• Title/Summary/Keyword: 금융정보시스템

Search Result 580, Processing Time 0.025 seconds

Analysis of the present state and Improvement of the Institute of Information Security Education for the Gifted (정보보호영재교육원 운영현황 분석 및 개선방안)

  • Yun, Bo-Ram;Hong, Do-Won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.441-449
    • /
    • 2016
  • Today, as a daily routine such as administration/finance is operated under information system and various cyber crime against national, public, and private institutions happen, demand for information security manpower is increasing. Hence, Ministry of Education has formed an Institute of Information Security Education for the Gifted to early discover talent in the field of information security and train professional personnel with specialty and ethics in 4 universities of country in 2014. But the nascent Institute of Information Security Education for the Gifted lack systematic analyses compared to Institute of Mathematics and Science Education for the Gifted that has existed from a long time ago. In this paper, we analyze the state of the Institute of Information Security Education for the Gifted in three parts: operation, selection, education and suggest an improvement to build a practical program for effective operations and education.

Current Status and Prospect of Techniques for Identification of Sabotage Targets (에너지 시스템의 사보타지 표적 인식 기법의 현황 및 전망)

  • Kim, Seong-Ho;Choi, Y.;Jung, W.S.;Kim, K.Y.;Yang, J.E.
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2007.11a
    • /
    • pp.288-293
    • /
    • 2007
  • 미국 911 테러 발생 이후로, 국가 기반시설(예: 송/배전 전력망, 석유/가스 파이프라인, 원자력 발전소, 정보통신 시설, 교통 시설, 금융 시설, 매스미디어 시설 등)에 대한 테러리스트의 사보타지 리스크를 관리하는 도전문제에 정부 차원이나, 기업 차원에서 국내외적으로 뜨거운 이목이 집중되고 있다. 그 가운데 에너지 시스템, 특히 원자력 발전소의 물리적 보안은 국가 안보 차원에서 매우 중대한 이슈가 되고 있다. 이는 사보타지로 인한 이러한 시스템의 파손이 국민, 작업자, 또는 외부 환경에 방사성물질 누출과 같은 중대한 결말을 초래할 수 있기 때문이다. 원전과 같은 복잡 시스템에서 설계 기준 위협이 초래할 수 있는 이러한 결말은 그 시스템의 특정 핵심 표적(예: 부품, 구역, 자산, 행위, 인원)의 방호를 통해 효과적으로 방어될 수 있다. 다시 말하면, 표적 인식에서는 어떻게 방어할 것인가에 앞서서 무엇을 방어할 것인가를 다루려는 것이다. 이 연구의 주요 목적은 여태까지 개발된 다양한 표적 인식 기법의 개발 추세를 소개하고 향후 전망을 제시하는 데에 있다. 이를 통해 표적 인식 기법의 수월성, 신뢰성, 및 경제성을 제고할 수 있으리라 본다. 표적 인식 기술의 활용성 측면에서 볼 때, 표적 인식은 하드웨어 적이거나 소프트웨어적인 방호 시스템의 설계에 필수적이므로, 신뢰성 높은 표적 인식은 다음과 같은 긍정적인 파급 효과를 줄일 수 있다: 1) 사보타지 리스크 감소에 직간접적으로 기여할 수 있다; 2) 제한적인 보안 재원을 효율적으로 할당할 수 있다; 3) 보안 대응군대의 훈련 시나리오를 개발할 수 있다; 4) 발전소 규제요건인 안전조치 계획을 비용이나 보안 측면에서 향상시켜 국민 안심(public easiness)을 도모할 수 있다. 향후에는 보다 더 광의적인 복잡 시스템 사이에서 상호 연계적인 사보타지에 대한 표적 인식의 기법들이 점검될 필요성이 있다고 본다.

  • PDF

Comparison of key management systems across different industries (다양한 산업에서의 키 관리 시스템 비교 분석)

  • Woojoo Kwon;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.3
    • /
    • pp.55-61
    • /
    • 2024
  • As the digital environment becomes more complex and cyber attacks become more sophisticated, the importance of data protection is emerging. As various security threats such as data leakage, system intrusion, and authentication bypass increase, secure key management is emerging. Key Management System (KMS) manages the entire encryption key life cycle procedure and is used in various industries. There is a need for a key management system that considers requirements suitable for the environment of various industries including public and finance. The purpose of this paper is to derive the characteristics of the key management system for each industry by comparing and analyzing key management systems used in representative industries. As for the research method, information was collected through literature and technical document analysis and case analysis, and comparative analysis was conducted by industry sector. The results of this paper will be able to provide a practical guide when introducing or developing a key management system suitable for the industrial environment. The limitations are that the analyzed industrial field was insufficient and experimental verification was insufficient. Therefore, in future studies, we intend to conduct specific performance tests through experiments, including key management systems in various fields.

