• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.033 seconds

A Study of Security QoS(Quality of Service) Measurement Methodology for Network Security Efficiency (MOS(Mean Opinion Score)를 이용한 네트워크 보안 QoS(Quality of Service) 평가체계)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.11-17
    • /
    • 2012
  • Network security performance evaluation is a complex and diverse system environments, a single, specific performance measurements alone performance evaluation measure itself and the meaning of the reliability of the evaluation results do not limit the number of days only. In this paper, we propose a method to measure the security features of security, QoS measurement techniques using MOS satisfaction. MOS(Mean Opinion Score) Rating specifications for network security, QoS satisfaction and how to operate the development and operational model for future customer's satisfaction for information systems that can be used to evaluate the QoS measurement/analysis be utilized in the field. Objectified in the form of standards and performance measurement system provider (supplier development) and consumers(users) all the results available so that how to develop a system. Development is the development of information security features, the performance of these two features networking capabilities and a comprehensive evaluation of a three-gaeyoungyeok Correlating performance measurement methodology. Systematic measurement environment designed using the proposed methodology of this study, when the operating system is on the satisfaction of the security, QoS can be calculated. Forward In addition, a variety of performance metrics and performance measurement methods by extending the network security system satisfaction rating upgrade by the way will be.

A Study on Developing Professional Training of the Private Security Industry (민간경비 산업의 전문인력 양성 방안)

  • Park, Aok-Cheol
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.91-111
    • /
    • 2006
  • Technology development of modern society reduces times, costs and labor costs but demands work forces requiring expert knowledge on technology. Consequently knowledge worker becomes important. Not changing into a specialist acquired expert knowledge, people can't survive in competitive society. Therefore, the purpose of this study is to grasp the actual condition of private security industry and to examine problems. The final goal is to find the way to improve the professionalism of workers in private security industry. First. Now we must make up for the subject for examination actually and be in a triangular position and complement a professional materials for teaching. At the same time it must strengthen the education using advanced instruments seek to Total Security System. Moreover it is demanded 'institutional supplement of security guard instructors' which means job training for security guard instructor Second. On the job training which can deal with a state of emergency through 'security guard training' with a theory and an actual training must be strengthen. Also, most security guards have low understandings and interests because their ages are from 50's to 60's. Accordingly proper education must be offered to security guard. Third. Certification system of the private security guards are needed to fix the problems on an indiscreet issue and an abuse of license through deliberation on the security license. Fourth. Universities must find a new market to minimize the squandering of human resources because of oversupply and reduce the personnel. Also with enhancing the employment rate through specialized education, universities must offer an education which keeps pace with the times for not an entrance strategy but a long-term development. Effort for education of specialist will produce an improvement in business quality and improved services produce a customer satisfaction. A customer satisfaction will produce a fame of a successful company and positive images in market area. Finally the private industry will be developed by productivity improvement.

  • PDF

Active Security Management on Active Networks (능동 네트워크 기반의 능동 보안 관리 시스템)

  • 이영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.559-569
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as a pattern of attack becomes various and complex. And, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture make possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service) using active packet technology including a mobile sensor on active network. Active Security Management System based on proposed security architecture consists of active security node and active security server in a security zone, and is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of Active Security Management System. The experimentation results are analyzed.

A Study on Electronic Security Guard's Security Performance on Job Satisfaction (기계경비원의 경비능력이 직무만족에 미치는 영향)

  • Shin, Jaehun
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.3
    • /
    • pp.627-639
    • /
    • 2021
  • Purpose: The purpose of this study is to examine the influence of electronic security guard's security performance on the job satisfaction and to make proposals on improvement of employment status and job satisfaction. Method: To accomplish the purpose, this study organized the theoretical background by referring to the preceding researches on the related field. Then, this study conducted a survey on electronic security guards and analyzed the results in statistical methods. Result: According to analysis results, electronic security guard's security performances including academic background, martial art skills, height, weight, and BMI index had a significant influence on factors composing the job satisfaction. Conclusion: To improve the electronic security guard's job satisfaction level, this study suggested measures for improving the wage system and reducing turnover rate. This study also suggested measures for strengthening the physical standards and strengthening the practical training for employment.

