• Title/Summary/Keyword: private security policy

Search Result 196, Processing Time 0.027 seconds

United States-China Competition for Technological Supremacy in Quantum Computing and Policy Trends (미중 기술패권 경쟁과 양자컴퓨팅 정책 동향)

  • S.J. Lee;S.H. Jeong;B.S. Cho
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.47-57
    • /
    • 2023
  • The competition for technological supremacy is unfolding in the high-tech field, and quantum computing can be determinant for economic and security ripple effects. The United States and China, leaders in quantum computing, have developed this field through adequate policies. The United States has fostered quantum computing through government policies and competition among private companies, while China has secured world-class technology through large-scale government investment and attracting foreign talent. In quantum computing, securing talented people is essential to guarantee independent technology development regarding academic attributes and security. We analyze quantum computing policies in the United States and China on a timeline and determine their policy trends. In addition, the policies for securing talent in these countries are reviewed, and the policy effects are compared based on literature analysis. Through the analysis of policy cases between the United States and China, bilateral policy implications for Korea are delineated.

A Study on Certificate-based Personal Authentification System for Preventing Private Information Leakage through Internet (개인정보 유출 피해 방지를 위한 공인인증서 기반 인터넷 개인인증체계 개선 모델에 관한 연구)

  • Lee, Jung-Hyun;Kwon, Hun-Young;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.1-11
    • /
    • 2010
  • Recently, We have many private information leakage cases through internet which cause social problems and it is impossible to change or update the leaked information, it is also used to the third crime such as identity theft, internet fraud. Hackers are interested in stealing private information for making money, in this point private information leakage problems are constantly increased hereafter. In this paper, I surveyed the authorization model on site registration which is currently used in Korea, and the problem of collecting personal identification number, I proposed policy model of useless method of private information, especially leaked information can not be used anymore in internet.

Research on Institutional and Technical Improvement Regarding on the Collection and Application of Non-Specific Personal Information (비특정 개인정보 수집 및 활용에 관한 정책적·기술적 개선방안 연구)

  • Jeon, Hoimi;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1583-1592
    • /
    • 2016
  • This report explains unspecified private information that have the company of resource value is provided the public with out protection. Let's have a good look at the protection of unspecified private information problems through personal information of law and policy mobile messenger company's TOS(Terms of service) We urgently need for an competition framework to prevent the leaking of Non-specified private informations and need for technical development that is information combined management system. We try verify systems as mentioned above with variety scenarios and suggest improvement plan that is leaking Non-specified private information.

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

A Quantitative Assessment Model of Private Information Breach (기업의 개인정보 유출로 인한 경제적 피해규모 산출방법)

  • Han, Chang-Hee;Chai, Seung-Wan;Yoo, Byung-Joon;Ahn, Dae-Hwan;Park, Chae-Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.17-31
    • /
    • 2011
  • Damage caused by private information breach causes serious problems and huge social losses. In order to make a better policy that prevents society from suffering from the damage, we have to know about the actual size of damage. So it is needed to develop a quantitative model of private information breach that helps catching the more accurate size of damage. In our study, we suggest a method which calculate not only the costs of damage from firms' perspective but also those from individual and social perspectives. In this process, we refer to methods adopted by JNSA(Japan Network Security Association) and Ponemon Research Institue and modify it with considering our current situation. Also we try to make a new model by using new methods(web traffic analysis, survey, indirect comparison, etc.) and verify it with theories and methods from econometrics, cost accounting and theory of producer.

Design of Security Management System

  • Kim Seok-Soo;Soh Woo-Young
    • International Journal of Contents
    • /
    • v.1 no.2
    • /
    • pp.22-25
    • /
    • 2005
  • Enterprise security management system: Enterprise Security Management (EMS) is centralized integrated management of other kind of security solutions such as intrusion cutoff system, intrusion detection system and virtual private network. With the system, it is possible to establish security policies for entire IT system through interlocking of solutions. A security system of company network is progressing as a ESM(Enterprise Security Management) in existing security solution foundation. The establishment of the security policy is occupying very important area in ESM of the security system. We tried to analyze existing ESM system for this and designed security solution structure for enhancing the inside security. We applied implementing directly IDS system and tested. This test set the focus about inside security

  • PDF

A Study on The Law and System of The Private Body Guard in Korea (한국(韓國) 민간신변보호(民間身邊保護)의 발전(發展)을 위한 법규(法規) 및 제도(制度)에 관한 고찰(考察))

