• Title/Summary/Keyword: industrial security expert

Search Result 24, Processing Time 0.028 seconds

A Study on the Policy Development for Activation of Industrial Security Professional Qualifications (산업보안 전문자격 활성화를 위한 정책개발 연구)

  • Kim, Hwayoung;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.3-9
    • /
    • 2019
  • The importance of Industrial Security is continuously growing along with the rapid development of convergence technologies. Accordingly, it is expected for the gap between the supply and demand of industrial security professional personnel to grow every year. In order to reduce the supply and demand of industrial security, it is important to not only train professional qualifications but at the same time, secure a professional qualification acquisitor. In this regard, South Korea has introduced the Industrial Security Expert qualification as a non-governmental qualifications ince 2010. From 2017, promoted as nation-certified qualification and has supported activities as expert in industrials ecurity field. However, it is reality that Industrial Security Expert qualification has not yet to be recognized as professional qualification in the field of industry, have low rate of utilization as academic research is also shown the sign of stagnation. Based on these background, this research set goal in deducing a activation method for industrial security professional qualification concentrating on Industrial Security Expert qualification. The analysis on operation condition of Industrial Security Expert qualification and related precedent research was conducted and raised four types of activation method, which are organizational aspect, certification system improvement and operation aspect, certification acquisitors' utilization aspect and professionalism enhancement aspect.

The Study of a Development Plan of the Industrial Security Expert System (산업보안관리사 자격제도 발전 방안에 대한 고찰)

  • Cho, Yong-Sun
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.175-207
    • /
    • 2014
  • This paper focuses on the study of a development direction of the industrial security Expert system. First of all, in order to manage Industrial security system, we need to have law, criminology, business and engineering professionals as well as IT experts, which are the multi-dimensional convergence professionals. Secondly, industrial organizations need to have workforce who can perform security strategy; security plan; security training; security services; or security system management and operations. Industrial security certification system can contribute to cultivate above mentioned professional workforce. Currently Industrial Security Expert(ISE) is a private qualification. However, the author argued that it have to be changed to national qualification. In addition, it is necessary that the system should be given credibility with verifying the personnel whether they are proper or not in the their field. In terms of quality innovation, it is also necessary that distinguish the levels of utilization of rating system of the industrial security coordinator through a long-term examination. With respect to grading criteria, we could consider the requirements as following: whether they must hold the degree of the industrial security-related areas of undergraduate or postgraduate (or to be); what or how many industrial security-related courses they should complete through a credit bank system. If the plan of completing certain industrial security-related credits simply through the credit bank system, without establishing a new industrial security-related department, has established, then industrial security study would be spreaded and advanced. For private certification holders, the problem of the qualification succeeding process is important matter. Additionally, it is necessary to introduce the certifying system of ISMS(Industrial Security Management System) which is a specialized system for protecting industrial technology. To sum up, when the industrial security management system links the industrial security management certification, industrial security would realize in the companies and research institutions dealing with national key technology. Then, a group synergy effect would occurs.

  • PDF

Improvement Plan to Expand the Role of Expert Data Combination Agency (결합전문기관의 역할 확대를 위한 개선방안)

  • GiBum Kim;Hun-Yeong Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.99-116
    • /
    • 2023
  • The importance of data in the era of the 4th industrial revolution, a hyper-connected society based on information technology such as data and AI, is increasing, and the government is actively enacting and revising laws to revitalize the data economy. It is necessary to prevent and improve problems that may set an obstacle to the revitalization of the data industry or setting the wrong direction, such as possibility of conflict between the regulatory law(Personal Information Protection Act) and the Data Activation Act, differences in position by type of specialized agencies, performance scope of Data Specialist Organization and Expert Data Combination Agency, etc. In regard, I would like to analyze the role, current situation, and use cases of Expert Data Combination Agency, listen to field opinions, and derive and introduce measures to expand the role of Expert Data Combination Agency and improve them to vitalize the data economy

Development of the Agro-Industrial Complex for Improving the Economic Security of the State

  • Petrunenko, Iaroslav;Pohrishcuk, Borys;Abramova, Maryna;Vlasenko, Yurii;Halkin, Vasyl
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.191-197
    • /
    • 2021
  • Ensuring the economic security of agro-industrial complexes of Ukrainian regions has become a top-priority task of state regional policy, as their stable functioning is an essential element of economic security of the whole country. It is overcoming threats to the development of the agro-industrial complex that ensures its further effective functioning and has a significant impact on the economic security of our state. Methods: logical method; methods of system analysis; synthesis; economic and statistical method; method of expert assessment; SWOT analysis; economic and mathematical modelling and planning. Results. Characteristic features of economic security have been given. The essence and significance of the agro-industrial complex in improving the economic security of the state have been determined. It has been noted that in recent years, the agro-industrial complex, which acts as a driver of the domestic economy and has a direct impact on the development of the country, has been growing (in 2019 the cereal and legume harvest exceeded 75 million tons, 20,269 thousand tons of potatoes were dug, more than 15 million tons of sunflower, 9,688 thousand tons of vegetables and 2,119 thousand tons of fruits and berries were harvested, meat and egg production increased by 137.5 thousand tons (or 5.8%) and 545.5 million pieces (or 3.4%), respectively, the number of employed population in agriculture increased by 139.8 thousand people (or 4.9%), the labour productivity in crop production increased by UAH 294.4 thousand (or 44.6%), in livestock production - by UAH 311.3 thousand (or 61.8%)). Based on the system of production and economic indicators, the analysis of the state of the agro-industrial complex has been carried out. Taking into account the results of the obtained data and using SWOT-analysis, the major threats to the development of the agro-industrial complex have been identified. Ways of overcoming threats enhancing the economic security of Ukraine have been proposed.

