• 제목/요약/키워드: security concerns

검색결과 408건 처리시간 0.022초

${\cdot}$북한의 국가원수 경호조직에 관한 연구 (A Study on The Protection Organization for The Chief of State in North and South Korea)

  • 김두현
    • 시큐리티연구
    • /
    • 제1호
    • /
    • pp.17-50
    • /
    • 1997
  • I study on the security organization for the chief of state in North and South Korea. The paper, purporting to analyze security system in comparative prospectives, comprise four chapters. Chapter I Which sets out purpose, scope and method, is followed by Chapter II , dealing largely with the power structure on The Socialist Constitution of Democratic People's Republic of Korea, the protection organization and security activities for the chief of state in North Korea. Chapter III concerns the security environment - terrorist groups, firearms, explosives, suspects, movements of hostile countries and orthers - and the protection organization on The Presidential Security Service for the president in South Korea, culminating in projection of certain problem area. It is followed by concluding observation made in Chapter IV. To be operated security systems effectively, these need to be regulated according to a protective scale, function, authority of a existing.

  • PDF

산업기술 보안에 대한 조사 및 분석과 개선 방안 (Survey and Analysis of Industrial Technology Security, Propose the Improvement Plan)

  • 김성종
    • 융합보안논문지
    • /
    • 제15권7호
    • /
    • pp.3-8
    • /
    • 2015
  • 최근 들어 산업기술 유출 문제의 심각성이 대두됨에 따라 보안에 대한 중요성도 나날이 증대되고 있다. 본 논문에서는 산업기술 보안에 대한 연구 동향과 산업기술 유출 실태에 대해 조사하여 여러 가지 측면에서 분석하였으며, 산업기술 유출 문제의 심각성과 그에 따른 보안의 시급성을 보였다. 마지막으로 산업기술 보안에 필요한 개선 방안을 법률적, 경영 방식, 기술적 측면으로 나누어 제시하였다.

줌의 보안 취약점 분석과 보안 업데이트 결과 비교 (Comparing Zoom's Security Analysis and Security Update Results)

  • 김규형;최윤성
    • 디지털산업정보학회논문지
    • /
    • 제16권4호
    • /
    • pp.55-65
    • /
    • 2020
  • As corona began to spread around the world, it had such a big impact on many people's lives that the word "Untact Culture" was born. Among them, non-face-to-face meetings naturally became a daily routine as educational institutions and many domestic and foreign companies used video conferencing service platforms. Among many video conferencing service platforms, Zoom, the company with the largest number of downloads, caused many security issues and caused many concerns about Zoom's security. In this paper, Zoom's security problems and vulnerabilities were classified into five categories, and Zoom's latest update to solve those problems and the 90-day security planning project were compared and analyzed. And the problem was solved and classified as unresolved. Three of the five parts have been resolved but are still described as how they should be resolved and improved in the future for the two remaining parts.

Cost Management for Security Applications

  • Arshi Naim;Zubairul Hasan
    • International Journal of Computer Science & Network Security
    • /
    • 제24권7호
    • /
    • pp.63-72
    • /
    • 2024
  • This is an extended paper, focusing on the cost management for the organizations dealing with the crucial issues of security systems. Information Technology (IT) is an important and irreplaceable need of society and all working sector's success depends on IT to a greater extent; therefore maintaining security features is one of the most important aspects of IT. When security in the IT sector is discussed, Patch Management (P.Mgnt) has to be taken under account. P. Mgnt includes many concerns and areas to be described for IT security such as methods and problems in updating patch, methods of reducing security risks with P.Mgnt, methods of achieving economies of scale by controlling the operational costs and taking decisions in investing as and when necessary. This paper presents a general definition of Patch management, its benefits and management of working cost through theoretical models, also the paper gives methods of feeding techniques for microstrip patch antenna MPA, showing the contracting and non contracting methods.

