• Title/Summary/Keyword: human-centered security design

Search Result 13, Processing Time 0.025 seconds

A Study on the Deployment Strategy of Zero Trust Security Model Based on Human-Centered Security Design (인간중심보안설계 기반 제로 트러스트 보안모델 전개방안에 관한 연구)

  • Jin-Yong Lee;Byoung-Hoon Choi;Sujin Jang;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.1-7
    • /
    • 2024
  • Traditional security model design presents two primary issues. First, these models have been developed and implemented with a technology-centered approach rather than considering human factors. Such structures can be undermined by cognitive vulnerabilities like psychological resistance within organizations and user errors. Second, these models are typically designed based on network perimeter security. This design is unsuitable for the boundary-less remote work environments rapidly becoming prevalent due to the Fourth Industrial Revolution and the COVID-19 pandemic. This paper proposes an approach to address these limitations by integrating human-centered threats within the Zero Trust security model, a state-of-the-art boundary-less security framework. By doing so, we suggest a robust security model design that can protect against both technical and human-centered threats.

A Study on Efficient Human Resource Management Methodology Design for Human-centered Security Management System Implementation in IoT Environment (IoT환경에서 인간중심 보안관리체계 구축을 위한 효율적 인적자원관리 방법론 설계 연구)

  • Ryu, Bora;Lee, Hyojik;Na, Onechul;Chang, Hangbae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.428-430
    • /
    • 2015
  • 보안은 오직 기술을 관리하는 것이 아닌 사람관리, 조직관리, 경영관리이다. 그 중에서도 인적자원은 모든 산업에서 가장 중요한 자원임과 동시에 보안의 측면에서 볼 때 가장 통제해야 하는 존재이다. 이는 산업보안에서 가장 큰 이슈인 산업기술 기밀 유출이 주로 전 현직 임직원 및 협력업체 직원 등 인적자원을 통했기 때문이다. 미래 산업의 중심이 될 IoT환경에서는 산업기술이 핵심자산이므로 이에 더 주목해야 할 필요가 있다. 이처럼 인적자원에 대한 통제와 관리가 산업보안에서 중요한 의미를 갖는 것에 비해 기존의 보안관리체계의 통제항목은 대부분 IT적인 부분에 치중되어있다. 또한, 체계적인 운영이 부족하고, 산업스파이, 정보절취 등 다양한 위험요소가 존재한다. 특히, 인적자원은 완벽한 예측이 불가능하므로 위험을 최소화하는 방법을 고안해 대는 것에 유념하여 IoT환경에서의 인간중심적인 보안관리체계 구축해야한다. 이를 위해 기존의 정보보호 관리체계 분석을 통하여, 기존의 인적보안 지침들의 적합성을 따져 우선순위를 적용하여 효율적인 인적자원관리 방법론을 설계하였다. 본 연구결과는 보유자원을 가장 효율적으로 활용하여, 그 조직에 적합한 보안체계를 구축하는데 도움이 될 것으로 기대된다.

A Study on the Wireless Door Lock System with Advanced Encryption Standard(AES) in Design (암호화기술을 적용한 무선 도어락시스템 디자인에 대한 연구)

  • 유보현
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.179-190
    • /
    • 2004
  • The human effort to make personal privacy and safety from outer environment has brought the improvement of security system through the technological development. Especially as a apartment dwelling and lifestyle is general, the role and function of door lock system is more important than ever. The research for user-centered approach and design on the door lock system should be implemented under the circumstances. This study has focused on the development of making safety as well as easy interface to design door lock system. The price also is competitive as compared with other door lock products. The goal of this study is to propose the alternatives not only to develop door lock design but also to search the innovative way of locking system design.

  • PDF

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

Reinterpretation of Reflexive Modernization to Overcome Risk Society (위험사회 극복을 위한 『성찰적 근대화』의 재해석)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.277-301
    • /
    • 2018
  • Korean society is a mixed risk society in terms of risk and distrust. This is because the risks and disasters of the farming and industrial societies, the modern and the information society, exist simultaneously in the present time. Ulrich Beck's point that the endless development of science and technology to acquire economic wealth is simultaneously entering a risk society is providing us with many implications. In this paper, we reviewed the Ulrich Beck's "reflexive modernization" theory in the late 20th century, pointing to the rise of a risk society as a result of the evolution of new modernization. This is because the "reflexive modernization" can be a direction in which we can reflect our wrong past from a human-centered perspective and design a desirable future. In this sense, it is important to present ways to overcome the dangerous society through the reinterpretation of Ulrich Beck, who advocated the modernization of reflectively. In order to overcome the future risks that the fourth industrial revolution will bring, we must provide direction for the government's security policies and public security consciousness.

