the Self-Defense Force's acquisition of military capabilities. In this new concept of military capabilities, the Ground Self-Defense Force is planning to replace existing divisions with mobile divisions and to form 'Amphibious Rapid Deployment Bridge' for the first time in 2018, which has long been taboo in Japan. Japan has experience a Marine Corps in the past. Likewise, an offensive changes in the military strategy can change the spectrum of strategy and 'Amphibious Rapid Deployment Bridge' plays a big role in this. Furthermore, Japan is increasing the Coast Guard's budget and capabilities in preparation for contingencies around the Senkaku islands (called the Diaoyu in Chinese). The South Korea navy should utilize Japan's changing security posture to deter immediate threat such as North Korea's military provocations and potential enemy threat such as China, Japan, Russia.

Structural Dashboard Design for Monitoring Job Performance of Internet Web Security Diagnosis Team: An Empirical Study of an IT Security Service Provider

  • Lee, Jung-Gyu;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.113-121
    • /
    • 2017
  • Company A's core competency is IT internet security services. The Web diagnosis team analyzes the vulnerability of customer's internet web servers and provides remedy reports. Traditionally, Company A management has utilized a simple table format report for resource planning. But these reports do not notify the timing of human resource commitment. So, upper management asked its team leader to organize a task team and design a visual dashboard for decision making with the help of outside professional. The Task team selected the web security diagnosis practice process as a pilot and designed a dashboard for performance evaluation. A structural design process was implemented during the heuristic working process. Some KPI (key performance indicators) for checking the productivity of internet web security vulnerability reporting are recommended with the calculation logics. This paper will contribute for security service management to plan and address KPI design policy, target process selection, and KPI calculation logics with actual sample data.

Risk-based Security Impact Evaluation of Bridges for Terrorism (Security and Risk를 기반으로 한 교량구조물의 재난 안전성 평가)

  • Kang, Sang-Hyeok;Choi, Hyun-Ho;Seo, Jong-Won
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.629-632
    • /
    • 2008
  • Risk-based security impact evaluation may be affected by various factors according to numerous combinations of explosive devices, cutting devices, impact vehicles, and specific attack location to consider. Presently, in planning and design phases, designers are still often uncertain of their responsibility, lack of information and training of security. Therefore, designers are still failing to exploit the potential to reduce threats on site. In this study, the concept of security impact assessment is introduced in order to derive the performing design for safety in design phase. For this purpose, a framework for security impact assessment model using risk-based approach for bridge structures is suggested. The suggested model includes of information survey, classification of terror threats, and quantitative estimation of severity and occurrence.

  • PDF

Consumer's Response for Health Friendly Planning Features of Smart Home (건강친화 지능형주택 계획요소에 대한 소비자 반응 연구)

  • Lee, Sunmin;Lee, Yeunsook;Ahn, Changhoun
    • KIEAE Journal
    • /
    • v.9 no.2
    • /
    • pp.27-36
    • /
    • 2009
  • Due to rapid advances in science and technology and peoples life value, multi-dimensional functionality of the house has been possible and demanded. Among them, intellectual function and health support function appeared prominent and the former can support the later. The purpose of this study was to delineate health support planning features for smart home. Thirty six planning elements were extracted for initial pool for survey to find out what consumers demanded. Two hundred and nine data were collected through the web-survey. Important planning features were identified in relation to three different health dimensions that is physical/physiological, psychological, and social health. Generally consumers' responses were positive for all features. Major health friendly features highly demanded by consumers were found gas detect system, security system, and a call alarm system. The result of this study is expected to be used as a basic reference to develop strategies for smart home and to grasp current housing culture.

The Future of Republic of Korea Navy : Toward a Korean Way of Naval Strategy (미래 대한민국 해군력 역할과 발전)

  • Choi, Joung-Hyun
    • Strategy21
    • /
    • s.37
    • /
    • pp.65-103
    • /
    • 2015
  • This study is an attempt to look into the future role of the ROKN and to provide a strategic way forward with a special focus on naval strategic concept and force planning. To accomplish this goal, this research takes four sequential steps for analysis: 1) assessing the role and utility of naval power of ROKN since its foundation back in 1945; 2) forecasting features of various maritime threats to influence the security of Korea in the future directly or indirectly; 3) identifying the roles to be undertaken by future ROKN; and 4) recommending Korean way of naval force planning and the operational concept of naval power. This study seeks to show that ROKN needs comprehensive role to better serve the nation with respect to national security, national prosperity and development, and future battle-space management. To safeguard the national security of Korea, it suggests three roles: 1) national guard for the peaceful unification; 2) protector of the maritime sovereignty; and 3) suppressor to maritime threats. Three more roles are highlighted for national prosperity: 1) escort of the national economy; 2) guardian for national maritime activities; and 3) contributor to the world peace. These roles need to be closely connected with the role for the battle-space management. This paper addresses the need for a dramatic shift of the central operational domain from land to maritime in the future. This will eventually offer future ROKN a leading role for developing strategic concept and force planning rather than merely a supporting one. This study finally suggests 'balanced' strategy both in concept development and force planning. A balanced force planning is a 'must' rather than an 'option' when considering a division of function between Task Fleets and Area Fleets, constructing cutting-edge conventional forces such as Aegis destroyer, CVs, or submarines, and the mix of high-profile platform and low-profile when composing future fleets. A 'balance' is also needed in operational concept. The fleet should be prepared to fulfill its missions based on two different types of force operation i.e., coercive or cooperative application of the utility of naval force. The findings and recommendations of the study are relevant today, and will be increasingly important in the future to achieve various political goals required by enhancing the utility of naval power.

