• Title/Summary/Keyword: Security tasks

Search Result 357, Processing Time 0.021 seconds

A Study on Organizational Structure and Computer Security Systems in Ubiquitous Environments (유비쿼터스 서비스 경영 환경에서 조직 구조 및 컴퓨터 보안 시스템에 관한 연구 - 외식 업체 적용 방안을 중심으로 -)

  • Yi, Myoung-Hee;Yu, Jae-Eon;Jung, Chang-Duk
    • Culinary science and hospitality research
    • /
    • v.13 no.4
    • /
    • pp.305-316
    • /
    • 2007
  • This paper examines that a desirable organizational structure for a security policy in ubiquitous environments that are based on users' need to know and do their tasks in organizations. Tasks are a common entity which already exit and relate directly to both users(who are assigned to tasks and to information required for the completion of a task). Ubiquitous is highlighted as IT paradigm of the future generation. We propose a security model, called the Ubiquitous Group Security Model(UGSM), which associates with a task of processing the information which users need to know. The access type specification restricts the operations that users are permitted to perform, as defined by users' need to do for achieving their tasks in organizations.

  • PDF

An Exploratory Study on Extracting Industrial Security Jobs and Competencies in the National Competency Standard(NCS):Focusing on the Unclassified Security Area (국가직무능력표준(NCS)에서의 산업보안 직무 및 직무능력 추출을 위한 탐색적 연구:NCS 미분류 보안영역을 중심으로)

  • Lim, Dongsun;Shin, Eunhee;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.25-32
    • /
    • 2020
  • In the midst of the rising need for Industrial Security experts, the development of National Competency Standards(NCS) with regards to industrial security is a very important and urgent task. The NCS standardizes university-level academic curriculum and qualification systems and connects them with the industry's needs. This study has extracted, classified and analyzed security-related jobs and tasks requiring security expertise that is required within NCS. Through this study, many tasks have been confirmed to require security competencies that are different from those in IT-security, physical security that already exist as a NCS tasks. It is expected that the industry's needs of industrial security expertise will be reflected in future NCS development, which will be used as basic data for systematizing industrial security jobs and competency.

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region (서울지역 5개 대학 보안 전공들의 보안소프트웨어의 개발 직무에 필요한 보안 교육 훈련 프로그램 특성)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.16-22
    • /
    • 2020
  • In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.

A Light-weight, Adaptive, Reliable Processing Integrity Audit for e-Science Grid (e-Science 그리드를 위한 가볍고, 적응성있고, 신뢰성있는 처리 무결성 감사)

  • Jung, Im-Young;Jung, Eun-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.181-188
    • /
    • 2008
  • E-Science Grid is designed to cope with computation-intensive tasks and to manage a huge volume of science data efficiently. However, certain tasks may involve more than one grid can offer in computation capability or incur a long wait time on other tasks. Resource sharing among Grids can solve this problem with proper processing-integrity check via audit. Due to their computing-intensive nature, the processing time of e-Science tasks tends to be long. This potential long wait before an audit failure encourages earlier audit mechanism during execution in order both to prevent resource waste and to detect any problem fast. In this paper, we propose a Light-weight, Adaptive and Reliable Audit, LARA, of processing Integrity for e-Science applications. With the LARA scheme. researchers can verify their processing earlier and fast.

Unification of the Korean Peninsula and Military Integration Focusing on the Military Tasks (한반도 통일과 군사통합 (군사적 과제를 중심으로))

  • Han, Kwan Soo
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.125-134
    • /
    • 2015
  • This study aims to investigate what to be prepared and implemented for the military integration when South and North Korea are making progress toward unification. Although we can not exactly predict when the unification will be completed at this time, preparations for the military integration should be ready ahead of time. Since the failure of the military integration can threat the unification, elaborated and practical solutions are required. Therefore, the study tries to answer the following questions : 1) What types of the military integration are desirable and what are the prerequisites for the unification of Korean Peninsular? ; 2) What potential military tasks could be caused by military integration? ; 3) What are the core and major tasks among them and how could they be solved in practical aspects?

Study for academic establishment of phase of Department of Security Service (경호학의 학문적 위상정립을 위한 고찰)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.197-205
    • /
    • 2013
  • Security Service is the study for social safety and maintenance of order. Compared with the industrial circle, it has only been 18 years, though, many-sided scholars have been interested in this field and tried. The present Security Service, however, has several problems, so it is difficult to gain recognition as the value of learning. To achieve this, several kinds of prior tasks should get solved. First, Preparation for agreement between Industry and University about the academic concept and establishment of range. Second, Set up the School Register System for the academic establishment of identity. Third, Preparation of the plan for the organization of education system. Fourth, Study Direction different from the industrial world. (Unconcern) Therefore, the alternatives centered on some prior tasks will be suggested to enhance the identity and value of Security Service as the study.

