• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.03 seconds

A Study on the Perceptions of Drivers on the Traffic Police With the case of Andong City (교통경찰에 대한 운전자의 의식조사 - 안동시의 사례를 중심으로-)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.4
    • /
    • pp.119-136
    • /
    • 2001
  • A mission of the police as described by law is to guard the life, body and property of all citizens. Such duties should be accurately performed based on legal and democratic procedures because the works of the police are directively influencing the overall lives of the citizens by restricting their freedom. The national police agency is setting up the figure of the police trusted and beloved by citizens. The strategies of police reform is to recognize the proposition of 'change the mind and you will see the bright future' and the historical mission of 'It is possible to survive only through the reform'. We are frequently watching the traffic police on the street or road. Traffic policing aims to reduce crime and the opportunities for criminal activity in relation to the use of roads, that is to improve road user behavior in order to reduce accidents. This study examines perceptions of drivers on the traffic police. For this purpose, this study surveys the opinion and view of drivers in Andong city based on the survey research and interview methods. The major findings of this study is as follows. Many drivers in Andong city evaluate negatively the kindness toward civilians, fair(rational) law enforcement of traffic police. So, this study suggests the improvement of the traffic police image.(for example, kindness toward civilians, service attitude, fair and rational law enforcement, etc)

  • PDF

Implementation of Methodology & Tool for Communication Safety Guarantee in Railway System (철도시스템 통신 안전성 확보를 위한 방법 제시 및 도구 구현)

  • Jo, Hyun-Jeong;Hwang, Jong-Gyu;Kim, Yong-Kyu
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.59 no.1
    • /
    • pp.10-17
    • /
    • 2010
  • Safety-critical systems related to the railway communications are currently undergoing changes. Mechanical and electro-mechanical devices are being replaced by programmable electronics that are often controlled remotely via communication networks. Therefore designers and operators now not only have to contend with component failures and user errors, but also with the possibility that malicious entities are seeking to disrupt the services provided by theirs systems. Recognizing the safety-critical nature of the types of communications required in train control operations, the communications infrastructure will be required to meet a number of safety requirements such as system faults, user errors and the robustness in the presence of malicious attackers who are willing to take determined action to interfere in the correct operation of a system. In this paper, we proposed the safety strategies employed in the railway communications and a security mechanism for Korean railway communication system. Also, we presented the developed means for validation and determination of communication safety based on the proposed security mechanism in the railway system.

A Novel Trust Establishment Method for Wireless Sensor Networks

  • Ishmanov, Farruh;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1529-1547
    • /
    • 2015
  • Establishment of trust is important in wireless sensor networks for security enhancement and successful collaboration. Basically, a node establishes trust with other nodes by estimating a trust value based on monitored behavior of the other nodes. Since a malicious/misbehaving node might launch different attack strategies and might demonstrate random misbehavior, a trust estimation method should be robust against such attacks and misbehavior. Otherwise, the operation of trust establishment will be meaningless, and performance of an application that runs on top of trust establishment will degrade. In this paper, we propose a robust and novel trust estimation method. Unlike traditional trust estimation methods, we consider not only the weight of misbehavior but also the frequency of misbehavior. The frequency-of-misbehavior component explicitly demonstrates how frequently a node misbehaves during a certain observed time period, and it tracks the behavior of nodes more efficiently, which is a main factor in deriving an accurate trust value. In addition, the weight of misbehavior is comprehensively measured to mitigate the effect of an on-off attack. Frequency and weight of misbehavior are comprehensively combined to obtain the trust value. Evaluation results show that the proposed method outperforms other trust estimation methods under different attacks and types of misbehavior.

A Study for Ammunition Integrated Logistics Support System Development (탄약종합군수지원 업무체계 발전에 관한 연구)

  • Han, Ho Seok;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.23-30
    • /
    • 2015
  • Integrated Logistics Support can effectively respond to future wars and through the smooth logistics support activities bring a win in wars. Future warfare is very complex compare to Modern Warfare and required high level of strategies and tactics. Also, it is expected that the future war will be high-intensity war using high-tech weapon systems. Therefore, in this study, I look forward to the effective logistic support through the development of ammunition integrated logistics support which is a part of integrated logistics support(ILS). In addition, by studying a step-by-step system and supporting element of ammunition integrated logistics support, we can find the errors related to ammunition integrated logistics support system and suggest the direction to improve the system.

Factors Affecting Continuous Usage Intention of Mobile Closed Social Network Services: In-depth Interviews and An Empirical Investigation (모바일 폐쇄형 SNS의 지속적 이용의도에 영향을 미치는 요인: 심층인터뷰와 실증분석)

  • Shao, Zehua;Koh, Joon
    • The Journal of Information Systems
    • /
    • v.24 no.3
    • /
    • pp.21-46
    • /
    • 2015
  • Purpose Social Network Service (SNS) users feel fatigue in process of using open type of SNS like Facebook and Twitter. Compared to the open SNS, the closed SNS takes an closed form to prevent privacy exposure, and they are more practical and advantageous to form deeper social relationships. This study attempt to examine the effects of the mobile closed SNS characteristics (such as usefulness, playfulness, perceived security, psychological privacy, social influence, and belonging) on the users' continuous SNS usage intention. Design/methodology/approach This study used a mixed methodology combining in-depth interviews and empirical validation to investigate the effects of the mobile closed SNS characteristics on the continuous SNS usage intention of users. Findings Analytical results from a survey of 210 mobile closed SNS users showed that except perceived security, the effects of the five SNS characteristics on continuous SNS usage intention were significant. These findings contribute to improving the quality of mobile closed SNS services and suggesting SNS related marketing strategies.

