• Title/Summary/Keyword: Security Plans

Search Result 315, Processing Time 0.033 seconds

The Plan and Tools for Vulnerability Testing in Information Software-Based System

  • Kim, In-Jung;Lee, Young-Gyo;Won, Dong-Ho
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.75-78
    • /
    • 2005
  • Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.

A Business-Logic Separated Security Framework for Smart Banking (스마트 금융을 위한 비즈니스 로직과 분리된 보안프레임워크)

  • Seo, Dong-Hyun;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.669-679
    • /
    • 2014
  • This study introduces server-side security-oriented framework for smart financial service. Most of domestic financial institutions providing e-banking services have employed server-side framework which implement service-oriented architecture. Because such architecture accommodates business and security requirements at the same time, institutions are struggling to cope with the security incidents efficiently. The thesis suggests that separating security areas from business areas in the frameworks makes users to be able to apply security policies in real time without considering how these policies may affect business transactions. Security-oriented frameworks support rapid and effective countermeasures against security threats. Furthermore, plans to avoid significant changes on existing system when institutions implement these frameworks are discussed in the report.

Middle-aged employed men's attitudes toward retirement and plans for post-retirement life (중년기 직장 남성의 퇴직에 대한 태도와 퇴직 후 생활 계획)

  • 이승아
    • Journal of the Korean Home Economics Association
    • /
    • v.36 no.5
    • /
    • pp.125-135
    • /
    • 1998
  • The purpose of this study is to investigate the overall levels of the middle-aged employed men's attitudes toward retirement and plans for post-retirement life, and to explore the relative effects of personal, family, and job characteristics on retirement attitude and the level of retirement plan. The data were collected from the 438 middle-aged (ranging from 41 to 50) employed men through the structured questionnaires. The data were analyzed using frequency, percentile, average, standard deviation, and multiple regression analysis. The results of the data analysis show that most of the respondents had neither positive nor negative attitude toward retirement and the level of planning for post-retirement life was slightly higher than average score on the scale. Next, the positive attitudes of middle-aged employed men toward retirement were observed from those who have higher education, larger household income, higher job security and lower job stress respondents who hold professional, administrative, or official jobs were more positive toward retirement than those who hold professional, administrative, or official jobs were more positive toward retirement than those who hold manufacturing or sales job. A well-planned post-retirement life was found among those who have better health, higher job satisfaction, job security and job orientation. Job characteristic variables such as job security and job satisfaction showed stronger impact than personal or family ones on the attitude toward retirement and the level of retirement planning. Household income and health also had significant effects.

  • PDF

Current Status and Analysis of Domestic Security Monitoring Systems (국내 보안관제 체계의 현황 및 분석)

  • Park, Si-Jang;Park, Jong-Hoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.2
    • /
    • pp.261-266
    • /
    • 2014
  • The current status of domestic monitoring centers was reviewed and the pattern-based security monitoring system and the centralized security monitoring system, both of which are the characteristics of security monitoring systems, were analyzed together with their advantages and disadvantages. In addition, as for a development plan of domestic security monitoring systems, in order to improve the problems of the existing pattern-based centralized monitoring system, Honeynet and Darknet, which are based on anomalous behavior detection, were analyzed and their application plans were described.

Study on Improvement of Safety Check System for Elevation Emergency Management Service (소방방재서비스 향상을 위한 안전점검 개선방안에 관한 연구)

  • Kong, Ha-Sung;Lee, Jeong-Il;Kim, Kook-Rae
    • Fire Science and Engineering
    • /
    • v.20 no.4 s.64
    • /
    • pp.42-57
    • /
    • 2006
  • This study suggests improvement plans : safety check system security through combination in stages, unification of fire inspection, enterprising security of prevention work, enforcement of certificate of qualification for safety, activation of civil partner-ship of fire disaster prevention through contrast prevention work of administrative service with civil mind and an in-depth analysis : dispersed and duplicated management current safety check service, improper commission collection, immorality diffusion of involved, potential irregularities causes, deficit of professionalism security.

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

A Study on IoT Devices Vulnerability and Security (IoT 디바이스 보안위협 및 대응방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.9-17
    • /
    • 2021
  • Numerous IoT devices are connected to a wireless network environment to collect and transmit data without time and space limitations, but many security vulnerabilities are exposed in these process. But IoT security is not easy to create feasible security standards and device authentication due to differences in the approach or implementation of devices and networks. However, it is clear that the improvement and application of the standard framework for enhancing the security level of the device is the starting point to help the most successful security effect. In this study, we investigate the confidentiality, integrity, availability, and access control implementation plans for IoT devices (which are the basic goals of information security), and standardized security evaluation criteria for IoT devices, and study ways to improve them.

A Study on the Current State Analysis of the Korean and Japanese Residence Evacuation Plans (한일 주민대피계획의 실태분석에 관한 연구)

  • Park, Namkwun;Kim, Twehwan
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.2
    • /
    • pp.171-177
    • /
    • 2012
  • To protect the life and property of the residence from diverse disasters, we have collected and analyzed the domestic and foreign residence evacuation plans. The results and proposals from the study can be summarized as in following. First, the contents and items in civil defense emergency evacuation plan guidelines should be stipulated more clearly and its' application should be extended. Second, uniformity must be established in non-coherent contents between cities and counties. Third, disaster-prone people are not considered in the evacuation plans. The disaster-prone people must be accounted by each cities and counties and an evacuation plan for them must be established. Fourth, most of the rooms for residence evacuations are second to third level, and they are defenseless against disasters like CBRNE. Considering these conditions, deploying transportation means that can support large-scale evacuations, quickly and effectively, must also be considered.

A Study on Contents Security Method Based on a Content Delivery Network (CDN 환경에서 콘텐츠 보안 방법 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.51-56
    • /
    • 2008
  • Is caused by with growth etc. of the digital contents circulation market which leads suddenly accommodates in order to control the network traffic which increases and the researches which are various are being advanced the explosive evidence and a electronic transaction of the Internet user. The present paper protects a digital contents and a copyright from CDN system environments which will appear the center of new network service with the plan for the dispersive DRM system of CDN bases plans. Respect this dispersion DRM package formats which provide a stronger security characteristic in the contents which is stored the operational process of the dispersive DRM system for to be defined, CDN system and of existing interoperability they present.

  • PDF

Analysis on Information Security Educational Institutions in Korea (국내 정보보호 교육기관 현황에 대한 분석)

  • Kim, Min-Jeong;Kim, Tae-Seong;Kim, Jong-Ha
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.05a
    • /
    • pp.69-81
    • /
    • 2004
  • As the side effects of information society, for example hacking, virus, etc., diffuse, the information security becomes one of the most important issues over the world. Information security manpower are critical factor to complete secure information society. In spite of many plans formulated and implemented by government and civil sector, there is no systematic analysis on the current status of information security educational institutions in Korea. This article aims to analyze the current status of information security educational institutions - colleges, universities, graduate schools and civil academies with Statistical Yearbook of Education and the research of KAIT[11].

  • PDF