A Study on Korean Adults' Planning for Old Age (한국 성인세대의 노후준비에 관한 연구 - $30{\cdot}40{\cdot}50$대 기혼남녀를 대상으로 -)

  • Kang, Yoo-Jin
    • The Korean Journal of Community Living Science
    • /
    • v.16 no.4
    • /
    • pp.159-174
    • /
    • 2005
  • This study examines adult perceptions of old age planning and the factors that explain the degree of their planning for the future. The data came from 478 adults between the age of 30 and 59 living in Gunpo city. Major findings can be summarized as follows. First, we find that participants are well aware of the need for old age planning, and that the majority of them think aey are responsible for their old age security. Nevertheless they are not preparing for later life very much. Second, they are doing their best planking for their later lives in the area of social activities. The degree of participants' preparation varies depending on their age and socioeconomic factors. Finally, participants who strongly recognize their parents' role are also more likely to plan for the future. These results suggest that the educational programs and systems for pre-instruction about various plans for old age be developed for even younger people.

  • PDF

Optimal Route Planning for Maritime Autonomous Surface Ships Using a Nonlinear Model Predictive Control

  • Daejeong Kim;Zhang Ming;Jeongbin Yim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.2
    • /
    • pp.66-74
    • /
    • 2023
  • With the increase of interest in developing Maritime Autonomous Surface Ships (MASS), an optimal ship route planning is gradually gaining popularity as one of the important subsystems for autonomy of modern marine vessels. In the present paper, an optimal ship route planning model for MASS is proposed using a nonlinear MPC approach together with a nonlinear MMG model. Results drawn from this study demonstrated that the optimization problem for the ship route was successfully solved with satisfaction of the nonlinear dynamics of the ship and all constraints for the state and manipulated variables using the nonlinear MPC approach. Given that a route generation system capable of accounting for nonlinear dynamics of the ship and equality/inequality constraints is essential for achieving fully autonomous navigation at sea, it is expected that this paper will contribute to the field of autonomous vehicles by demonstrating the performance of the proposed optimal ship route planning model.

A Study on the Secure Coding for Security Improvement of Delphi XE2 DataSnap Server (델파이 XE2 DataSnap 서버의 보안성 개선을 위한 시큐어 코딩에 관한 연구)

  • Jung, Myoung-Gyu;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.706-715
    • /
    • 2014
  • It is used to lead to serious structural vulnerability of the system security of security-critical system when we have quickly developed software system according to urgent release schedule without appropriate security planning, management, and assurance processes. The Data Set and Provider of DataSnap, which is a middleware of Delphi XE2 of the Embarcadero Technologies Co., certainly help to develop an easy and fast-paced procedure, but it is difficult to apply security program and vulnerable to control software system security when the connection structure Database-DataSnap server-SQL Connection-SQL Data set-Provider is applied. This is due to that all kinds of information of Provider are exposed on the moment when DataSnap Server Port is sure to malicious attackers. This exposure becomes a window capable of running SQL Command. Thus, it should not be used Data Set and Provider in the DataSnap Server in consideration of all aspects of security management. In this paper, we study on the verification of the security vulnerabilities for Client and Server DataSnap in Dlephi XE2, and we propose a secure coding method to improve security vulnerability in the DataSnap server system.

A Study on the Evaluation Indices for Evaluation of the Information Security Level on the Enterprise Organization (기업의 정보보호 수준 평가를 위한 평가지표)

  • Na, Yun-Ji;Ko, Il-Seok;Cho, Young-Suk
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.135-144
    • /
    • 2006
  • Until now, most of the evaluation systems have performed evaluation with an emphasis on in-formation security products. However, evaluating information security level for an enterprise needs analysis of the whole enterprise organization, and a synthetic and systematic evaluation system based on it. In this study we subdivided the information security elements of the whole enterprise such as planning, environment, support, technology, and management; developed indices based on them; finally, made the information security level of the whole enterprise organization possible to be measured. And we tried to grasp the information security level of the whole enterprise organization and develop an evaluation system of information security level for suggesting a more developing direction of information security.

  • PDF