• Title/Summary/Keyword: security service agency

Search Result 167, Processing Time 0.03 seconds

The Security Service History focused on 1930s in Korea (1930년대에 전개된 경호 활동 고찰)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.23-41
    • /
    • 2009
  • The purpose of this study is to investigate about security service history on 1930s in Korea. This study used materials by historical facts for the regulations, books and newspapers in 1930s. In 1930s, security service was unknown details of the historical contents so far. There are four parts conclusion of this study: police department of provisional government, security service agency in the provisional government, security service agents of an independence movement, the general society of Korea. Firstly, Korean regional government in Manchuria, which Kokminbu(國民府) organized the security service agency(警護局) for protect government and public security. Most importantly, the security service agency appearanced an important place which were the independence movement and self-governing administration for Koreans in Manchuria. And the security service agency was required by the security service regulations(警護條例) as law. Secondly, diversity activities of security service in police were exposed the duty as 'car escort service(車輛警護)' for offenders, the 'township office guard' from mobsters, 'woodland protect service(林野警護團)' for fire-raisers. security service as police officer were widely application for protection and safety from danger. Thirdly, Mass society was needed to service for public security in daily events such as 'noted singer meeting', 'funeral procession to the graveyard', 'athletic meeting' as private establishment of security service agency in nowadays. people were wanted the private security service(私警護) from 1930s to present. Fourthly, Overseas security service mentioned in attack of politician, protect from poison and security service about train vessel fleet. In 1930s, security service is comprehensive protection which were not only bodyguard, but also safeguard for hazardous materials.

  • PDF

The Investigate of Security Service History focused on 1920s after the Provisional Government in Korea (임시정부 수립 후 1920년대에 전개된 경호 활동 고찰)

  • Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.53-68
    • /
    • 2008
  • The purpose of this study is to investigate about security service history as enlightenment period from the provisional government to 1920s. This study used materials by historical facts for the regulations and books in provisional government, newspapers in 1920s. There are four parts conclusion of this study: police department of provisional government, security service agency in the provisional government, security service agents of an independence movement, the general society of Korea. Firstly, Kim Gu, a prominent Korean nationalist leader, was understand of security service which was to protect provisional government from the enemy. So, Kim Gu participated in training of security service agents in the police department of provisional government. Secondly, there was security service agency in the provisional government. In 1920s, security service agency and agents appeared for the first time in regulations of the provisional government. At the beginning of the security service agency's appearance was influenced on background and circumstances for Korean independence activist who helped the independence of Korea from Japan. Thirdly, security service agents leaded an active for independence movement of the private organizations in 1920s. They carried on an independence movement in defiance of Japanese coercion as nationalist in Korea history. Fourthly, security service came out the general society of Korea in 1920s. The security service was not just for safety, but also for its security system and peace of mind, which were influenced by the political situation, social environment in 1920s. For the this reason, now security service has safety perception in Korea despite the historical progress.

  • PDF

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration

  • Na, Sarang;Kim, Taeeun;Kim, Hwankuk
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.740-750
    • /
    • 2018
  • There are a great number of Internet-connected devices and their information can be acquired through an Internet-wide scanning tool. By associating device information with publicly known security vulnerabilities, security experts are able to determine whether a particular device is vulnerable. Currently, the identification of the device information and its related vulnerabilities is manually carried out. It is necessary to automate the process to identify a huge number of Internet-connected devices in order to analyze more than one hundred thousand security vulnerabilities. In this paper, we propose a method of automatically generating device information in the Common Platform Enumeration (CPE) format from banner text to discover potentially weak devices having the Common Vulnerabilities Exposures (CVE) vulnerability. We demonstrated that our proposed method can distinguish as much adequate CPE information as possible in the service banner.

