• Title/Summary/Keyword: security service

Search Result 3,734, Processing Time 0.028 seconds

A Study on Web Service Security (웹 서비스 보안기술에 관한 연구)

  • 김배현;권문택
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.61-70
    • /
    • 2004
  • Web service technology will be used in various business fields and it will affect business paradigms. But, however, there is no standard so far and we have many problems to be solved in order to insure interoperability and security. Especially we have to solve Web service security for effective utilization of the technology and otherwise, the technology will not be used in the business field. We, therefore, need to develope security technology which fits to the Web service characteristics. This document describes a proposed strategy for addressing security within a Web service environment based on the results of analysis on the Web service security problems.

  • PDF

Service Quality and Client's Satisfaction of Security-Guard Company (경호${\cdot}$경비업체의 서비스 품질과 고객만족)

  • Kang, Min-Wan;Chang, Ye-Jin;Lee, Young-Sun
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.1-14
    • /
    • 2005
  • The concern of personal and social security has been increased all over the world with each passing day by the international terrorism and the domestic crime of violence grew gradually in the late of 70's and the early of 80's. The Security-Guard Industry, especially, has been growing rapidly by the starting from the 911 terror in 2001, therefore there has been increasing the supply and demand of Security Service in Korea explosively by the reasons, Actually, the Facilities Security Service is increased actively more than the VIP security Service among them. So, most of the Security-Guard Companies in Korea also have treated the Facilities Security Service at present. Although the importance of quality at the Facilities Security Service, especially mechanical equipments and systems, is on the rise, actually the studies about relations with the Service Quality and the Client's Satisfaction are quite insufficient at the field of Security-Guard Science study in the actual situation. As a result, the purposes of this study are to contribute for composing the knowledge of Security-Guard Science and to offer the basic data for elevating the Service Quality and Client's Satisfaction by consulting other studies. In order to achieve the purposes of this study, we compare and analyze how the Service Quality have affect on the difference of Client's Satisfaction by the client's characteristic of sociology and demography, then we find out the effect to the Service Quality for Client's Satisfaction, finally we try to show the vision of the Security-Guard Company's future in Korea. 1. How does the Service Quality of Security-Guard Company has affect on the characteristic of sociology and demography 2. How does the characteristic of sociology and demography in Security-Guard Company has affect on the Client's Satisfaction 3. How does the Service Quality of Security-Guard Company has affect on the Client's Satisfaction.

  • PDF

A Study about Practical Model of Meteorological Information for Convergence Security Service Science (융합보안 서비스 사이언스를 위한 기상정보 활용모델 연구)

  • Choi, Kyong-Ho;Lee, DongHwi;Kim, Minsu;Kim, JongMin;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.79-84
    • /
    • 2013
  • In this study the improved service innovation model to solve the problems that appear from a vantage point of the providing security services process through the application and appeal process of convergence security technologies proposed. The model was in view of service science to resolves the limitations that facilities management and unmanned security of physical security field through the application of meteorological information on convergence security technologies. The contribution of this research: improved risk management based on convergence security technologies through service innovation management, evaluated the quantitative value of risk management activity using service effects, and development of physical security service providing methodology using meteorological information.

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.

A Study on Selection of Core Services for Deciding ISMS Scope

  • Kang, Hyunsik;Kim, Jungduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.51-57
    • /
    • 2017
  • The first thing to be prioritized is to set the scope of the management system when establishing an information security management system for systematic and effective information security management. It is important to set the scope for an organization's information security goals due to the scope affects the organization's overall information security activities. If the scope is set incorrectly, it might become impossible to protect important services and therefore, the scope of the management system should be determined in consideration of the core business services of the organization. We propose a core service selection model based on the organization's mission-critical service and high risk service in order to determine the effective information security management system scope in this paper. Core service selection criteria include the type of service, contribution to sales, socio-economic impact, and linkage with other services.