정보시스템 관련 교육의 정도가 보안 우려 및 온라인 거래 의도에 미치는 영향 - 인터넷 이용과 스마트 폰 이용의 비교 분석 (The effects of the degree of education related to information systems on online transaction intention and security concerns - Comparative analysis of the use of the Internet and smartphone)

  • 정승민
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권8호
    • /
    • pp.145-161
    • /
    • 2012
  • 본 연구에서는 정보시스템 관련 교육의 정도와 인터넷 활용 능력이 인지된 보안성 우려에 어떠한 영향을 미치며, 기술수용모델에 기반을 두어 이 세 변수가 온라인 거래 의도에는 어떻게 영향을 미치는지 살펴보고자 하였다. 또한 스마트 폰을 이용하여 필요로 하는 제품을 구매하는 사례가 증가하는 추세이므로 기존 인터넷을 이용할 경우와 스마트 폰을 이용할 경우로 구분하여 비교 분석하였다. 실증 분석 결과, 정보시스템 관련 교육의 정도, 인터넷 활용 능력, 인지된 보안성 우려는 인지된 유용성 및 인지된 사용 용이성을 매개로 하여 온라인 거래 의도에 유의한 영향을 미쳤다. 그리고 예상했던 것과 달리, 정보시스템 관련 교육을 많이 받을수록 해킹이나 프라이버시 침해 사례들을 더 많이 알게 되어 보안에 대해 더 우려하게 되며, 따라서 인터넷을 통한 거래가 많은 노력을 요구한다고 믿었다. 또한 정보시스템 관련 교육을 많이 받을수록 보안에 대해 더 우려하게 되므로, 인지된 보안성 우려는 인지된 유용성에 부(-)의 영향이 아니라 정(+)의 영향을 미쳤다. 마지막으로 정보시스템 관련 교육의 정도는 인터넷 거래의 유용성이나 인터넷 거래의 사용 용이성을 인지하는 것과는 관련이 있으나, 스마트 폰의 유용성이나 스마트 폰의 사용 용이성을 인지하는 것과는 관련이 없는 것으로 나타났다.

배전자동화 시스템 통신망에 대한 사이버 공격에 대해 인증의 기법을 이용한 보안 알고리즘 적용방안 (Applying Security Algorithms using Authentication Against Cyber Attacks in DAS Communication Network)

  • 임일형;최면송;이승재;임성일;이성우;하복남;홍석원
    • 전기학회논문지
    • /
    • 제57권3호
    • /
    • pp.327-335
    • /
    • 2008
  • As communication is becoming increasingly prevalent and especially communication architecture is more relying on the open standard communication protocols, the security issues become major concerns. In this paper we consider possible cyber attacks in the applications based on the current distribution communication architecture, and then derive the security goals. Next we propose how the security algorithms can be adapted to achieve these security goals. We intend to adapt the most efficient ways of secure message exchange, taking the resource-constrained FRTUs into account Finally we show some experiments to validate the protocols.

Big Data Security and Privacy: A Taxonomy with Some HPC and Blockchain Perspectives

  • Alsulbi, Khalil;Khemakhem, Maher;Basuhail, Abdullah;Eassa, Fathy;Jambi, Kamal Mansur;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.43-55
    • /
    • 2021
  • The amount of Big Data generated from multiple sources is continuously increasing. Traditional storage methods lack the capacity for such massive amounts of data. Consequently, most organizations have shifted to the use of cloud storage as an alternative option to store Big Data. Despite the significant developments in cloud storage, it still faces many challenges, such as privacy and security concerns. This paper discusses Big Data, its challenges, and different classifications of security and privacy challenges. Furthermore, it proposes a new classification of Big Data security and privacy challenges and offers some perspectives to provide solutions to these challenges.

Review on Software-Defined Vehicular Networks (SDVN)

  • Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.376-388
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Software-Defined Vehicular Networks (SDVN)

  • Al-Mekhlafi, Zeyad Ghaleb
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.231-243
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular net- works and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and several architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

후쿠시마 원전사고 종적사례연구를 통한 원전에너지 안전성 고찰 (Nuclear Safety: A Longitudinal Case Study from the Fukushima Nuclear Disaster)

  • 이준혁;진영민;조영혁;이순홍
    • 한국안전학회지
    • /
    • 제31권1호
    • /
    • pp.139-147
    • /
    • 2016
  • Nuclear energy is considerably cheap and clean compared to other fossil fuels. Yet, there are rising safety concerns of nuclear power plants including the possibility of radiation releasing nuclear accidents. In light of the Fukushima nuclear crisis in 2011, Japan has been re-evaluating their existing energy policies and increasing the share of alternative energy. This paper first tracks the major historical changes of energy policy in Japan by time period. Next, energy security, reignited concerns and alternative energy are covered to examine Japan's energy security situation and its transition after the Fukushima disaster. Lastly, a short survey based on thematic analysis was conducted in South Korea and Japan to understand the public awareness of nuclear. This paper postulates that the case of Fukushima will contribute to establish and operate a safe-future nuclear program in South Korea, given that the country is not only geographically neighbouring Japan but also the world's fourth largest producer of nuclear energy.