A Study on the Comparison between 「SECURITY SERVICES INDUSTRY ACT」 and 「ACT ON THE PROTECTION, ETC. OF TEMPORARY AGENCY WORKERS」 among Security Guards (「경비업법」상 경비원과 「파견근로자보호 등에 관한 법률」상 경비원의 비교에 관한 연구)

  • Noh, Jin Keo;Choi, Kyung Cheol;Lee, Young Ho
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.143-167
    • /
    • 2018
  • According to the Security Services Industry Act security guards are not just workers but security-related service workers complementing the lack of police force and specializing in protecting of national important facilities, industrial facilities and apartment houses. Nevertheless, confusing or mixing the security service workers in "Security Services Industry Act" with the guards in the "Act on the Protection etc. of Temporary Agency Workers" lead to a constant debate about the scope of work of security guards. In the case of security service workers in "Security Services Industry Act" there is a strict limitations on security service worker's qualification such as strict reasons for disqualification, a need to pass training for new workers and qualification training, a need to report to the competent chief police officer if the security guard has placed or unplaced by the security service company. It distinguishes security service workers in "Security Services Industry Act" from the guards in the "Act on the Protection etc. of Temporary Agency Workers" and acknowledges the occupation of security service worker as a professional service worker. Therefore, security service workers in "Security Services Industry Act" shouldn't be obliged to do any other work than security work. If it is required to do other work than security work contract by the "Security Services Industry Act" doesn't apply but need to use a security guard according to "Act on the Protection etc. of Temporary Agency Workers" or hire a security guard on the employment contract. In this way, when security service workers in "Security Services Industry Act" are recognized as professional security related workers, the entire security industry can ultimately develop.

Structural Relationship between Customer Access Service, Internal Response, and Consumption Behavior of Security Expenditure Users (보안경비 이용자의 고객접점서비스, 내적반응, 소비행동의 구조적 관계)

  • Kim, In Jae
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.321-346
    • /
    • 2020
  • The purpose of this study is to identify the relationship among customer access service, internal response, and consumption behavior of security agency users through a structural model. The research will be meaningful in that it can contribute to the development of the security industry by identifying the importance of customer access service, which is an empirical face of buyers using security agency, and thus establishing the relationship between consumer reaction and consumption behavior. The study subject is a store that uses security agency in areas with dense shopping districts in Cheonan and Asan of South Chungcheong Province, where 375 store representatives and employees were selected to conduct the research. Research tools were modified and used to suit the purpose of the research based on domestic and foreign prior research. Using two statistical programs, SPSS 25.0 and AMOS 25.0, data processing was performed: frequency analysis, exploratory factor analysis, reliability analysis, confirmed factor analysis, and structural model analysis. The statistical significance level was analyzed by setting a value of .05 and the following conclusions were obtained. First, the customer access service of security agency users has a positive impact on consumption behavior. Second, the customer access service of security agency users has a positive effect on the internal response. Third, the internal response of security agnecy users has a positive effect on consumption behavior. Fourth, the internal response has a positive effect as a medium effect between customer access service and consumption behavior of security agency users.

A Study on Voice over Internet Protocol Security Response Model for Administrative Agency (행정기관 인터넷전화 보안 대응 모델 개발 연구)

  • Park, Dea-Woo;Yang, Jong-Han
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.237-240
    • /
    • 2011
  • Voice over Internet Protocol calls using administrative agency to build a national information and communication service, 'C' group, providers, the KT, SK Broadband, LG U+, Samsung SDS, as there are four operators. To prepare for an attack on Voice over Internet Protocol for administrative agency, security is a need for research to support the model. In this paper, the Internet telephone business of Administrative Agency to investigate and analyze the specific security measures to respond. Should set priorities around confidentiality about five security threats from NIS to Study of Voice over Internet Protocol Security Response Model for Administrative Agency. (1) Illegal wiretapping, (2) call interception, (3) service misuse, (4) denial of service attacks, (5) spam attacks, write about and analyze attack scenarios. In this paper, an analysis of protection by security threats and security breaches through a step-by-step system to address the research study is a step-by-step development of the corresponding model.

