• Title/Summary/Keyword: technical security service

Search Result 166, Processing Time 0.027 seconds

Research on Technical Requirements of Security for Migration, Combination, and Separation of Web-Contents and Development of Cooperation Service Framework in N-Screen Services (N-스크린서비스 환경에서 웹콘텐츠 이동/결합/분리를 고려한 보안 기술 분석 및 협업 서비스 프레임워크 개발)

  • Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.169-176
    • /
    • 2014
  • According to explosion of smart-devices, demands on N-screen services based on cooperation of multiple screens are rapidly increasing. These N-screen services can provide new user-experience (UX) to users. That is, it can provide technical advances to users. On the other hand, it causes new security problems. In this paper, we analyze conventional web-security attacks, and we propose and analyze new security requirements for migration, combination, and separation of web-contents based on N-screen service scenarios. Also, we develop N-screen cooperation service framework in order to ensure user security.

The Study of Information Security Technologies for Security Incidents in Online Game Service (게임 서비스 침해유형에 따른 기술적 대응방안 연구)

  • Chang, Hang-Bae;Kim, Kyung-Kyu;Lee, Si-Jin
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.83-98
    • /
    • 2007
  • This study focused on online game security, which has been considered relatively insignificant when compared to the online game industry's rapid growth. In this study, the state of security incidents in the Korean game industry and security solutions for such cases were examined. At first the security incidents were classified according to the type of game security infringement. Based upon this classification, this study analyzed the causes that give rise to infringement of online game security, and developed technical solutions for such cases. Finally, this study verified whether or not these technical solutions could be applied to online game sites.

Metro Telecommunication Basis Facilities Standardization and Functional Improvement Research (도시철도 구내정보통신 기반설비 표준화 및 기능 향상방안)

  • Kim Moon-Tae;Yoon In-Young
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.964-968
    • /
    • 2005
  • The standardization of information communication is doing a Internal each other connection and each other characteristic stability operation security in objective. From the low-speed network of the subway operation beginning currently it changes with the superhigh speed digital information transmission communication service environment which is a quality service, the hazard which plans the quality improvement of the efficient communication service use which hits to here and passenger service the standardization of the technical standard which stands and the improvement which hits to an engineering standard and facility must come to accomplish. The facility which existing is been old or the enclosure communication equipments which are insufficient. it improves, establishment itexpands efficiently, like this facilities it is stabilized and it is economic and rationally use maintenance it manages with the plan for the inside and outside of the country information communication relation technical standard and engineering standard service feature improvement and future expandability and economical efficiency, the possibility of having a pliability in order to be, rational technical standard and standard it takes a triangular position, efficient characteristic security of information communication service there is a place objective which promises the rational development of course city railroad communication system with character. Function improvement of enclosure communication base equipment, against an improvement and standardization plan it described trom the prosecution which it sees.

  • PDF

Status and Future of Security Techniques in the Internet Banking Service (인터넷 뱅킹 서비스 보안기술의 현황과 미래)

  • Lee, Kyungroul;Yim, Kangbin;Seo, Jungtaek
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.31-42
    • /
    • 2017
  • As Internet banking service became popular, many users can exchange goods by online. Even though this advantage, there are incident cases in the Internet banking service due to security threats. In order to counteract this problem, various security techniques have been applied over whole area in the Internet banking service. Therefore, we described that analyzed results of security techniques applied in the financial institutions area and network communication area in this paper. We consider that this paper will be useful as a reference to protect security threats occurred by insiders and vulnerabilities in implementation.

Effect of Information Security Training and Services on Employees' Compliance to Security Policies (보안교육 및 보안서비스가 조직구성원의 정보보안정책 준수에 미치는 영향)

  • Kim, Bo-ra;Lee, Jong-Won;Kim, Beom-Soo
    • Informatization Policy
    • /
    • v.25 no.1
    • /
    • pp.99-114
    • /
    • 2018
  • In the past, organizations tended to focus on physical and technical aspects of managing corporate's information security (IS), rather than the aspect of human resources related to IS. Recently, increasing security incidents caused by organization members raise the issue of how to improve employees' compliance with security policies. This study conducted a field experiment to examine the effect of security awareness training and technical security services on employee's security behaviors. In Study 1, the number of spam opening cases were measured right after the IS training and re-measured three months later. In Study 2, a spam warning message was provided and then the number of employees' spam opening cases were counted to find out the effect of security services. It was found that both the IS training and the technical IS service were effective; they significantly decreased spam opening rates. However, the training effect did not last longer than three months. These findings suggest that organizations need to consider providing regular training programs and supplementary technical services to improve employees' compliance with security policies.

Safety Improvement Methods of Personal Identification Services using the i-Pin (아이핀 기반 본인확인서비스의 안전성 강화 방안)

  • Kim, Jongbae
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

Study on Technical trend of physical security and future service (물리보안의 기술동향과 미래 서비스에 대한연구)

  • Shin, Byoung-Kon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.159-166
    • /
    • 2010
  • From public insecurity, access of wealth, alteration of population structure, and changes of security recognition, physical security has been continuously developed and changed. In these days, typical systems for physical security are unmanned security system using telephone network and security equipment, image recognition system using DVR and camera, and access control system by finger print recognition and RFID cards. However, physical security system is broadening its domain towards ICT based convergence with networked camera, biometrics, individual authentication, and LBS services. This paper proposes main technical trends and various security convergences for future physical security services by classifying the security categories into 3 parts; Individual security for personal protection, IT Convergence for large buildings, and Homeland Security for omni-directional security.

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.

THE SITUATION AND DEVELOPMENT OF SECURITY GUARD WORKS ON OUR COUNTRY (우리나라 경호업의 현황 및 발전방안)

  • Park, Ju-Hyeon
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.123-134
    • /
    • 1997
  • Our conuntry have come out to the phenomenon to the atrocity crimes, make into a intellecture crims and specialization with them due to various change to the expension of economy growth, drift of population to cities and sense of value is plunged in confution, Now that things have come to this day, since foundation of the security guard law it first begin, ten years, civilian securities guard law was include to the civil service securities law due to amendment fo the civility secuties law newly on Dec. 30, 1995. According to the amendment, the part of the public peace of peoples livelihood were slough of the visual angle in knowledge which function of the civilies security were only be in under the government dimension were put in order to be tointly according to the such state of affairs, should found the consider a counterplan fundamentally regarding to the what to doing efforts foster the civilities securitylaw and qualitalive elevation of presidential guards. To make a long story short by few words, the question resolves itself into the following five points. The first, peoples arrengements for the attitude fo public duty service with devotedly Sustaining publicity work activities for the thire divert of the understanding of civilian security guard. The secondly, Existing security traders and security association should to support to the civilian security works. The third, The government office concerned should strengthen the licensing system in order to improve the quality of existings in order to may establishment newly systems of license and technical institute of regarding to them. The fourth, Should be newly organixed the exclusive organization of personal protective works in the police buroau for the sustaining development of civirity guard works and soundness of the upbringing. The fifth, It is necessary to found the reserch institute for the study on oretical, scholarly, study for the technical reserch and enlargement of effeciveness And try to find a solution to the Universitys function and duty, activity plan, support plan to the Department of security specialist for the come forward in succession it under the national assistance. The finally, I am sure that the Korean security association could be transiormed into the organization which reliable and receive a love from the peoples when doing best utmost to do pursuit of the structure to be a securitys legalism, specialization and total security systems.

  • PDF

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.