• Title/Summary/Keyword: Security Program

Search Result 1,233, Processing Time 0.031 seconds

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

Security Core Technology Implementation for Hardware-based Smart Devices (HW기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.501-505
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study inspects features of hardware-based smart device security technology. Furthermore, this study proposes a realization method in MTM hardware-based secure smart device execution environment for an application software that runs in smart devices. While existing MTM provides the root of trust function only for the mobile device, the MTM-based mobile security environment technology proposed in this paper can provide numerous security functions that application program needs in mobile device. The further researches on IoT devices that are compatible with security hardware, gateway security technology and methods that secure reliability and security applicable to varied IoT devices by advancing security hardware are the next plan to proceed.

An Improvement of Security for the National Assembly (국회시설보안 향상방안)

  • Chung, Taehwang
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.3
    • /
    • pp.290-299
    • /
    • 2013
  • This study is to present an improvement of security for the National Assembly by survey of persons who use the National Assembly facilities. Most of respondent said that their security consciousness level is above average, and they know National Assembly building is National Major Facility First class but they did not know well what the Major Facility First class is. Many of respondents thought security design of National Assembly building is inadequate, so reinforcement of access control management is necessary. For reinforcement of access control management, security gate and preparing of some obstacles are required. They said that they could put up with inconveniences incurred as a result of reinforcement of access control management, that could be affected positively for the reinforcement. The recognition on the necessity of security education is high, but there is no proper security education program. For practical security education, contents and different method followed by different facilities user should be considered.

Study on the Difference of Physical Fitness and Cardiovascular Risk Factors for the Security Guards' Working Type (경호원의 근무유형에 따른 체력과 심혈관질환 위험인자의 차이 연구)

  • Kim, Kyong-Tae;Park, Jun-Suk
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.31-49
    • /
    • 2011
  • The subjects consisted of 60 healthy men who absence of cardiopulmonary diseases, orthopedic diseases, and metabolic diseases. The difference of physical fitness, body composition, cardiovascular risk factors, and psychological characteristics for security guards' working type were examined using one-way ANOVA through SPSS 12.0 version and was treated for the post hoc test when the difference appeared significantly. According to the result, first, there were higher level for the physical fitness according to the security guards' position and it increases body composition and cardiovascular risk factors from higher position. Second, physical fitness level is higher, body composition and cardiovascular risk factors is lower in the security guards for the field service than the security guards on inside duty according to the security guards' working type. Third, it decreases body composition and cardiovascular risk level when the physical fitness level is getting increase for the security guards. In conclusion, it needs to have a physical activity with aerobic system for the security guards of leading members and inside service to decrease the overweight or obesity and cardiovascular risk level.

  • PDF

Introducing an Supplemental Security Income Program for the Elderly in Korea: Experiences of the Developed Countries and the Effects of the proposed models (한국에서의 노인소득보충급여 도입방안 : 선진국의 경험과 제도도입 효과분석)

  • Lee, Sangeun;Jeong, Chanmi;Cho, Youngsheek
    • Korean Journal of Social Welfare Studies
    • /
    • v.48 no.3
    • /
    • pp.209-232
    • /
    • 2017
  • This study proposes supplemental security income programs for the elderly to reduce the serious elderly poverty in Korea. The experiences of the supplemental security income programs for the elderly among the developed countries were investigated. Based on this, the Korean supplemental security income models were proposed, and the effects of the programs on the poverty, inequality, and finance were analysed. The results suggest the following implications. First, the supplemental security income programs cover a sizable portion of the elderly in Korea, and reduce substantially the poverty and inequality problems among the elderly. Second, the supplemental security income programs are efficient compared to the increase of the basic pension. Third, the effects were varied among the combinations of the basic pension models and the supplemental security income models. Therefore Korea needs to introduce an adequate policy mix consisting of basic income and supplemental security income programs so as to construct solid basic income security systems for the elderly.