A Study on the International Disaster Management Strategies and Standard Support System for Global Disaster Occurrence (세계적 재난 발생에 따른 국제방재전략 및 표준지원체계 조사·연구)

  • Park, Dugkeun;Oh, Jeongrim;Song, Youngkarb;Lee, Minseok
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.3
    • /
    • pp.25-30
    • /
    • 2009
  • The magnitude and frequency of international disaster recovery aids and supports by the United Nations and other donor countries to least developed countries are increasing due to the emerging risks such as super typhoons and consequently worsened impacts by those disasters. With emergency recovery aids, systems for disaster mitigation and preparedness are also needed to the countries hit by disasters. Through the KOICA programs, the Korean government is trying to establish an effective disaster support system for disaster-hit countries. This study reviews current post-disaster aid systems of various countries and international organizations and proposes improved disaster aid system for the Korean government. The improved system can be used in the assistance of effective and enlarged international recovery activities promoting Korean government's status in the international disaster management society.

  • PDF

A Knowledge Workers Acquisition Problem under Expanding and Volatile Demand: An Application of the Korean Information Security Service Industry

  • Park, Hyun-Min;Lim, Dae-Eun;Kim, Tae-Sung;Kim, Kil-Hwan;Kim, Soo-Hyun
    • Management Science and Financial Engineering
    • /
    • v.17 no.1
    • /
    • pp.45-63
    • /
    • 2011
  • The aim of this paper is to consider the process of supplying trained workers with knowledge and skills for upcoming business opportunities and the process of training apprentices to be prepared to meet future demands in an IT service firm. As the demand for new workers fluctuates, a firm should employ a buffer workforce such as apprentices or interns. However, as a result of rapid business development, the capacity of the buffer may be exceeded, thus requiring the company to recruit skilled workers from outside the firm. Therefore, it is important for a firm to map out a strategy for manpower planning so as to fulfill the demands of new business and minimize the operation costs related to training apprentices and recruiting experienced workers. First, this paper analyzes the supply and demand of workers for the IT service in a knowledge-intensive field. It then presents optimal human resource planning strategies via the familiar method of stochastic process. Also, we illustrate that our model is applied to the human resource planning of an information security service firm in South Korea.

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.

Neighbor Cooperation Based In-Network Caching for Content-Centric Networking

  • Luo, Xi;An, Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2398-2415
    • /
    • 2017
  • Content-Centric Networking (CCN) is a new Internet architecture with routing and caching centered on contents. Through its receiver-driven and connectionless communication model, CCN natively supports the seamless mobility of nodes and scalable content acquisition. In-network caching is one of the core technologies in CCN, and the research of efficient caching scheme becomes increasingly attractive. To address the problem of unbalanced cache load distribution in some existing caching strategies, this paper presents a neighbor cooperation based in-network caching scheme. In this scheme, the node with the highest betweenness centrality in the content delivery path is selected as the central caching node and the area of its ego network is selected as the caching area. When the caching node has no sufficient resource, part of its cached contents will be picked out and transferred to the appropriate neighbor by comprehensively considering the factors, such as available node cache, cache replacement rate and link stability between nodes. Simulation results show that our scheme can effectively enhance the utilization of cache resources and improve cache hit rate and average access cost.

A Study on Communication Safety and Evaluation Tool in Railway Communication System (열차제어시스템 통신 안정성 및 평가 도구 연구)

  • Kim, Sung-Un;Seo, Sang-Bo;Song, Seung-Mi;Jo, Chan-Hyo;Hwang, Jong-Gyu;Jo, Hyun-Jeong
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.343-352
    • /
    • 2008
  • Safety-critical systems related to the railway communications are currently undergoing changes. Mechanical and electro-mechanical devices are being replaced by programmable electronics that are often controlled remotely via communication networks. Therefore designers and operators now not only have to contend with component failures and user errors, but also with the possibility that malicious entities are seeking to disrupt the services provided by theirs systems. Recognizing the safety-critical nature of the types of communications required in rail control operations, the communications infrastructure will be required to meet a number of safety requirements such as system faults, user errors and the robustness in the presence of malicious attackers who are willing to take determined action to interfere in the correct operation of a system. This paper discusses the safety strategies employed in the railway communications and proposes a security mechanism for Korean railway communication system. We present the developed communication safety evaluation tool based on the proposed security mechanism and also evaluate its protecting capability against the threats of masquerading, eavesdropping, and unauthorized message manipulation.

  • PDF