Educational Needs Analysis of General Security Jobs in Physical Protection Field using the DACUM Technique (DACUM기법을 활용한 물리적방호 분야 일반보안 직무의 교육 요구분석)

  • Lee, Jin Gu;Jung, Il Chan;Park, Min Ju
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.234-246
    • /
    • 2021
  • The purpose of this study is to develop the main subjects of the job-based curriculum by deriving the job analysis results of general security job workers in the physical protection field responsible for responding to threats to nuclear materials and nuclear facilities. In the job analysis stage, FGI was conducted on 7 content experts to derive 8 duties and 55 tasks. In addition, knowledge and skills were drawn for each task. In the analysis of educational needs, surveys were conducted for workers in general security jobs to derive the top 25 educational priorities through t-test and Borich needs assess model. At the stage of selecting core tasks and organizing required/optional contents, 42 tasks, both above average or at least one of them, were derived as core tasks based on the result of evaluation of importance and difficulty ratings of 55 tasks through a questionaire. In addition, tasks applied to the top 25 rankings derived from Borich needs assess model were applied as the required contents when designing courses, and tasks which applied only one of them were selected as optional contents. At the stage of required/optional modules and educational contents, four required modules and five optional modules were derived by drifting similar tasks between the required and optional contents. Based on the above results, the study suggested academic and practical implications and future suggestions.

Policy Tasks in the Enforcement of the Police Order With Regard to Electronic Security (기계경비업무 감독명령 시행의 정책과제)

  • Ha, Kyungsu;Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.200-207
    • /
    • 2014
  • In this research, The Police Order No. 2013-1, which is 'Electronic Security 112 Report Standards,' was analyzed and the relevant policy tasks were presented. The policy tasks to achieve the purpose of the selective report system are as follows. First, in order to construct the statistics base, the establishment of the terms related to false alarm and false call, emergency button, and sensing signal and the development of the appropriate term to replace the electronic security guard are needed. Second, the electronic security companies should build the response system to abide by the 112 report standards of the police order. Third, the police should reexamine the establishment of the emergency report objects of the selective report system. Fourth, the reinforcement of the administrative regulation and supervision to enforce the police order strictly is required.

Android Operating System: Security Features, Vulnerabilities, and Protection Mechanisms

  • AlJeraisy, Lulwa Abdulmajeed;Alsultan, Arwa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.367-372
    • /
    • 2022
  • In the age of smartphones, users accomplish their daily tasks using their smartphones due to the significant growth in smartphone technology. Due to these tremendous expansions, attackers are highly motivated to penetrate numerous mobile marketplaces with their developed malicious apps. Android has the biggest proportion of the overall market share when compared to other platforms including Windows, iOS, and Blackberry. This research will discuss the Android security features, vulnerabilities and threats, in addition to some existing protection mechanisms.

Conceptual bases of the Investment Mechanism of the Innovative Activity of Enterprises in the Context of Achieving the Tasks of Strategic Development

  • Komandrovska, Veronika;Kolesnyk, Maksym;Barkova, Kateryna;Vasylyk, Sergii;Dorofieiev, Denys
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.111-118
    • /
    • 2021
  • The authors of the study highlight the conceptual foundations of the investment mechanism of innovation of enterprises in the context of strategic development. Such indicators of investment attraction for the enterprise as investment attractiveness, investment activity of the enterprise, critical mass of investments, minimum sufficiency of investments and others are singled out. It is proved that the balance of investment resources is facilitated by the action of the investment mechanism of innovation activity at the enterprise in the context of achievements of strategic development tasks. Investment processes and their intensification have an impact on the expansion of production capacity of economic entities in strategic development and on improving the efficiency of existing capacities. The investment mechanism of innovative activity at the enterprise in the context of achievement of tasks of strategic development contains system of complex actions which provides: definition of the clear purpose and tasks for the mechanism and achievement of the purposes of the enterprise; assessment of the investment potential of the enterprise; definition of tasks of innovative development of enterprises and investment resources necessary for this purpose, etc. The tasks of the investment mechanism of innovative activity at the enterprise in the context of achievements of tasks of strategic development and its economic, organizational and information components are singled out, as well as levers of influence and regulators of the investment mechanism of innovation in the enterprise.