• 제목/요약/키워드: Security Practice

검색결과 374건 처리시간 0.034초

사회안전관리에 대한 전문인력 양성실태와 발전방안 (Fact and plan on specialist training for social security)

  • 공배완;김창호
    • 시큐리티연구
    • /
    • 제5호
    • /
    • pp.5-18
    • /
    • 2002
  • The private security has been one of the fastest growing parts of the law enforcement industry, confronted with mutual coincidence or complementarity. Therefore, the primary factor in order to straighten it up should be bringing op a person, because he or she arranges the private security, based on the society in the end. In addition, it is suggested that further study of technical learning and its practice should be arranged. Because the education for agents undertaking the social security is comprehensive in space and limited in time, it may accompany hardship in arranging its content and curriculum Although this article leaves much to be desired, it has been analyzed end observed if a greater emphasis is placed on ample human resources supply for increased demand on social security in private law enforcement industry through institutional education system. A scientific advancement is expected to be attained in the majors related to the private security, with validity that the continuous studies should be implemented, and a social role of colleges as a specialized institute should be erected.

  • PDF

최종사용자의 인터넷과 소셜 네트워크 보안 행동에 대한 실증 연구 (An Empirical Study about Internet and Social Network Security Behavior of End User)

  • 박경아;이대용;구철모
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제21권4호
    • /
    • pp.1-29
    • /
    • 2012
  • The purpose of this study was to find about personal information security of internet and social networks by focusing on end users. User competence and subjective criterion, which are the antecedents, are affecting security behaviors For these security behaviors, the study examined the relationship between security behavior intention on internet use and security behavior intention about social network that is actively achieved in many fields. Behaviors of internet and social network were classified into an action of executing security and an action of using a security technology. In addition, this study investigated a theory about motivational factors of personal intention on a certain behavior based on theory of reasoned action in order to achieve the purpose of this study. A survey was conducted on 224 general individual users through online and offline, and the collected data was analyzed with SPSS 12.0 and SmartPLS 2.0 to verify demographic characteristics of respondents, exploratory factor analysis, and suitability of a study model. Interesting results were shown that security behavior intention of social network is not significant in all security behavior execution, which is security performance behavior, and security technology use. Internet security behavior is significant to security technology use but it does not have an effect on behavior execution.

실시간보안관리 프레임워크 (Framework of Real Time Security Management)

  • 김병학;임채호
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 동계학술대회
    • /
    • pp.513-517
    • /
    • 2003
  • 올해 발생한 슬래머웜 등 인터넷웜은 감염스피드와 피해영향으로 인하여, 정보보호의 전략을 급격하게 수정하게 만들었다. 가장 큰 문제는 기존의 정보보호제품이 신종 취약점과 공격에는 무용지물임이 증명되었고, 결국 Practice에 근거한 관리 및 프로세스에 의한 보안이 중요함을 보이고 있다. 또한 그동안 보안관리는 온라인화 되지 않은 자산에 근거한 모델이 많았지만 현재는 온라인화 된 자산에 대한 실시간 보안관리 방법이 매우 중요해지고 있다. 실시간 취약점관리, 실시간 위협관리, 실시간 위험관리 등을 통하여, 실시간 보안관리의 해외동향과 이론적 근거에 바탕을 둔 프레임워크 설계를 보이고자 한다.

  • PDF

Structural Dashboard Design for Monitoring Job Performance of Internet Web Security Diagnosis Team: An Empirical Study of an IT Security Service Provider

  • Lee, Jung-Gyu;Jeong, Seung-Ryul
    • 인터넷정보학회논문지
    • /
    • 제18권5호
    • /
    • pp.113-121
    • /
    • 2017
  • Company A's core competency is IT internet security services. The Web diagnosis team analyzes the vulnerability of customer's internet web servers and provides remedy reports. Traditionally, Company A management has utilized a simple table format report for resource planning. But these reports do not notify the timing of human resource commitment. So, upper management asked its team leader to organize a task team and design a visual dashboard for decision making with the help of outside professional. The Task team selected the web security diagnosis practice process as a pilot and designed a dashboard for performance evaluation. A structural design process was implemented during the heuristic working process. Some KPI (key performance indicators) for checking the productivity of internet web security vulnerability reporting are recommended with the calculation logics. This paper will contribute for security service management to plan and address KPI design policy, target process selection, and KPI calculation logics with actual sample data.

A Novel Hybrid Algorithm Based on Word and Method Ranking for Password Security

  • Berker Tasoluk;Zuhal Tanrikulu
    • International Journal of Computer Science & Network Security
    • /
    • 제23권3호
    • /
    • pp.161-168
    • /
    • 2023
  • It is a common practice to use a password in order to restrict access to information, or in a general sense, to assets. Right selection of the password is necessary for protecting the assets more effectively. Password finding/cracking try outs are performed for deciding which level of protection do used or prospective passwords offer, and password cracking algorithms are generated. These algorithms are becoming more intelligent and succeed in finding more number of passwords in less tries and in a shorter duration. In this study, the performances of possible password finding algorithms are measured, and a hybrid algorithm based on the performances of different password cracking algorithms is generated, and it is demonstrated that the performance of the hybrid algorithm is superior to the base algorithms.