A Study on the Press Report Analysis of Special Security Guard in Korea Using Big Data Analysis

  • Cho, Cheol-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.183-188
    • /
    • 2020
  • This study is primarily aimed at providing a foundation for academic development and the leap forward of the Special Security Industry through the press report analysis on Korea's special security guard using big data. The research methods It was analyzed by the research methods in relation to keyword trends for 'special security guard' and 'special guards' using the Big Kinds program. According to the analysis based on the period of growth (quantitative and qualitative) of the special security industry, there were many press reports and exposure related to carrying firearms, national major facilities, and regular employees. Unlike the general security guards, the special security guards were released higher by media as a law was revised to allow them to carry or use firearms at important national facilities. There was a lot of media attention concerned about the side effects of misuse, and there were also high media reports on the transition of regular workers to improve poor treatment, such as the unstable status of special security guards and low wages. Therefore, the need for continuous development and improvement of professionalism and work efficiency of special security services are emphasized.

Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1 (보안 USB 플래시 드라이브의 취약점 분석과 CC v3.1 기반의 보호프로파일 개발)

  • Jeong, Han-Jae;Choi, Youn-Sung;Jeon, Woong-Ryul;Yang, Fei;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.99-119
    • /
    • 2007
  • The USB flash drive is common used for portable storage. That is able to store large data and transfer data quickly and carry simply. But when you lose your USB flash drive without any security function in use, all stored data will be exposed. So the new USB flash drive supported security function was invented to compensate for the problem. In this paper, we analyze vulnerability of 6 control access program for secure USB flash drives. And we show that exposed password on communication between secure USB flash drive and PC. Also we show the vulnerability of misapplication for initialization. Further we develop a protection profile for secure USB flash drive based on the common criteria version 3.1. Finally, we examine possible threat of 6 secure USB flash drives and supports of security objectives which derived from protection profile.

Efficacy analysis for the AI-based Scientific Border Security System based on Radar : focusing on the results of bad weather experiments (레이더 기반 AI 과학화 경계시스템의 효과분석 : 악천후 시 실험 결과를 중심으로)

  • Hochan Lee;Kyuyong Shin;Minam Moon;Seunghyun Gwak
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.85-94
    • /
    • 2023
  • In the face of the serious security situation with the increasing threat from North Korea, Korean Army is pursuing a reduction in troops through the performance improvement project of the GOP science-based border security system, which utilizes advanced technology. In order for the GOP science-based border security system to be an effective alternative to the decrease in military resources due to the population decline, it must guarantee a high detection and identification rate and minimize troop intervention by dramatically improving the false detection rate. Recently introduced in Korean Army, the GOP science-based border security system is known to ensure a relatively high detection and identification rate in good weather conditions, but its performance in harsh weather conditions such as rain and fog is somewhat lacking. As an alternative to overcoming this, a radar-based border security system that can detect objects even in bad weather has been proposed. This paper proves the effectiveness of the AI-based scientific border security system based on radar that is being currently tested at the 00th Division through the 2021 Rapid Acquisition Program, and suggests the direction of development for the GOP scientific border security system.

A Design CORBA Security Service for DataBase Security in Ubiquitous Computing (유비쿼터스 환경의 데이터베이스 보안을 위한 CSS 설계)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.15-22
    • /
    • 2005
  • The spread of Internet and the appear of Downsizing, SI(System Integration) is chaning centralized computing to distributed computing. Also distributed computing is rapidly changing to Ubiquitous computing escape from hard wire connected network. CORBA(Common Object Request Broker Architecture) is a middleware that used for smoothness communication between application program and operation system in a different environment. However distributed computing environment is not safe from the danger, the attack like virus, worm is too intellectual and variety. In this paper, we design a new DB security model and suggest efficiency of it in Ubiquitous environment base on CSS(CORBA Security Service) that present ed from OMG(Object Management Group).

  • PDF

Development of Optical System for 50W LED Security Lamp (50W급 LED 보안등용 조명광학계 개발)

  • Jung, Byoung-Jo;Jang, Sung-Whan;Roh, Yong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.296-305
    • /
    • 2012
  • In this paper, we develop about glare phenomenon at security light caused by light source's straight characteristic, maintaining uniformity ratio of illuminance as high, have long light distribution not by symmetry of rotation but a single axis. we develop second lens for security light that lack of light distribution phenomenon at each of security light can be solved. Our developed light system design satisfies lighting standard of security light's and shape of lens is single lens. so our lens optimizes designing or analysis by using lighting design and interpretation program. Making a Mock-up to do real measure, we have intensity of illumination and maintaining uniformity ratio of illuminance measurement data.