• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.026 seconds

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

  • Raazi, Syed Muhammad Khaliq-Ur-Rahman;Lee, Sung-Young
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.1
    • /
    • pp.23-51
    • /
    • 2010
  • Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.

Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey

  • Hong, Sung-Hyuck;Lim, Sun-Ho;Song, Jae-Ki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.805-821
    • /
    • 2011
  • Wireless Sensor Networks (WSNs) are rapidly emerging because of their potential applications available in military and civilian environments. Due to unattended and hostile deployment environments, shared wireless links, and inherent resource constraints, providing high level security services is challenging in WSNs. In this paper, we revisit various security attack models and analyze them by using a well-known standard notation, Unified Modeling Language (UML). We provide a set of UML collaboration diagram and sequence diagrams of attack models witnessed in different network layers: physical, data/link, network, and transport. The proposed UML-based analysis not only can facilitate understanding of attack strategies, but can also provide a deep insight into designing/developing countermeasures in WSNs.

A Study on Information Security in the Information Society (정보사회에서의 정보보안에 관한 연구)

  • Cho, Chan-Sik
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.34 no.1
    • /
    • pp.155-180
    • /
    • 2000
  • As informatization has been accelerated, the secure information flow has become a major social concern. In that, this paper examines the theoretical background of the information society and the concept of universal service; compares the contrasting perspectives on the social meanings of information; analyzes the definition, importance, and components of information security and suggests some strategies on information security centering around the technical and institutional aspects of it. In so doing, this study aims at establishing the information security and at enhancing our understanding on the information society.

  • PDF

ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI (ETRI AI 실행전략 7: AI로 인한 기술·사회적 역기능 방지)

  • Kim, T.W.;Choi, S.S.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.67-76
    • /
    • 2020
  • Because of the development and spread of artificial intelligence (AI) technology, new security threats and adverse AI functions have emerged as a real problem in the process of diversifying areas of use and introducing AI-based products and services to users. In response, it is necessary to develop new AI-based technologies in the field of information protection and security. This paper reviews topics such as domestic and international trends on false information detection technology, cyber security technology, and trust distribution platform technology, and it establishes the direction of the promotion of technology development. In addition, the development of international trends in ethical AI guidelines to ensure the human-centered ethical validity of AI development processes and final systems in parallel with technology development are analyzed and discussed. ETRI has developed AI policing technology, information protection, and security technologies as well as derived tasks and implementation strategies to prepare ethical AI development guidelines to ensure the reliability of AI based on its capabilities.

Study on Development of Framework of Company Classification in Information Security Perspective (정보보호 관점의 기업 유형 분류 프레임워크 개발에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.3
    • /
    • pp.18-29
    • /
    • 2016
  • For most organizations, a security infrastructure to protect company's core information and their technology is becoming increasingly important. So various approaches to information security have been made but many security accidents are still taking place. In fact, for many Korean companies, information security is perceived as an expense, not an asset. In order to change this perception, it is very important to recognize the need for information security and to find a rational approach for information security. The purpose of this study is to present a framework for information security strategies of companies. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. To develope measures to classify the types of companies, 12 information security professionals have done brainstorming, and based on previous studies, among the factors that have been demonstrated to be able to influence the information security of the enterprise, three factors have been selected. Delphi method was applied to 29 security experts in order to determine sub items for each factor, and then final items for evaluation was determined by verifying the content validity and reliability of the components through the SPSS analysis. Then, this study identified characteristics of each type of eight companies from a security perspective by utilizing the developed sub items, and summarized what kind of actual security accidents happened in the past.

A Study on Interdependence of Private Security and Techniques of CPTED (민간경비와 환경설계를 통한 범죄예방(CPTED) 기법의 상호의존성에 관한 연구)

  • Lee, Jung-Duk;Lim, You-Seok
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.223-249
    • /
    • 2011
  • In modern society, citizens' quality of life aspects of safety and crime prevention activities are actively considering the incidence of crime prevention in advance. It also can be quite important elicit the interest of who community members through effective crime prevention strategies. For crime prevention policies and techniques over time as more scientific and advanced methods are made. Today, A typical crime prevention strategies is private security zones and Crime Prevention Through Environmental Design (CPTED) is a corresponding to the new strategy. CPTED is a diversification can be called a crime prevention approach that emphasizes the principle of natural surveillance, access control, territoriality, activity support, maintenance and management. The defensible space of the space area related to crime prevention setting the activities of private security and CPTED determine. Also, the reality of crime prevention and protection should be considered space. The emphasis on proactive prevention of crime in modern society for the prevention of crime how to approach differing perspectives and disparate aspects of private security and CPTED. Technical and professional areas that overlap to some extent in a homogeneous aspect. Ultimately, CPTED is a crime prevention through space and environmental approach for crime. In addition, Ultimate goal of convergence, crime prevention, with the same or higher is required to study for the area after looking for the characteristics and limitations of private security and CPTED.

  • PDF

Design and Implementation of a Smishing Message Detection System Using NLP and PunyCode Conversion Techniques (NLP와 PunyCode 변환 기법을 활용한 스미싱 메시지 탐지 시스템 설계 및 구현)

  • Joongjin Kook;Keonhee Lee;Juhwan Kim;Jaehyeok Oh;Jaehan Park;Jungeun Park
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.3
    • /
    • pp.115-120
    • /
    • 2024
  • As smartphones become more integral to daily life, security concerns, particularly regarding smishing, have risen significantly. With the increasing frequency and variety of smishing attacks, current detection methods struggle to provide effective solutions, with most commercial algorithms achieving around a 70% detection rate. This paper proposes a novel approach to enhancing smishing detection accuracy by utilizing Natural Language Processing to analyze message syntax and semantics, combined with URL Punycode conversion and whitelist techniques. The approach focuses on improving detection through comprehensive message analysis, aiming to address the limitations of existing preventive methods. The proposed system offers conceptual improvements in smishing detection strategies, providing a more robust framework for addressing evolving security challenges.

  • PDF

Automated Generation of Optimal Security Defense Strategy using Simulation-based Evolutionary Techniques (시뮬레이션 기반 진화기법을 이용한 최적 보안 대응전략 자동생성)

  • Lee, Jang-Se;Hwang, Hun-Gyu;Yun, Jin-Sik;Park, Geun-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2514-2520
    • /
    • 2010
  • The objective of this paper is to propose the methodology for automated generation of the optimal security defense strategies using evolutionary techniques. As damages by penetration exploiting vulnerability in computer systems and networks are increasing, security techniques have been researched actively. However it is difficult to generate optimal defense strategies because it needs to consider various situations on network environment according to countermeasures. Thus we have adopted a genetic algorithm in order to generate an optimal defense strategy as combination of countermeasures. We have represented gene information with countermeasures. And by using simulation technique, we have evaluated fitness through evaluating the vulnerability of system having applied various countermeasures. Finally, we have examined the feasibility by experiments on the system implemented by proposed method.

Conflicts between the US and China over the South China Sea and Korea's Responses (남중국해를 둘러싼 미·중간의 갈등과 한국의 대응)

  • Kim, Kang-nyeong
    • Strategy21
    • /
    • s.42
    • /
    • pp.154-195
    • /
    • 2017
  • This paper is to analyse conflict between the US and China over the South China Sea and Korea's responses. To this end the paper is composed of 6 chapters titled instruction; the current status of South China Sea sovereignty disputes; changes in US and Chinese maritime security strategies and the strategic values of the South China Sea; key issues and future prospects for US-China conflicts in the South China Sea; South Korea's security and diplomatic responses; and conclusion. The recent East Asian maritime security issue has evolved into a global issue of supremacy between the US and China, beyond conflicts over territorial disputes and demarcation among the countries in the region. China is pursuing offensive ocean policy to expand economic growth. The core of the maritime order that the United States intends to pursue is the freedom of navigation in the oceans and the maintenance of maritime access. China is making artificial islands in the South China Sea, claiming the sovereignty of these islands, building strategic bases in East Asia, and securing routes. The United States has developed several "Freedom of Navigation Operations" to neutralize the declaration of the territorial sea surrounding Chinese artificial islands. We can not be free from marine conflicts in the South China Sea and the East China Sea. Regarding the South China Sea dispute, it is expected that the strategic competition and conflict between the two countries will intensify due to China's failure to make concessions of core interests and adherence to the US compliance with international norms. In the midst of conflict over the South China Sea, we need a harmonious balance between our alliance security and economic diplomacy. We must continue our efforts to strengthen the ROK-US alliance but not to make China an enemy. Considering the significant impacts of the oceans on the survival and prosperity of the nation, we must continue to develop our interest in the oceans, appropriate investments and tactical strategies.