• Title/Summary/Keyword: private security policy

Search Result 197, Processing Time 0.022 seconds

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

The Study on the Measure to Improve the Event Place Guarding Operation System (행사장경호 운용시스템 개선방안에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.203-226
    • /
    • 2006
  • A highly sophisticated expertise and systematic and integrated management of security operation are essential for a crowded stadium. a special object of security guarding. Nonetheless, the recent incident in a singing concert hall reveals the overall problem like the lacking safety management system. lacking deployment of professional security personnel, absence of safety manuals and safety measures, as well as the lack of professionalism of private sector security companies. In this study, we presented three categories that needed improvement, like the legal and institutional improvement, improvement of policy and improvement of operation which are required to set up the model to operate the optimal private sector security duties. For the revision of law and institution for a better and more desirable method, we discussed the revision of related laws and regulations pursuant to the security operation at places where events are held, including the revision of law on security guarding work, regulation on common housing management, uniformity of security guarding, and law on performance. For the improvement of policies, we discussed the introduction of security consultants, strengthening the security instructor system, expansion of relevant organizations, establishment of mutual cooperation, privatization of profitable events, improvement of awareness about the security activities provided by private sector, policy for the professionalism of private security operation, expansion of security exhibition and seminar. For the improvement of operation. we discussed professional security techniques. such as the technique of security consulting, the application of CPTED technique, the technique for the integration of system, the method of operation, the establishment of a system to support public security operations and volunteers, establishment of a manual for security guarding performance, modernization and high tech-oriented equipment, organization of security guarding entity in which the industry, academic society and government participates together.

  • PDF

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

A Study on Confrontation a Plan of Policing Policy with the Development Globalization (세계화의 진전에 따른 치안정책의 대응방안)

  • Lee, Jin-Moon
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.251-272
    • /
    • 2000
  • Attempts have also been made to locate security in the so-called 'policingdivision of labour' In order to understand this, it is necessary to identify some of the links which exist between public police organizations and the private security sector. Such links can be divided into six types : 1) Interpersonal links, 2) Joint operations, 3) Exchange of services, 4) Granting of special powers, 5) Public bodies hiring private personnel, 6) New organizational. Van Reenen provides a useful outline of the different dimensions of future Glibalization of policing. Developments, he suggests, are likely to proceed in four directions : 1) Co-operation : at this level, the nature and powers of national police systems are not required to change, co-operation occurring between self-standing forces. 2) Horizontal integration : this arises when officers obtain authority to operate in another country, or where government officials from one country get authority over the police in another country. 3) Vertical integration : this exists when a police organization is created which can operate within the area of the EC as a whole. 4) Competition : the internationalization of policing in Europe presents itself, more and more, as a market in which different policing systems trade their products.

  • PDF

A Study on the Role and Implications of PFI Prisons in Japan (일본 PFI교도소에 있어서의 Private Security의 역할과 시사점)

  • An, Sung-Hun
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.185-207
    • /
    • 2013
  • Nowadays, national criminal policy focuses on "specialization", "advancement", and "choice and concentration" to enhance the efficiency and effectiveness of public peace services. Consequently, the space that a nation manages diminishes and there appears vacant space of security. For that reason, in most developed countries including South Korea, there has been a significant expansion in the size and role of Private Security(PS). From this point of view, the Japanese government has adopted the PFI(Private Finance Initiative) system in private prisons. These cases clearly show the role and significance of "PS". By applying know-how of the private sector, these PFI prisons make efficient use of installation by the united efforts of government and people. Criteria such as solution for risk baring, regional coexistence, preservation of public security, response management and operating skills are considered important particularly in Kitsuregawa and Harima prisons. Thus, this study examines the implications and applicability for the expansion of PS in South Korea.

  • PDF

Dynamic Sensitivity Level Measurement for Privacy Protection (개인정보보호 강화를 위한 동적 보안수준 결정)

  • Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.1
    • /
    • pp.137-150
    • /
    • 2012
  • For social demand and technological development, systematic private information management and security guidance have been enhanced; however, the issue of leakage and invasion of private information is shown in many ways. In the management of such private information, the issue of how to protect such information is one of the sensitive key elements. As a criterion to decide the management policy of each property information consisting of private information, this article suggests Dynamic-Security-Level-Measurement for property information. DSLM adopts the variable characteristics of property information as the element of measurement. By applying this method, it is possible to provide information management functions to cope with the changes of each property information security level of an individual actively. It is expected that this will improve the security of previous information management methods even more and also contribute to the improvement of security in integrated systems such as the integrated ID management system and electronic wallet.

A Study on the Development Plan of Smart City in Korea

  • KIM, Sun-Ju
    • The Journal of Economics, Marketing and Management
    • /
    • v.10 no.6
    • /
    • pp.17-26
    • /
    • 2022
  • Purpose: This study analyzes advanced cases of overseas smart cities and examines policy implications related to the creation of smart cities in Korea. Research design, data, and methodology: Analysis standards were established through the analysis of best practices. Analysis criteria include Technology, Privacy, Security, and Governance. Results: In terms of technology, U-City construction experience and communication infrastructure are strengths. Korea's ICT technology is inferior to major countries. On the other hand, mobile communication, IoT, Internet, and public data are at the highest level. The privacy section created six principles: legality, purpose limitation, transparency, safety, control, and accountability. Security issues enable urban crime, disaster and catastrophe prediction and security through the establishment of an integrated platform. Governance issues are handled by the Smart Special Committee, which serves as policy advisory to the central government for legal system, standardization, and external cooperation in the district. Conclusions: Private technology improvement and participation are necessary for privacy and urban security. Citizens should participate in smart city governance.

Approach to History and Problems of Health Insurance through Politics of Law (국민건강보험법의 발전과정과 법정책적 과제)

  • Cho, Hyong-Won
    • The Korean Society of Law and Medicine
    • /
    • v.8 no.2
    • /
    • pp.37-68
    • /
    • 2007
  • Health insurance has gone far toward solving Korea's health related problems through thirty years. Health Insurance as social security system has a role of national system to secure national health. But there are many problems in health insurance. There is a dispute about many issues, coverage of health security, compulsory appointment of health insurance organization, coverage and level of health insurance benefit, decisionmaking right of health insurance price, examination of health insurance etc. Generally, the opinion for health insurance policy to be leaded by nation sets against the opinion to be leaded by private sector. It is necessary to study politics of law, constitute law and comparative law for rational solving these problems. If desirable setting of health law system can be made, legal system must be set during a long time and be discussed synthetically in different standpoint.

  • PDF

A Study on the Security Requirement for Transforming Cloud Data Center : Focusing on N - Data Center (클라우드 데이터센터로의 전환을 위한 보안요건 - N데이터센터를 중심으로)

  • Ra, Jong-Hei;Lee, Jae-Sook
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.299-307
    • /
    • 2014
  • N-Data Center which provide of cloud computing service for the Government departments, will be prepared transforming to cloud data center and transformed into an 'IT service' provided as a service to the information resources required by each department. N-Data center already provide a cloud service to the departments as maintains a high level of security, and plan to connecting with the private sector as a precondition of security. Therefore, in order to promote them effectively, it is necessary to determine the level of security in the cloud data center, and we have proposed appropriate measures. In this paper, we analyze security requirements of cloud data centers in developed countries and identify the leading private cloud data center security. In addition, we identify the N-data center security level, and analyzes the data center and private cloud gap and provide a transition strategy in terms of security finally.

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3254-3272
    • /
    • 2017
  • With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.