• Title/Summary/Keyword: public security agency

Search Result 144, Processing Time 0.027 seconds

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

A Study on the Building Plan of Disaster Area Network for Establishment of Crisis Management System (위기관리체계 확립을 위한 재난통신망 구축방안에 관한 연구)

  • Park, Namkwun;Lee, JuLak
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.192-198
    • /
    • 2014
  • In the current times, large-scale disasters, such as the recent sinking of Se-Wol ferry, are occurring continuously and unexpectedly. In order to minimize damage in the disaster scene, quick delivery and sharing of information between crisis management agencies is one of crucial factors that determine the scale of the damage. However, ineffective communication persists between the agencies in disaster scenes where disaster management action has to be carried out urgently. For that, this research focused on the actual condition of the inter-agency communication method and wireless operations, and also suggested the building plan of effective and efficient networking through understanding of each agency's present state and duties.

Adapting PMO(Project Management Office) to EA-based national informatization (EA 기반의 국가정보화 PMO제도 적용·활용 방안 연구)

  • Lee, Jae-Du;Kang, Sun-Mu;Kim, Tae-Wan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.597-600
    • /
    • 2009
  • 최근의 정보화환경을 반영한 정보화 관리방법과 도구의 통합 활용에 대한 필요성이 대두되고 있다. 이제는 기존 프로젝트관리 방식만으로는 다원화된 업무, 고객 요구를 충족시키지 못한다. EA, PMO 등 보다 발전된 방법들을 도입하고 활용해야 한다. 그러나 아직도 공공부문 정보화추진에 유용한 개념과 도구들을 통합적으로 활용하지 못하는 것이 현실이다. 공공부분 정보화 정책 환경이 변했지만 아직 현실에 맞게 그러한 사항들이 반영되어 있지 않다. 변화에 맞게 적절한 수단과 방법을 개발하고 지속적으로 발전시키지 못하면 기대한 효과를 거두기도 어렵다. 이제는 CIO 등 정보화를 추진하는 여러 주체가 범정부 EA, IT거버넌스, IT아웃소싱, 각종 지침과 기준 등을 통해 업무생산성을 제고할 수 있는 새로운 접근방법에 대한 제시가 필요하다. 이를 위해 본 연구에서는 EA기반의 PMO제도 적용 활용을 위해 방법론 및 도구의 통합적 활용이 가능한 모델을 제시하고자 한다. 연구방법은 기존 연구결과, 정책, 사업에 대한 문헌연구 및 분석 등을 통해 함의를 도출한다. 결과는 공공부문 정보화 추진 시 생산성 제고를 위한 참조 및 연관되는 유사 IT정책을 추진할 때 방향 정렬(Alignment)에 필요한 시사점 제공과 선행연구로서 의미가 있으리라 기대한다.

Implementation of anti-screen capture modules for privacy protection (개인 정보 보호를 위한 화면 캡쳐 방지 모듈 구현)

  • Lee, Jong-Hyeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.91-96
    • /
    • 2014
  • According to the spread of computers and the development of the information society, people are focused on privacy information. As the development of its associated policy and technology, it has been tried various attempts to protect their personal information. In this paper, we proposed anti-screen capture modules to protect personal information or a company's confidential information for agencies and departments that keeps top security. As a result, we can prevent an illegal use or a stealing of another person's information in a public agency or personal computer. Also modules can stop exposures of top security data and personal information during they communicate with others in their institution's sever system.

Analysis of Regulation and Standardization Trends for Drone Remote ID (드론 원격 식별 규정 및 표준화 동향 분석)

  • Kim, H.W.;Kang, K.S.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.46-54
    • /
    • 2021
  • Drone remote identification (ID) capability is essential to ensure public safety, help law enforcement, and secure the safety and efficiency of the national airspace. Remote ID technology can be used to differentiate compliant drones from illegal drones that pose a potential security risk by providing airspace awareness to the civil aviation agency and law enforcement entities. In addition, the increased safety and efficiency obtained by mandating remote ID will make it possible to operate drones over populated areas and beyond visual lines of sight. In addition, remote ID will allow drones to be safely integrated into unmanned traffic management systems and the national airspace. Remote ID devices can be categorized by type, i.e., broadcast remote ID or network remote ID. The broadcast remote ID, which has high technical maturity and will be applied in the near future, is primarily considered to ensure the security of drones. The network remote ID, which is being developed and tested and will be applied in the distant future, can be used additionally to ensure the safety and the efficiency of the national airspace. In this paper, we analyze the trends on regulation and standardization activities for drone remote ID primarily in the United State and Europe.