A Landscape Design Study on Chung Ra Pro-Environmental Park (청라환경공원 조성 설계연구)

  • 신현돈
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.32 no.1
    • /
    • pp.104-126
    • /
    • 2004
  • The recognition of the environment and its importance have generated various types of parks, such as the ecological put the environmental put and the natural academy. They are considered the connecting media for the creation of space as a new paradigm in design for the 21st century from the late 1990s, environmental designs in space planning have been created from various angles of Perspectives including restoration of the natural ecosystem and introduction of natural circulation systems. Based on the aye facts and through theoretical examination of environmental park models, this research (1) establishes the concept and the significance of environmental parte; and, based on this, classifies the types of industrial sublimity; (2) presents environmental designing principles and standards; and (3) presents the "Chung Ra pro-Environmental Park plan" based on these ideas. The following is the summary of research results: First, while existing city parks are human-oriented, interior-oriented, and shape-centered, an environmental park considers human and nature equally and gives great importance to the relationship between the internal and external of the subject. It is a mark of environmental education that considers the natural ecosystem. Therefore, the environmental park is the 21st Century′s type of an open park for creating new forms of nature, as well as for incorporating culture and values through education. In such an environmental system, nature, culture, and human beings pursue balance, harmony, and security through mutual recognition. Second, in a broad sense, the types of environmental park can be classified into Cultural Restoration, Ecological Conservation, and Environmental Replacement. Third, by selecting Chung na environmental park in Incheon, which is a filtration plant lot, as a research subject, I have presented alternative planning for environmental parte in which culture and nature coexist on the basis of environmental planning principles and standards.

Tangible Tele-Meeting in Tangible Space Initiative

  • Lee, Joong-Jae;Lee, Hyun-Jin;Jeong, Mun-Ho;Jeong, SeongWon;You, Bum-Jae
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.762-770
    • /
    • 2014
  • Tangible Space Initiative (TSI) is a new framework that can provide a more natural and intuitive Human Computer Interface for users. This is composed of three cooperative components: a Tangible Interface, Responsive Cyber Space, and Tangible Agent. In this paper we present a Tangible Tele-Meeting system in TSI, which allows people to communicate with each other without any spatial limitation. In addition, we introduce a method for registering a Tangible Avatar with a Tangible Agent. The suggested method is based on relative pose estimation between the user and the Tangible Agent. Experimental results show that the user can experience an interaction environment that is more natural and intelligent than that provided by conventional tele-meeting systems.

Design and Implementation of Financial Security Automatic System for Privacy Information of Financial Institution (금융기관 개인정보 자산 분석 자동화 시스템의 설계와 구현)

  • Lee, Jeong-Min;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.25-30
    • /
    • 2015
  • One of the hottest issues of security is information leakage of financial institution. Financial institutions including commercial banks are frequently threatened by attempts of leakage through hacking and vulnerability, and this information is centered on personal information of their clients. Through this study, I found out that security managers of financial institutions are trying to prevent the leaking of private information, but in fact most of them barely know where their personal information is. Even if they know where it is and trace the data, it is often found in unexpected places. Because there is a lot of waste in time and human resources as search is done manually, we have understood that responding to IT Compliance requires a lot of effort. This study is to improve IT Compliance response and protect information leakage through monitoring PC and servers, the main storage of personal information by automated system, periodically.

A Review of Human Element Issues of Remote Operators on Maritime Autonomous Surface Ships (자율운항선박의 개발 및 운용을 위한 육상 운항사의 인적요인 이슈 고찰)

  • Kim, Hong-Tae;Yang, Young-Hoon
    • Journal of Navigation and Port Research
    • /
    • v.43 no.6
    • /
    • pp.395-402
    • /
    • 2019
  • The development and operation of the MASS (Maritime Autonomous Surface Ship) is being actively discussed for more efficient and safer maritime transportation solutions. The autonomous navigation technology has positive aspects such as the prevention of marine accidents, improvement of fuel efficiency of ships and cost reduction, and negative aspects such as job loss, task change, and security problems. It is expected that there will be new human element issues such as the situation awareness of remote operators, because the shore-based control will be conducted when fully autonomous ships are in operation. In this paper, we consider major human element issues that should be factored in the development and operation of MASS, and suggest a method of HRA (Human Reliability Analysis) for P IFs (Performance Influencing Factors) of the remote operators that are expected according to the shore-based control.

A design of Key Exchange Protocol for User Centered Home Network (사용자 중심의 홈네트워크를 위한 키 교환 프로토콜 설계)

  • 정민아
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.654-660
    • /
    • 2004
  • In this paper, we define that pervasive home network, which provides necessary services for user properties and removes distractions to improve the quality of human life. So, user can enjoy home network technology including devices and softwares at any place with no knowledge of networked home, devices, and softwares. In this home network, a mobile agent, called LAFA, can migrate to unfamiliar home network and control the necessary devices. For this environment, we design security management module for authenticating user and home server that access some other home networks, and for protecting text, multimedia data, and mobile agent that are transferred between home networks. The security management module is composed of a key exchange management module and an access control management module, for key exchange management module, we propose a key exchange protocol, which provides multimode of authentication mode and key exchange mode. One of these two modes is selected according to the data type.