• Title/Summary/Keyword: Security Risk Analysis

Search Result 519, Processing Time 0.027 seconds

A Study on the Effects of Casino's Risk Management Factors on Work Performance of Security Management Organization (카지노기업의 위기관리요인이 안전관리조직 업무성과에 미치는 영향)

  • Lee, Seung-Hoon;Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.109-136
    • /
    • 2014
  • Korea domestic casino industry has been experienced an explosive growth marking the highest quantity and quality with rapid growth of domestic economy since the 1960s. However there are really lack of study about presenting guideline for establishing risk management planning reflected characteristics of casino industry. Therefore, we analyzed previous studies about concept of the risk and criteria and drew dimension of safety supervision reflecting characteristics of casino industry. we, also, identified detailed safety management factors as well as classified three dimensions of environment, human and facility on the dimension of safety supervision. This study was designed to examine effect relationship between risk management factors and performance of security management organization focused on The mediation effect of atmosphere of organization We used two different tools for data analysis: SPSS 18.0 for the descriptive statistics and PLS 3.0 to validate the integrity of the research model and proposed hypotheses that is main effects from risk management factors to security management organization and mediation effects of atmosphere of organization. The data analysis confirmed the importance of risk management factors to enhanced performance of security management organization. The mediation effect of atmosphere of organization, also, supported relationship between risk management factors and performance of security management organization. It provided theoretical and practical implication for building risk management strategy well suited casino company and conducting security management.

  • PDF

A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information (개인정보 유출 방지를 위한 SRI(Security Risk Indicator) 기반 모니터링 시스템 개발)

  • Park, Sung-Ju;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.637-644
    • /
    • 2012
  • In our current information focused society, information is regarded as a core asset and the leakage of customers' information has emerged as a critical issue, especially in financial companies. It is very likely that the technology that safeguards which is currently in commercial use is not focused at an enterprise level but is fragmented by function or by only guards portions of a customer's personal information. Therefore, It is necessary to study the systems which monitor the indicators of access at an enterprise level in order to preemptively prevent the compromise of such data. This study takes an enterprise perspective on such systems for a financial company. I will focus on examination of the methods of implementation of the monitoring system, the application of pattern analysis and examination of Security Risk Indicators (SRI). A trial of the monitoring system provided security managers and related departments with proper screening capabilities of information. Therefore, it is possible to establish a systemic counter-plans based on detectable patterns.

A Study on Risk Management for Export Control on Strategic Trade in Supply Chain Management

  • Roh, Tae-Hyun;Park, Jin-Hee
    • Journal of Navigation and Port Research
    • /
    • v.37 no.6
    • /
    • pp.709-718
    • /
    • 2013
  • In this study, AHP analysis was conducted through a survey that was organized by 9 job categories. The results show that sustainable operation risks have the highest priority level among all criteria with management interest having the highest priority level within sustainable operation risks related attributes. The most important risk attributes among stakeholder risks appeared to be asset security and cargo and conveyance security, with education and training being the most important among regulatory risks. Effective management and response to the risks from export controls on strategic trade require an understanding of supply chain security and compliance programs, effective training programs, investments for development of security systems that meet international standards. In addition, the government needs to focus on developing professionals and providing support for companies with compliance programs, working closely with businesses.

The Research for Cyber Security Experts (소프트웨어 취약점의 보안성 강화를 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.347-350
    • /
    • 2016
  • Analysis of vulnerability of the software for risk. The weakness of the software material, the importance of strengthening security in accordance with financial damage occurred is emerging. There is a potential risk factor not only from the case, the manufacturing to use the software company that appropriate to use a software business and personal risk of loss to size.In this paper due to diagnose and vulnerabilities in software, diagnosis, the curriculum and to cultivate a diagnostic guide, and security vulnerabilities in software.Proposal system for increased.

  • PDF

A Study on effective risk analysis and evaluation method of cloud computing system environment (클라우드컴퓨팅 시스템 환경의 효과적 위험분석평가 방법에 관한 연구)

  • Lee, Junglimg;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.2
    • /
    • pp.10-25
    • /
    • 2021
  • Although many studies have been conducted on risk analysis and evaluation in the on-premises environment in information security, studies on effective methodologies of risk analysis and evaluation for cloud computing systems are lacking. In 2015, the Cloud Computing Development Act was enacted, which served as an opportunity to promote the introduction of cloud computing. However, due to the increase in security incidents in the cloud computing system, activation is insufficient. In addition, the cloud computing system is not being actively introduced because of the difficulty in understanding the cloud computing system technology of the person in charge who intends to introduce the cloud computing system. In this regard, this study presented an effective risk analysis and evaluation method by examining the characteristics, concepts, and models of cloud computing systems and analyzing how these characteristics affect risk analysis and evaluation.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.

The Moderating Effects of Information Security Policy between Information Security Maturity and Organizational Performance (정보보호 성숙도와 조직성과 간의 정보보호 정책의 효과분석)

  • Park, Jeong Kuk;Kim, Injai
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.9
    • /
    • pp.301-310
    • /
    • 2014
  • The absence of proactive information security management to ensure availability, accessibility and safety of information can bring serious risks to customers as well as to the organization's performance and competitiveness because improper security management undermines business continuity. This study analyzed the maturity of information security which affects the organizational performance. Through the literature reviews, a research model using the organizational performance as the dependent variable, the risk management process maturity and risk assessment process as independent variables and the information security policy indexes as moderate variables was proposed, and an empirical analysis was made on the basis of survey. The results showed that there was a high causal relationship between information security maturity and organizational performance. However, even if the proportions of information security staff ratio and the information security budget ratio increased, information security maturity did not affect organizational performance. It suggests that information security maturity affects organizational performance, but information security regulations have their limitation as being a catalyst to improve organizational performance.

Development of Railway Tunnel Fire Risk Assessment Program and its Application (철도터널 화재 위험도 평가 프로그램의 개발 및 적용사례)

  • Yoon, Sungwook;Park, Jong-heoun
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.1
    • /
    • pp.57-64
    • /
    • 2009
  • With the increase in construction of long railway tunnel, social interest in the railway tunnel fire risk has also increased. However, quantitative fire risk research on this topic is still lacking, especially in terms of consideration of uncertainty of each variables used in risk analysis. Hence, in this study, to improve the overall performance of fire risk analysis technique for railway tunnel, Monte-Carlo simulation method is added to the traditional probabilistic risk analysis based on event tree approach and its validity is investigated by applying it to the real railway tunnel project.

  • PDF

Telemedicine Security Risk Evaluation Using Attack Tree (공격트리(Attack Tree)를 활용한 원격의료 보안위험 평가)

  • Kim, Dong-won;Han, Keun-hee;Jeon, In-seok;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.951-960
    • /
    • 2015
  • The smart screening in the medical field as diffusion of smart devices and development of communication technologies is emerging some medical security concerns. Among of them its necessary to taking risk management measures to identify, evaluate and control of the security risks that can occur in Telemedicine because of the Medical information interchanges as Doctor to Doctor (D2D), Doctor to Patient (D2P). This research paper studies and suggests the risk analysis and evaluation methods of risk security that can occur in Telemedicine based on the verified results of Telemedicine system and equipment from the direct site which operating in primary clinics, public health centers and it's branches, etc.