A Comparative Study on the Safety and Health Education System between Korea and other Countries (한국과 주요 외국의 안전보건교육제도에 관한 비교 연구)

  • Jung, Seung Rae;Park, Hyun Jin;Chang, Seong Rok
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.5
    • /
    • pp.117-123
    • /
    • 2016
  • After the Se-wol ferry disaster in Korea, the safety issue was highly spotlighted in a number of media, and consequently the ministry of public safety and security was newly established under the public attention. In addition to this, a recent earthquake in Gyeonju suggested the training issues for public such as evacuation and public safety. Regarding the industry, one of significant reasons causing the accidents were inadequate training, in execution of safety manual or inexperienced first response. Although the engineering or scientific study provided a basis of the industry safety and health in Korea a study focusing on the safety and health education system should be highlighted in that the law is the only way to execute the policy. In this manner, the goal of current study was to compare the safety and health education system in Korea to other countries including America, England and Germany. Especially, the law for training method, contents, supervision and punishment was analyzed. Result showed (1) lack of a structured training course for educating safety and health education trainer, (2) no training system of safety and health education to public or workers, and (3) less specific law for supervision and punishment as compared to the America, England and Germany.

Application of Police Video Equipment for Fighting Crime and Legal Trends (범죄 대응을 위한 경찰 영상장비의 활용과 법 동향)

  • Lee, Hoon;Lee, Won-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.3-19
    • /
    • 2018
  • With the introduction of video cameras into law enforcement, a great deal of police organizations have adopted the technology in their routine crime prevention activities. The up-to-date systems of ambient surveillance energized by CCTV, police wearable cameras, drones, and thermal imaging devices enable the police to thoroughly monitor public spaces as well as to rigorously arrest on-scene criminals. These efforts to improve the level of surveillance are often met with public resistance raising concerns over citizens' rights to privacy. Recent studies on the use of police video equipment have constantly raised the issues related to the lack of applicable legal provisions, risk of personal information and privacy infringement as well as security vulnerabilities. In this regard, the present study attempted to review the public surveillance methods currently used by law enforcement agencies worldwide within the context of public safety and individual rights to privacy. Furthermore, the present study also discussed the legal boundaries of police use of video equipment to address public concerns over privacy issues.

A Study on Establishment of Cyber Threat Information Sharing System Focusing on U.S. Case (사이버 위협정보 공유체계 구축방안에 관한 연구 - 미국 사례를 중심으로 -)

  • Kim, Dong Hee;Park, Sangdon;Kim, So Jeong;Yoon, Oh-Jun
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.53-68
    • /
    • 2017
  • Today, information sharing is recognized as a means to effectively prevent cyber attacks, which are becoming more intelligent and advanced, so that many countries such as U.S., EU, UK, Japan, etc. are establishing cyber threat information sharing system at national level. In particular, the United States has enacted the "Cyber Threat Information Sharing Act (CISA)" in December 2015, and has been promoting the establishment of a legal and institutional basis for sharing threat information and the implementation of the system. Korea is sharing cyber threat information in public and private sectors mainly through the National Cyber Security Center(NCSC) and the Korea Internet & Security Agency(KISA). In addition, Korean government is attempting to strengthen and make legal basis for unified cyber threat information sharing system through establishing policies. However, there are also concerns about issues such as leakage of sensitive information of companies or individuals including personal identifiable information that may produced during the cyber threat information sharing process, reliability and efficiency issues of the main agents who gather and manage information. In this paper, we try to derive improvement plans and implications by comparing and analyzing cyber threat information sharing status between U.S. and Korea.

A Study on S-Function in SEED Cryptosystem (SEED암호에서 S-함수에 대한 고찰)

  • Yang, Jeong-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1295-1305
    • /
    • 2017
  • There is SEED cryptosystem in domestic block cipher standard. This code was drafted by the Korea Information Security Agency (KISA) in October 1998 and underwent a public verification process in December of the same year, which resulted in the final amendment to improve safety and performance. Unlike DES, it is a 128-bit block cipher that has been passed through various processes and established in 2005 as an international standard. It is a block cipher with a pastel structure like DES, but the input bit block has been increased to 128 bits, double DES. In this paper, first, we introduce the general algorithm of SEED cryptosystem and analyzed mathematically generating principle of key-value which is used in F-function. Secondly, we developed a table that calculates the exponent of the primitive element ${\alpha}$ corresponding to the 8-bit input value of the S-function and finally analyzed calculating principle of S-function designed in G-function through the new theorem and example. Through this course, we hope that it is to be suggest the ideas and background theory needed in developing new cryptosystem to cover the weakness of SEED cryptosystem.

An Improvement of the Guideline of Secure Software Development for Korea E-Government (대한민국 전자정부 소프트웨어 개발보안 가이드 개선 방안 연구)

  • Han, Kyung Sook;Kim, Taehwan;Han, Ki Young;Lim, Jae Myung;Pyo, Changwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1179-1189
    • /
    • 2012
  • We propose an improvement on the Guideline of Secure Software Development for Korea e-Government that is under revision by the Ministry of Public Administration and Security in 2012. We adopted a rule-oriented organization instead shifting from the current weakness-oriented one. The correspondence between the weakness and coding rules is identified. Also, added is the coverage of diagnostic tools over the rules to facilitate the usage by programmers during coding period When the proposed guideline is applied to secure software development, the weakness would be controlled indirectly by enforcing coding rules. Programmers responsibility would be limited to the compliance of the rules, while the current version implies that it is programmers responsibility to guarantee being free from the weakness, which is hard to achieve at reasonable cost.