  • Lee, Han-Ick
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.283-319
    • /
    • 1997
  • Our society witnesses the rapid progress in the areas of politics, economy, society and culture in the process of national modernization since 1960s, which in turn as a reverse function gets to contract a societic pathology, totally lowering the security level of citizens' lives owing to various violent crimes like hostage commotions and murders with rifles and deadly weapons. what is the main reason for that? That may be partly because the chief police force concentrates on the current situation resulting in the vacuum of the public peace. However, the main reason is that the police fall short of man-power and equipments even if the whole police power were put to use in preventing and quelling the crimes. That is true not only of Korea but also of the advanced countries like the U.S.A., England and Japan. We realize that these advanced countries have higher level of security in every individual's life and property than Korea because their progress of the private guard systems can fill in a vacuum of the shortage of the police power, Therefore, we should without delay internationalize our private guard systems expecting the widely opening of the guard service markets in the age of Uruguay Round. To do this, we need to change our ideas for fostering the policy of the private guard from passive defense ideas into positive aggressive ones. Our police should urgently set up a plan to pursue the orientation of vision that we should dispatch our private guards overseas before foreign guards rush into our markets. Accordingly it goes without saying that the private guard group should distinguish their services from the public services initiating their own theory and strategy of private guard services and also readjust themselves between the public duties and the private services with the study of minimizing the reverse function of the private guard systems. The history criminal justice has always shown that the criminal system progressed at the initiative of the civil factor in case its demand and supply do not make both ends meet. Nevertheless, in the process the power of the government never weakens, rather it is built up in general. In conclusion, the necessity of the build-up of the private guard services must duly be acknowledged by the police as well as by the business which has its unique sphere within the criminal justice instead of as the suplemtary services of the simple the police power on the long-term basis. The purpose of the private guard services can be largely classified into the two categories; first it means the function to prevent the crimes against the citizens and secondly to enhance the national interest as an increasing mammoth business with a worldly competition capacity. The police has an absolute responsibility that they should protect the modem public in general from feeling the crisis of the personal threat, tension, anxiety and nervousness. In short, if we develop the complete private guard system to guarantee the societic atmosphere for all citizens, keep the public peace, and protect all citizens' lives and properties, we will sure enjoy a beautiful land, a wholesome society and a happy life in goodharmony of law and order.

  • PDF

IPSec based Network Design for the Mobile and Secure Military Communications (이동성과 보안성 만족 군용 통신을 위한 IPSec 기반 네트워크 설계)

  • Jung, Youn-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1342-1349
    • /
    • 2010
  • Full-mesh IPSec tunnels, which constitute a black network, are required so that the dynamically changing PT (Plain Text) networks can be reachable across the black network in military environments. In the secure and mobile black networks, dynamically re-configuring IPSec tunnels and security policy database (SPD) is very difficult to manage. In this paper, for the purpose of solving mobility and security issues in military networks, we suggest the relating main technologies in association with DMIDP (Dynamic Multicast-based IPSec Discovery Protocol) based on existing IPSec ESP (Encapsulating Security Payload) tunnels and IPSec key managements. We investigate the main parameters of the proposed DMIDP techniques and their operational schemes which have effects on mobility and analyze operational effectivemess of the DMIDP with proposed parameters.

Flexible Database security System using Improved Role Hierarchy (개선된 역할 계층을 이용한 유연한 데이터베이스 보안 시스템)

  • Jung Min-A;Lee Kwang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1834-1839
    • /
    • 2005
  • Database security is essential to protect their data in most organization such as hospitals, central or local governments, banks which manage the private, sensitive and important data. Because the duty of the department recently became more various and complicated, the changes of security requirement are needed more frequently. Therefore, easily changeable, flexible security policy and efficient security management with preserving the integrity of security policy are very important. In this paper, we implemented a flexible database security system in the specimen and clinical information management system of leukemic research center using IRH(Improved Role Hierarchy). Data is protected by MAC and we propose a flexible access control and effective administration by using the IRH that is an improved role hierarchy of RBAC. If security policy is needed for changes, this system can do it easily by simply modifying the IRH with the decentralized administration. The modified security policy can be applied flexibly after alteration because the security level of the subject is not fixed but can be derived automatically from the IRH when user connects the system.

A Development of Central Policy Database for managing Heterogeneous Firewall Systems (이종의 침입 차단시스템 관리를 위한 중앙 정책 데이터베이스 개발)

  • Lee, Dong-Young;Chung, Tai-Myoung
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1063-1070
    • /
    • 2002
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from intrusions and attacks, many vendors have developed various security systems such as firewalls and intrusion detection systems. However, managing these systems individually demands too much work and high cost. Thus, integrated and autonomous security management for various security products has become more important. In this paper, we present the architecture of the WISMSF (Web-based Integrated Security Management System for Firewalls) and the merits of centralized approach for managing heterogeneous firewalls and implement the prototype of the central policy database that is a component of the WISMSF engine. The WISMSF engine supports an integrated view for policies, the integrity of polities and the easy recovery and addition of policies. And also, we define the policy conflicts of WISMSF and present the policy recovery process to support to the policies consistence.