• Title/Summary/Keyword: Security Program

Search Result 1,232, Processing Time 0.033 seconds

A Comparison Study between Cloud Service Assessment Programs and ISO/IEC 27001:2013 (클라우드 서비스 평가 프로그램과 ISO/IEC 27001:2013의 비교 연구)

  • Choi, Ju-Young;Choi, Eun-Jung;Kim, Myuhng-Joo
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.405-414
    • /
    • 2014
  • It is very important to IT users that the Cloud service provides dynamic extension of IT resources and cost-saving. However, the reliability for Cloud service hinders utilizing Cloud service actively. Existing studies on assessment program for Cloud Service are executed by extracting information security assessment articles and adding features of cloud services by referencing ISO/IEC 27001:2005. This paper will review the recently released ISO/IEC 27001:2013 for the addition, reduction, and changing of articles for Controls and Control objectives. Comparative analysis for the Controls of ISO/IEC 27001:2013 with those of CSA CCMv.3, FedRAMP which is an assessment program for Cloud service will suggest Control Objects of Information Security Management System for related Cloud service. The suggestion of Controls will be an important reference index for the security policy of companies which manage the information security management system based on Cloud service.

The End-to-End Encryption for Enhancing Safety of Electronic Financial Transactions (전자금융거래의 안전성 강화를 위한 종단간 암호화)

  • Seung, Jae-Mo;Lee, Su-Mi;Ahn, Seung-Ho;Noh, Bong-Nam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1920-1925
    • /
    • 2009
  • '05. June, the first Internet banking accident occurred by the malignant cord. It discontinued security programs for protecting important financial informations. A computer hacker had made a collation of password, OTP(One Time Password) values etc and illegally withdraw one´s savings from the bank using the financial information. The attackers are continuously attempted with the hacking tool under bypass security programs as the vaccine program or the personal fire-wall. Therefore, an electronic financial system should be composed with the goal which is to protect financial informations from user's terminal to a banking server. In this paper, we make an analysis of menaces in electronic financial transactions and explain considerable security issues to enhance safety in Internet banking, CD/ATM and mobile banking.

Health Publicness beyond the Healthcare Systems: Focusing on the Concept of Health Security and the Process of Social Dialogue (보건의료 공공성을 넘어 건강공공성으로: 건강안보와 사회적 대화를 중심으로)

  • Moon, Daseul;Chung, Haejoo
    • Health Policy and Management
    • /
    • v.28 no.4
    • /
    • pp.329-338
    • /
    • 2018
  • The study seeks to widen the discussion from healthcare oriented 'health publicness' to human security oriented 'health publicness'. The shortcomings of previous literatures on health publicness are as follows: (1) the studies have confined the range of discussions to healthcare system, (2) lacked arguments from political perspectives, and (3) failed to provide actionable pathways to achieve the goal. Thereby, we suggest 'health publicness' based on the concept of human security to solve multidimensional healthcare problems. The health publicness based on human security, which aims to secure everybody's freedom from want and fear, enables not only to expand the scope of health problems that can be discussed but also to propose the procedures to achieve health publicness. More specifically, it consists of substantive and procedural health publicness. The former is about 'health security'-protecting, maintaining, and promoting individual's health-whereas, the latter is about 'social dialogue' guaranteeing participation of citizens, government, employers, and worker representatives. In conclusion, this study proposes the 'Regional Healthcare Quadripartite' as the incarnation of health publicness involving a variety of actors within and across the healthcare system.

A Study on Developing the Educational Program for the Emergency Response against Fire Accidents in KTX (고속철도 화재사고 비상대응 교육프로그램 개발에 관한 연구)

  • Kim, Si-Gon;Park, Min-Kyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.2
    • /
    • pp.41-49
    • /
    • 2009
  • In January, 2005, the "Railroad Safety Act" was presented, preparing the systematic equipment that allows several railroad operators to consider the railroad safety issue, and each of the railroad operative institutions accepted such situation that the construction of the emergent system of coping, resulting in the construction of the emergent system of coping with the railroad fire accident through the relevant study to improve the railroad security efficiency against fire. This study tried to present the on developing the emergent educational program for coping with the KTX fire accident, which is distributed to the spot, to the railroad emergency staff for improving the railroad security efficiency against fire through the education of systematic and efficient emergent countermeasure procedures against fire accidents the fire accident in KTX.