Development of a Formal Access Control Model in CORBA Security using the Z Language (Z 언어를 기반으로 CORBA 보안의 정형화된 접근 제어 모델 개발)

  • 김영균;김경범;인소란
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.79-94
    • /
    • 1997
  • OMG (Object Management Group) published a security service specification, called CORBA (Common Object Request Broker Architecture) security reference model because the integration of security and object-oriented techniques was critical for successful deployment of distributed object systems. The CORBA security reference model treats access control as an implementation independent semantic concept but has incomplete semantics of the access control function. Because of such imcompleteness it is difficult for the system administrator and the CORBA security implementor to have the same understanding for the meaning of access control in the CORBA security. We propose a formal model for access control the CORBA security using the formal description language, which is called Z language based on typed set theory. The proposed model provides concrete semantics of the access control function to both the system administrator and the implementor.

Enhancement of Enterprise Security System Using Zero Trust Security (제로 트러스트 보안을 활용한 기업보안시스템 강화 방안)

  • Lee, Seon-a;Kim, Beom Seok;Lee, Hye in;Park, Won hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.214-216
    • /
    • 2021
  • It proposes a plan to strengthen the limitations of existing corporate security systems based on Zero-Trust. With the advent of the era of the Fourth Industrial Revolution, the paradigm of security is also changing. As remote work becomes more active due to cloud computing and COVID-19, security issues arising from the changed IT environment are raised. At the same time, in the current situation where attack techniques are becoming intelligent and advanced, companies should further strengthen their current security systems by utilizing zero trust security. Zero-trust security increases security by monitoring all data communications based on the concept of doubting and trusting everything, and allowing strict authentication and minimal access to access requestors. Therefore, this paper introduces a zero trust security solution that strengthens the existing security system and presents the direction and validity that companies should introduce.

  • PDF

Authentication Protocol for RFID using Bivariate Polynomials over a Finite Field (유한체 위의 이변수다항식을 이용한 RFID 인증 프로토콜)

  • Jung, Seok Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.3
    • /
    • pp.137-141
    • /
    • 2014
  • RFID system is applied to various industry such as process control, distribution management, access control, environment sensing, entity identification, etc. Since RFID system uses wireless communication, it has more weak points for security. In this paper, an authentication protocol is suggested between tags and a reader, which is basic property for security. A suggested protocol use a bivariate polynomial over a finite field and is secure against snooping, replay attack, position tracking and traffic analysis.

A Design of Client BBS System for Secure HVA

  • Park, Jae-Kyung;Kim, Young-Ja
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.73-80
    • /
    • 2018
  • In this paper, we propose a new type of client server environment to improve the architecture vulnerable to hacking in an existing client server environment. On the server side, move the existing Web server to the client side and This is a way for clients to communicate only the data they need and suggests a structure that completely blocks the web attack itself to the server. This can completely prevent a server from being hacked, spreading malicious code and hacking data on a server. It also presents a new paradigm that will not affect servers even if malware is infected with client PCs. This paper validates the proposed environment through BBS (Big Bad Stick) hardware in the form of USB on the client side. This study proof that secure services are provided through encryption communication with server-side security equipment, indicating that this study is a system with new security.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

Supporting Scalability of Tunneling and Mobile Clients in Virtual Private Network (가상사설망에서 터널링의 확장성과 모바일 클라이언트 지원)

  • Kim, Young-Jin;Lee, Joo-Yeon;Song, Joo-Seok
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.195-199
    • /
    • 2002
  • Requirements of a well-designed VPNs(Virtual Private Networks) are scalability, performance, reliability, ease of management, interoperability and security. Tunneling is a important technology to support these. This paper researches VPNs tunneling technologies used currently and proposes VPN service models for the scalability that is a problem in VPNs and for the resource limit of Mobile Station in Mobile VPNs environment.

  • PDF