의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계 (Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment)

  • 안창호;백현철;서영건;정원창;박재흥
    • 융합보안논문지
    • /
    • 제16권7호
    • /
    • pp.21-29
    • /
    • 2016
  • 현재 우리사회는 네트워크를 통하여 실시간으로 교류되는 다양한 정보 환경에 노출되어 있다. 특히 정부의 의료정책은 대국민의료서비스 질을 향상시키기 위해 원격진료의 시행을 서두르고 있다. 이러한 원격진료의 시행은 향후 지역에 상관없이 맞춤형 환자 진료를 위한 빅 데이터 기반의 진료 정보 구축도 함께 요구하고 있다. 본 논문은 빅 데이터 기반의 권역별 의료클러스터 구축과 이에 대한 서비스 가용성을 해치는 공격이 발생할 경우 해당 공격을 탐지하고 적절한 대응이 가능한 방어 및 보안 협력모델을 제안하고 있다. 이를 위하여 동일 병원정보시스템으로 전국에 고루 분포된 지방의료원을 권역별 가상 의료클러스터 본부로 하는 네트워크 구성을 제안하였다. 아울러 의료클러스터에 발생할 수 있는 IP Spoofing 공격과 이에 따른 DDoS 공격에 실시간으로 대응 가능한 상호협력 보안 모델을 설계하여 단일 체계, 단일 보안정책이 가지는 한계성도 극복할 수 있도록 하였다.

정보보호컨설턴트 역량에 대한 관리자와 실무자의 인식차이 (Perceptual Differences between Managers and Practitioners on Competencies of Information Security Consultants)

  • 김세윤;김태성
    • 정보보호학회논문지
    • /
    • 제26권1호
    • /
    • pp.227-235
    • /
    • 2016
  • 공공기관의 개인정보영향평가(Privacy Impact Assessment, PIA) 의무화, 정보보호관리체계(Information Security Management System, ISMS) 인증 의무화 등 각종 법률 준수의 의무화 조치가 가동되면서 정보보호컨설팅 수요가 증가하고, 이에 따라 정보보호컨설턴트 인력의 확보가 주요현안으로 떠오르고 있다. 본 연구는 정보보호컨설턴트가 갖추어야 할 핵심 역량이 무엇이며, 실제 정보보호컨설턴트가 핵심 역량을 얼마나 보유하고 있는지를 실증적으로 살펴보고자 한다. 핵심 역량에 대한 관리자와 실무자의 인식차이를 분석함으로써 두 그룹의 시각 차이를 이해하고 향후 정보보호컨설턴트 양성을 위한 방안을 제시한다.

A Study on Threat Containment through VDI for Security Management of Partner Companies Operating at Industrial Control System Facility

  • Lee, Sangdo;Huh, Jun-Ho
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2019년도 추계학술발표대회
    • /
    • pp.491-494
    • /
    • 2019
  • The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.

Study of Pedagogical Practice and Teaching Experience in European Countries

  • Poplavskyi, Mykhailo
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.252-258
    • /
    • 2022
  • Globalization, development of the information society, intensification of migration processes, and internationalization of education in recent years have significantly affected the international labour market and increased competition between professionals in various fields. Academic, research and teaching staff are currently facing rapid changes and growing demand for quality educational services. Under such conditions, educational institutions around the world pay particular attention to improving the quality of the educational process in order for their graduates to be able to compete in the international labour market. The study of the experience of teachers' professional training in advanced countries opens new opportunities for improving the system of pedagogical training in Ukraine in order to adapt it to the requirements of the European educational space. The progressive achievements of countries demonstrating a high level of teachers' professional training in accordance with international standards, having rich historical educational traditions are of considerable scientific interest; consequently, this contributes to their leadership in science and education at the regional and global levels. The purpose of the present academic paper lies in analysing the latest trends in exploring teaching experience in the European countries and performance review of passing by students and teachers of the program on studying of pedagogical practice and experience of teaching in the countries of Europe. Methodology. Analytical and empirical (questionnaire) methods were used in the research process. Results. According to the obtained results of the research, the advantages, the most common areas of educational programs and the wishes of the participants regarding the practical implementation of the experience were identified.

의료기관의 정보보호교육과 정보보안생활과의 관련성 (Relationship between Information Security Education and Information Protection Practice of Hospital)

  • 김종덕;홍화영;김재현
    • 한국병원경영학회지
    • /
    • 제24권2호
    • /
    • pp.56-66
    • /
    • 2019
  • PURPOSE: To demonstrate that the training of information protection for members at medical institutions increases the information protection activities of employees. METHODS: We used the chi-square test and the logistic regression model to analyze the data of the "Healthcare Information and Communication Status Survey in 2017" (n = 2002) conducted by the Korea Health Industry Development Institute RESULTS: As a result of the analysis, the information protection activity increased when the education was received and the number of received more than the education was not received. Especially, when the management receives education, it affects the information protection activities of the employees. CONCLUSION: In order to protect medical information, medical institutions need to provide education on information protection for management and employees.