Development of Environmental Security Engineering Through Delphi Survey (델파이 조사를 통한 환경보안공학 개발)

  • Heon-Wook Lim
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.135-140
    • /
    • 2022
  • The purpose of this study is to develop security subjects that require engineering security knowledge. In particular, Engineering knowledge is required to perform security tasks such as smart factory security. However, although there are similar specialties such as mechanical security instructors, industrial security managers, and industrial security specialists(CPP), they are not based on engineering knowledge. Accordingly, Delphi analysis through expert interviews was used to derive a job analysis of security engineering. And I was able to sort out the necessary knowledge. Research Results 1-Line Security for Perimeter Security Architectural Structure, Architectural Dynamics, Including Septed, Control instrumentation including smart factory security for building security with 2-Line security, With 3-Line security, it was divided into ergonomics and mechanical expenses for indoor security. As a result of the survey, by age, those in their 30s showed the highest response with 75.8%, and by job, industrial security officers with 76.4%. This could be seen as a desire for a environmental security engineering certificate by practitioners in the industrial security field.

A Study on the Identification of Cloud Security Risks in the Manufacturing Industry (제조산업 클라우드 보안위험 식별 연구)

  • Junghun Oh;Juno Lee;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.2
    • /
    • pp.3-11
    • /
    • 2024
  • In the trend of digital transformation and the increase in non-face-to-face services triggered by the Fourth Industrial Revolution, the demand for cloud computing services is being sharply stimulated. Currently, the cloud is being introduced in various industrial sectors including public, IT, and finance, and the manufacturing industry is also adopting the cloud to secure future sustainability and is promoting innovation through smart manufacturing. However, it has been found that there are constraints in the adoption of cloud by manufacturing companies due to concerns about security. Existing studies that have identified cloud security risks have been limited to presenting general cloud security risks or technical security risks rather than focusing on the manufacturing industry. Therefore, this study aimed to identify cloud security risks in the manufacturing industry based on the actual concerns in the field. For this, expert interviews and literature research were conducted to newly identify cloud security risks in the manufacturing industry, and the adequacy and urgency of the selected security risks were verified through surveys. Based on this study, if a cloud security management system for the manufacturing industry is designed in the future, it is expected that the adoption of cloud in the manufacturing industry will be more activated.

  • PDF

A Study on Job creation Using PMP in ISE development process (산업보안관리사 개발과정에서 PMP를 활용한 단계별 창직 연구)

  • Yim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.79-86
    • /
    • 2019
  • In a small sense Job creation is the making of certificate and In the big sense the government will create new industries and create jobs accordingly. therefore We used the most similar ISE as an example and linked it with the PMP of PMBOK. And I tried to standardize this process by deriving the detailed knowledge required for the foundation. As a result, eleven stages such as creation of (1) Job creation making plan (2) Offer on registration of private qualification (3) business process analysis (4) Confirmation of test criterion (5) Reception system development (6) Educational book development (7) Assist open lecture (8) TEST notice plan making (9) Implement training for certification (10) Operation of qualifying examination and Never ending training. Afterwards It will become the data for the development of the Professional making a job in the future.

Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis (교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석)

  • Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.695-706
    • /
    • 2018
  • In recent years, industrial convergence centered on ICBM (internet of things (IoT), cloud, big data, mobile) has been experiencing rapid development in various fields such as agriculture and the financial industry. In order to prepare for cyber threats, one of the biggest problems facing the convergence industry in the future, the development of the industry must proceed in tandem with a framework of information security. In this study, we analyze the details of the current industrial development policy and related information protection policies using cross impact analysis and present policy priorities through the expert questionnaire. The aim of the study was to clarify the priorities and interrelationships within information security policy as a first step in suggesting effective policy direction. As a result, all six information security policy tasks derived from this study belong to key drivers. Considering the importance of policies, policies such as improving the constitution of the security industry and strengthening of support, training of information protection talent, and investing in the information security industry need to be implemented relatively first.

A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework (보안전문인력 양성을 위한 직업분류체계별 정보보호 핵심지식 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.113-125
    • /
    • 2015
  • Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF