• Title/Summary/Keyword: Security Recommendations

Search Result 143, Processing Time 0.023 seconds

A Study on the Development of a Training Course for Ship Cyber Security Officers (선박 사이버보안 책임자를 위한 교육과정 개발에 관한 연구)

  • Lee, Eunsu;Ahn, Young-Joong;Park, Sung-ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.7
    • /
    • pp.830-837
    • /
    • 2020
  • With the rapid development of information and communication technology, information exchange between ships and shore has become faster and more convenient, However, accessing ship information has also become easier and concerns about cyber security attacks are growing. When a ship suffers a cyber-attack, it may cause considerable damage and incurs enormous costs and time to repair. In response to this threat, the maritime industry now demands that a cyber security officer be assigned to each ship to take charge of cyber security management onboard. In order to reduce the damage cause by an attack and to respond effectively, a specialized training course for the ship's cyber security officer is required. The purpose of this study was to present a training course for the position of the ship's cyber security officer, and to highlight the necessity of amending current legislation, To this end, domestic and foreign trends, ship cyber security incident cases, and cyber security training courses were investigated, and based on the results a standard training course for a ship's cyber security of icer was developed. Additionally, recommendations on the related amendments to legislation ware established. The results of the study can be used as basic data to establish future training courses for cyber security officers.

Prevention Methods for the Leakage and Crime of Industrial Technique in South Korea: Focused on the CPTED (한국 산업기술 유출 및 범죄 방지 방안: 환경설계를 통한 범죄예방을 중심으로)

  • Lee, Tae-Young;Sung, Yong-Eun
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.151-160
    • /
    • 2015
  • According to the document from the National Industrial Security Center in 2015, from 2003 to 2014 the disclosure number of industrial spy in South Korea was 438, and the damages due to the industrial technology leakages amounted 50 trillion won annually. Because the industrial technology leakage exercises great influence on the enterprises and the country. countermeasures against industrial technology leakages should be established. Therefore, the purpose of this research is to suggest measures preventing industrial technology leakages and related crimes in enterprises by applying the Crime Prevention Through Environmental Design(CPTED) technique. This research analyzed the recent technology leakage cases and used an analysis of literature research. From the result of this research, we suggested 1) Access Control, 2) Surveillance Enhancement, 3) Territoriality of Reinforcement, and 4) Activity Support by applying the CPTED technique for preventing industrial technology leakages. The limitations of this research and the recommendations for future research were discussed at the last part of this research.

A Study on the Social Security for Seafarers of Maritime Labour Convention, 2006 (2006년 해사노동협약상 선원 사회보장에 관한 연구)

  • Ji, Sang-Won
    • Journal of Navigation and Port Research
    • /
    • v.32 no.3
    • /
    • pp.237-244
    • /
    • 2008
  • The General Conference of International Labour Organization adopted the Maritime Labour Convention, 2006 which created a single, coherent instrument embodying as far as possible all up-to-date standards of existing international maritime Conventions and Recommendations in its Ninety-fourth session on 23 February 2006. This Convention prescribes the social security for seafarers in the Regulation 4.5 in the Title 4. Regulation 4.1-Medical care on board ship and ashore and Regulation 4.2-Shipowner's liability are related to social security for seafarers. For the purpose of ratifying this Convention in our country, first of all, it is necessary to review the domestic laws and regulations concerned whether they fulfill or not the requirements of the Convention and have to make preparation insufficient sections. Therefore, this paper aims to find out different regulations between the domestic law and the Convention, as to be able to accept the requirements regarding the social security of the Convention, also suggest the solution on problems derived in this process.

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.

A Study on the Institutional Limitations and Improvements for Electronic Financial Fraud Detection (전자금융 이상거래 분석 및 탐지의 법제도적 한계와 개선방향 연구)

  • Jeon, Geum-Yeon;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.255-264
    • /
    • 2016
  • Due to the development of information and communication technology, the great change on economics has grown and the biggest change is the e-commerce. With the methods of electronic financial frauds becoming advanced, reported phishing incidents have greatly increased. The Fraud Detection System(hereafter FDS) has taken effect to prevent electronic financial frauds, but economic losses still occurring. This Paper aims to analyze the financial environment, financial information technology environment, financial information technology security environment and some features of the institutional changes. In order to supplement the defect of FDS, it gives some recommendations for the improvement of the effective FDS Management System and information sharing on frauds with some public institution and a major consideration for collection or utilization of personal information.

Renewable energy deployment policy-instruments for Cameroon: Implications on energy security, climate change mitigation and sustainable development

  • Enow-Arrey, Frankline
    • Bulletin of the Korea Photovoltaic Society
    • /
    • v.6 no.1
    • /
    • pp.56-68
    • /
    • 2020
  • Cameroon is a lower middle-income country with a population of 25.87 million inhabitants distributed over a surface area of 475,442 ㎢. Cameroon has very rich potentials in renewable energy resources such as solar energy, wind energy, small hydropower, geothermal energy and biomass. However, renewable energy constitutes less than 0.1% of energy mix of the country. The energy generation mix of Cameroon is dominated by large hydropower and thermal power. Cameroon ratified the Paris Agreement in July 2016 with an ambitious 20% greenhouse gas (GHG) emission reduction. This study attempts to investigate some renewable energy deployment policy-instruments that could enable the country enhance renewable energy deployment, gain energy independence, fulfill Nationally Determined Contribution (NDC) and achieve Sustainable Development Goals. It begins with an analysis of the status of energy sector in Cameroon. It further highlights the importance of renewable energy in mitigating climate change by decarbonizing the energy mix of the country to fulfill NDC and SDGs. Moreover, this study proposes some renewable energy deployment policy-solutions to the government. Solar energy is the most feasible renewable energy source in Cameroon. Feed-in Tariffs (FiT), is the best renewable energy support policy for Cameroon. Finally, this study concludes with some recommendations such as the necessity of building an Energy Storage System as well a renewable energy information and statistics infrastructure.

A new security model in p2p network based on Rough set and Bayesian learner

  • Wang, Hai-Sheng;Gui, Xiao-Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2370-2387
    • /
    • 2012
  • A new security management model based on Rough set and Bayesian learner is proposed in the paper. The model focuses on finding out malicious nodes and getting them under control. The degree of dissatisfaction (DoD) is defined as the probability that a node belongs to the malicious node set. Based on transaction history records local DoD (LDoD) is calculated. And recommended DoD (RDoD) is calculated based on feedbacks on recommendations (FBRs). According to the DoD, nodes are classified and controlled. In order to improve computation accuracy and efficiency of the probability, we employ Rough set combined with Bayesian learner. For the reason that in some cases, the corresponding probability result can be determined according to only one or two attribute values, the Rough set module is used; And in other cases, the probability is computed by Bayesian learner. Compared with the existing trust model, the simulation results demonstrate that the model can obtain higher examination rate of malicious nodes and achieve the higher transaction success rate.

Developing Reference Model for National Cybersecurity Strategy Establishment and Improvement (국가 사이버보안 전략 수립과 개선을 위한 참조 모델 개발)

  • YUN, Jaesuk
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.53-61
    • /
    • 2016
  • A number of countries have been developing and implementing national cybersecurity strategy to prevent damages caused by cyber threats and to minimize damages when they happened. However, there are a lot of differences and disparities in respective strategies with their own background and needs. A vulnerability in some places can be a global problem, so various guidelines have been developed by relevant organizations including international organizations to support the establishment of national cybersecurity strategies and improvement of them. In this paper, with analysis on the guidelines for the establishment of national cybersecurity strategies, reference model consisting of common elements of strategies was suggested. And several recommendations for the improvement measures for Korean national cybersecurity strategies were explained with a comparison of the reference model.

The Role of Information Systems in Supporting Knowledge Management in King Abdulaziz University: Case Study

  • Najdi, Roaa Nabil;Komosany, Nabil Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.133-149
    • /
    • 2021
  • The purpose of this study is to explore the role of information systems in the implementation of knowledge management, at King Abdul-Aziz University (KAU) in Jeddah, by highlighting the importance of information systems and their implementation of the knowledge processes. The researcher used the case-study method to explore the importance of information systems in supporting the implementation of knowledge management at the university. Moreover, the study has used the questionnaire as a tool for collecting information and obtaining feedbacks from the administrators at the university, and a random sample was chosen to identify the study community. The study resulted that there is a statistical indication of the importance and degree of the use of electronic systems in the university by the administrators. The study sample members believe that the university is keen to provide information systems, where systems analyze data and convert them into knowledge information that benefits the senior management at the university. Members of the study sample emphasize the importance of electronic information systems at the university, which in turn saves time and effort in extracting information, reports, statistics and providing them easily to senior management. The study also concluded with some recommendations, such as emphasizing the importance of knowledge management as one of its top priorities, spreading the knowledge culture, instilling a vision of knowledge among individuals, and emphasizing the importance of information systems.

Impact of COVID-19 Pandemic on Graduates Seeking Jobs

  • El-Boghdadi, Hatem M.;Noor, Fazal;Mahmoud, Mostafa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.70-76
    • /
    • 2021
  • The appearance of COVID-19 virus has affected many aspects of our life. These include and not limited to social, financial and economic changes. One of the most important impacts is the economic effects. Many countries have taken actions to continue the teaching process through online teaching platforms. The students are expected to graduate during the next few semesters with certificates that include some online-completed courses and their graduation certificates are called mixed certificates. This paper considers graduation mixed certificates with some online courses and its impact on graduates seeking jobs. First, we study how well the mixed certificates are accepted by job market. In other words, how different companies, organizations and even governmental entities would accept such certificates when hiring. We study the perception of job market for such certificates for different learning fields. Secondly, we study how well the online courses are accepted by the students keeping in mind that these students are used to traditional face to face teaching. Finally, we paper our results and recommendations according to the collected data from the surveys. Some of the results show that about 60% of companies don't have policies to encourage hiring graduates with mixed certificates. Also, colleges are almost divided evenly between preferring face to face and preferring online teaching.