  • PDF

Information Security Pre-Evaluation Model for New IT Service : Case of RFID Service (신규IT서비스의 정보보호사전평가모델 : RFID 서비스 적용 중심)

  • Shin Dong-Hoon;Kim Guk-Tea;Lee Gang-Shin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.975-978
    • /
    • 2006
  • 통신기술의 급속한 발전으로 네트워크 환경이 광대역통합망으로 진화되어가고 있다. 이로 인해 개별 네트워크에서 운영되던 IT서비스들 또한 광대역통합망 환경에서 빠른 속도로 융합되고 있다. 하지만, 개별 네트워크에서 운영되던 기존의 IT서비스들이 광대역통합망에서 서로 융합되어 신규 IT 서비스를 생성하는 과정에서 보안요소가 적용되지 않을 경우에 신규 IT서비스의 안정성 및 신뢰성이 떨어질 수 있다. 이러한 문제점을 해결하기 위해서, 본 논문에서는 신규 IT 서비스의 기반구축 및 운영이전인 서비스에 대한 기획 및 설계시에 필수적인 보안대책 제시하여 서비스 운영이전에 보안대책을 적용할 수 있도록 함으로써, 신규 IT 서비스의 안정성과 신뢰성을 확보할 수 있는 방법으로 정보보호사전평가 모델을 제시하고, 이 모델을 RFID 서비스에 적용한 예제를 설명한다.

  • PDF

Development of Indicators for Information Security Level Assessment of VoIP Service Providers

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.634-645
    • /
    • 2014
  • VoIP (Voice over Internet Protocol) is a technology of transmitting and receiving voice and data over the Internet network. As the telecommunication industry is moving toward All-IP environment with growth of broadband Internet, the technology is becoming more important. Although the early VoIP services failed to gain popularity because of problems such as low QoS (Quality of Service) and inability to receive calls as the phone number could not be assigned, they are currently established as the alternative service to the conventional wired telephone due to low costs and active marketing by carriers. However, VoIP is vulnerable to eavesdropping and DDoS (Distributed Denial of Service) attack due to its nature of using the Internet. To counter the VoIP security threats efficiently, it is necessary to develop the criterion or the model for estimating the information security level of VoIP service providers. In this study, we developed reasonable security indicators through questionnaire study and statistical approach. To achieve this, we made use of 50 items from VoIP security checklists and verified the suitability and validity of the assessed items through Multiple Regression Analysis (MRA) using SPSS 18.0. As a result, we drew 23 indicators and calculate the weight of each indicators using Analytic Hierarchy Process (AHP). The proposed indicators in this study will provide feasible and reliable data to the individual and enterprise VoIP users as well as the reference data for VoIP service providers to establish the information security policy.

Analysis of Security Threat in u-Healthcare Service (u-Healthcare 서비스의 정보보호 위협 분석)

  • Shin, Dong-Hoon;Han, Byoung-Jin;Lee, Hwan-Jin;Jung, Hyun-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.52-55
    • /
    • 2010
  • 유비쿼터스 기술의 발전으로, u-City, u-물류, u-기상관측,u-Healthcare 등 다양한 융합 서비스가 개발되어 실생활에 적용되기를 기다리고 있다. 이들 중, 기존 의료서비스에 유비쿼터스 기술을 접목하여 언제, 어디서나 보건의료서비스를 제공하고자 하는 u-Healthcare 서비스의 경우에는, 바이오정보를 포함한 개인 정보와 의료정보를 다루기 때문에 해킹으로 인한 정보유출 사고발생시 국가적인 혼란과 사회적인 불신을 야기할 수 있다. 본 논문에서는 국내외에서 추진하고 있는 u-healthcare 서비스 현황을 조사하고, 이에 대한 보안위협을 제시하여 u-Healthcare 서비스의 정보보호 대책 수립시 활용할 수 있도록 제시한다.

  • PDF

The study on a threat countermeasure of mobile cloud services (모바일 클라우드 서비스의 보안위협 대응 방안 연구)

  • Jang, Eun-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Joo-Young;Lee, Jae-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.177-186
    • /
    • 2011
  • Mobile services which are applied PC performance and mobile characteristics are increased with spread of the smartphone. Recently, mobile cloud service is getting the spotlight as a solution of mobile service problems that mobile device is lack of memory, computing power and storage and mobile services are subordinate to a particular mobile device platform. However, mobile cloud service has more potential security threats by the threat inheritance of mobile service, wireless network and cloud computing service. Therefore, security threats of mobile cloud service has to be removed in order to deploy secure mobile cloud services and user and manager should be able to respond appropriately in the event of threat. In this paper, We define mobile cloud service threats by threat analysis of mobile device, wireless network and cloud computing and we propose mobile cloud service countermeasures in order to respond mobile cloud service threats and threat scenarios in order to respond and predict to potential mobile cloud service threats.