Assessment Model of Student's Satisfaction in IT Master Programs based on Employment-Contract (IT분야 채용조건형 계약학과의 학생 만족도 평가모형 개발에 관한 연구)

  • Park, Sang-Min;Kim, Tae-Sung;Kwon, Sun-Dong
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.4
    • /
    • pp.83-95
    • /
    • 2013
  • This study aims to analyze factors that affect satisfaction of students in employment-contract information technology master programs, and suggest policy implications to improve management of employment-contract master programs. A survey of students supported by Software master program of National IT Industry Promotion Agency (NIPA) and Knowledge Information Security master program of Korea Internet and Security Agency (KISA) indicates that department administration, department vision, scholarship, adviser, and lecturer affect satisfaction of students in employment-contract master programs in listed order.

Effectiveness of A Proposed Program for Training Social Studies Teachers in the Light of Electronic Functional Competencies

  • Atef Mohamed Saied, Abdallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.139-145
    • /
    • 2022
  • The study aimed to build a proposed program for training Social Studies teachers in the light of electronic functional competencies, the researcher used the experimental method with a quasi-experimental design, the study sample consisted of (37) Social studies teachers in Ismailia. A proposed program in the light of electronic functional competencies. A measure of awareness of the dimensions and components of electronic feasibility. The study concluded several results: There is a statistically significant difference at the level of (a ≤0.01) between the average scores of the teachers of the research group in the pre and post measurements of the measure of awareness of the dimensions and components of electronic functional competencies in favor of the teachers scores in the post-measurement. Training Social studies teachers on the functional electronic competencies necessary for them to keep up with educational developments.

Design of secure program sharing system using XML security (XML 보안기술을 적용한 안전한 프로그램 공유시스템 설계)

  • 오인원;박현동;서상원;서인석;류재철
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.13-20
    • /
    • 2003
  • 웹 서비스는 기존 분산 처리기술과 인터넷 기술에 기반한 기술이며, 이기종 시스템간의 데이터를 자연스럽게 공유하고 통신하는 것을 목적으로 등장한 기술이다. 또한 웹서비스 기술로 구현된 프로그램은 필요한 곳에서 proxy object를 생성해서 사용할 수 있으므로, 다른 개발 환경에서 작성된 프로그램이라도 호출해서 사용할 수 있게 되었다. 본 논문에서는 프로그램을 공유하는 과정에서 발생할 수 있는 보안 요구사항을 도출해보고 보안을 위해 XML Signature와 XML Encryption을 적용한 안전한 프로그램 공유 시스템을 제시해 본다.

  • PDF

Design and Implementation of SIP Testing Simulator for Security Management (보안관리를 위한 SIP 시험 시뮬레이터 설계 및 구현)

  • Jang, Sung-Man;Kill, Min Wook;Lee, Geuk;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.99-107
    • /
    • 2003
  • One of the most important part in next generation VoIP is security management. When we develop a protocol stack based on SIP (Session Initiation Protocol), it is necessary to develop test scenario, test environment, adaptation test technology for security test of the system. In this paper, we design and implement security test environment and test program for SIP. This system also can be used as a fundamental system when someone develop a communication system based on SIP.

  • PDF

Design of files and directories with security features within the Windows O.S using Visual C++ (Visual C++을 이용한 윈도우 운영체제 내의 파일 및 디렉토리 보안 기능 설계)

  • Jang, Seung-Ju;Kim, Jun-ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.510-514
    • /
    • 2009
  • This program was developed in Visual C + +, the Windows operating system has security features within the files and directories. File and directory security, encryption / decryption operations yirueojimyeo file security can be round, to know the value of the key and security password I need to know the directory is designed to be decrypted. In addition, ECB, CBC algorithm and 3DES, SEED algorithms and methods, and encryption. De0 can not run that created the file extension, as has been developed to allow for double security.

  • PDF

Implementation of the U.S. Aviation Security Policy and Privacy Protection Problem (미국의 항공보안정책 적용과 프라이버시 문제점)

  • Kang, J.Y.;Kim, C.H.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2005
  • TSA needs to be more transparent with the new passenger screening system and its functioning to build the citizen trust. The system is needed to be not only effective but supported by Congress and the general public. Until this occurs, skepticism will underlie any discussion about its effectiveness in balancing the protection from terrorism with respect to individual liberties. CAPPS II can be a viable system if it is developed appropriately. The objectives of the study are to introduce the security program in the U.S. aviation security policy and to discuss privacy problems when it applies. Korea also needs to study a harmonious plan with the basis of global approach mind in the case of considering the transferring of passenger information from other states for the purpose of security.

  • PDF