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Convergence Security Provider Self-Conformity System (융합보안 공급자 자기 적합성 제도)

  • Baik, Namkyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.53-61
    • /
    • 2019
  • In this paper, we propose 'a self - conformance system of convergence security provider' to provide basic data for security and reliability of convergence industrial technology, system and service. It is difficult to evaluate convergence security systems, limited to information and communication service providers, unable to check convergence security items, burden of submission documents, difficulty in measuring convergence security service level and we will summarize product and service-based requirements that can be integrated and systematically measure the level of convergence security and define renewed life cycle-based convergence security information and content security and assurance requirements. On the basis of this, each convergence security company declares conformity with the standard itself without the certification of the certification body, and introduces the provider conformity certification system which can manufacture and sell. This will enable the company to strengthen its competitiveness through timely launch and implementation of products and services and cost reduction.

A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain (온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구)

  • Yoo, Dong-Young;Seo, Dong-Nam;Kim, Huy-Kang;Choi, Jin-Young
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.293-308
    • /
    • 2011
  • The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.

A Study on Security of E-Government Service Based on Web Service (웹 서비스 기반의 전자정부 서비스 보안에 관한 연구)

  • Lee Eun-Seon;Yang Jin-Seok;Lim Jung-Muk;Moon Ki-Young;Lee Jae-Seung;Chung Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.347-360
    • /
    • 2005
  • E-Government service is national project that is necessary for international competitiveness, openness of government and effectiveness of governmental work process. E-Government security is very important because it treats data has relatively high sensitivity. But, until now, the development point of E-Government service has been limited to only it's contents and infrastructure based on web without consideration of E-Government security. Lately research for E-Government security has been studied by some advanced country of E-Government service, but it is insufficient. To construct E-Government security based on web Infra, first of all, analysis of web service security technology is needed to precede. And then research for appling the technology to E-Government service are required. We propose secure E-Government service scenario with web service security technology based on development stages of E-Government service. We also suggest overall view and secure scenario of E-Government service in Integrated Computing Environment.

Effects of Electronic Security Service Quality Satisfaction and Customer Satisfaction on Switching Barrier and Customer Loyalty (기계경비 서비스품질만족과 고객만족이 전환장벽 및 고객충성도에 미치는 영향)

  • Kim, Chang-Ho;Yoon, Jong-Dae;Jung, Chul-Kyu;Lee, Bong-Keun
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.111-137
    • /
    • 2013
  • The purpose of this study is to examine the effects of electronic security service quality satisfaction and customer satisfaction on switching barrier and customer loyalty. Survey questionnaires were distributed to business owners in Seoul that are using electronic security system and the total of 500 copies were used as research data except 60 copies with insufficient responses. The results are as follow. First, as for the effects of electronic security service quality satisfaction on electronic security customer satisfaction, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on electronic security customer satisfaction. Second, as for the effects of electronic security service quality satisfaction on switching cost, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on switching cost. As for the effects of electronic security service quality satisfaction on human relations, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on human relations. It indicates that the effects of electronic security service quality satisfaction on alternative attraction was not meaningful. Third, as for the effects of electronic security customer satisfaction on switching cost, it indicates that the higher electronic security customer satisfaction achieves, the more it has positive effects on switching cost. As for the effects of electronic security customer satisfaction on human relations, it indicates that the higher electronic security customer satisfaction achieves, the more it has positive effects on human relations. But, it indicates that the effects of electronic security customer satisfaction on alternative attraction was not meaningful. Fourth, As for the effects of electronic security service quality satisfaction and electronic security customer satisfaction on customer loyalty, it indicates that the higher electronic security service quality satisfaction achieves, the more it has positive effects on customer loyalty. As for the effects of switching cost on customer loyalty, it indicates that the higher switching cost achieves, the more it has positive effects on customer loyalty. As for the effects of alternative attraction on customer loyalty, it indicates that there is no meaningful relation between alternative attraction and customer loyalty. But, effects of human relations on customer loyalty, it indicates that there is no meaningful relation between human relations and customer loyalty. Based on the above results, it is noticeable that in the effects of electronic security service quality satisfaction and electronic security customer satisfaction on switching barrier, all of them had meaningful effects except for alternative attractiveness. This signifies that switching barrier factor can increase when the service quality of electronic security and customer satisfaction increase. In other words, it can be said that increased awareness of electronic security service quality satisfaction and electronic security customer satisfaction by electronic security users can lead to high customer loyalty by establishing switching barrier through such increased awareness.

  • PDF