  • PDF

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment (NFC 모바일 환경에서 결제정보보호를 위한 NTRU 기반 인증 기법)

  • Park, Sung Wook;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.133-142
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

정책자금정보: 2011년도 중소기업 정책자금 지원 안내 -올해 정책자금 규모 3조2천억원으로 전년 대비 2.3% 증가

  • 한국광학기기협회
    • The Optical Journal
    • /
    • s.131
    • /
    • pp.68-74
    • /
    • 2011
  • 올해 정책자금 운영규모는 3조2075억원으로 지난해보다 2.3% 증가했다. 특히 기술혁신형 창업 및 성장초기 기업육성을 위해 '창업 및 개발기술사업화자금(1조4000억원)'을 지난해보다 2200억원 늘렸고, 개발기술사업화자금(2580억원)도 1000억원 늘렸다. 올해부터 정책자금의 배분전략이 그간의 "Negative시스템(특정산업을 제외한 모든산업지원방식)"에서 '전략산업'을 종점 지원하는 방식인 "Positive시스템"으로 전환된다. 중기청은 특히, 녹색 신성장동력 산업 등 성장 가능성이 큰 7대 전략산업에 정책자금의 70%인 2조2천억원을 집중 투입할 계획이다. 이에 따라 태양전지 LED응용 IT융합 고부가식품산업(녹색 신성장동력산업), 금형 등에 정책자금이 집중 지원될 것으로 보인다. 이와 함께 우량기업 및 한계기업을 지원대상에서 제외하고 동일기업에 대한 편중지원을 제한하는 등 정책목적성을 대폭 강화할 예정이다. 자체 신용으로 민간금융 이용이 가능하나 저금리 혜택을 위해 정책자금을 이용하는 우량기업 및 생명연장식 한계기업 등에 대한 지원을 배제하고, 절감된 재원(약 3,000억원)은 전략산업의 창업초기기업에 종점 지원할 계획이다. 자세한 사항 및 정책자금 신청 희망기업은 중소기업진흥공단 홈페이지(www.sbc.or.kr) '정책자금 융자도우미'를 통해 신청요건 및 추천자금 등을 자가진단 후 신청하면 된다.

  • PDF

The impact of Foreign direct investment on Energy intensity: absorptive capacity as moderator (외국인 직접투자가 에너지 집약도에 미치는 영향분석-흡수능력의 조절효과를 중심으로)

  • Wang, Xiao Xue;Hwang, Yun-Seop
    • International Commerce and Information Review
    • /
    • v.16 no.5
    • /
    • pp.179-201
    • /
    • 2014
  • The complementary effect between FDI and its absorptive capacity has drawn more attention than before. This paper intended to explore the relationship between energy intensity and such complementary effect. The absorptive capacity of FDI shows various aspects among which we focus on the human capital, the financial system and the infrastructure in this paper. Using the panel data from 1990 to 2011, the study is processed between the 20 OECD and 20 Non-OECD countries. The empirical results shown that for OECD country, a complementary effect exists between FDI and its absorbability and it has the controlling effect on energy reduction. But the effect is only significant in the human capital and the financial system. The infrastructure variable is less important in OECD country due to their high development level. However, for non-OECD country, the complementary effect between infrastructure and FDI reduces energy consumption significantly, it can get to the point that the process for infrastructure to attract FDI and also benefits from it only blow its way to the Non-OECD, developing countries, without andy special effects for the OECD countries which has already highly build up their infrastructure. Also, the financial system in Non-OECD countries is at the primary stage yet, which is not easy to contribute efficiency. To make a conclusion, the complementary effect between infrastructure and FDI in OECD country and which between finical system and FDI in non-OECD country cannot enhance energy efficiency as expected.

  • PDF

A Review of the Legal Nature that Users of the Virtual Currency Exchange Obtain and the Compensation Responsibility for the Damages Caused By Internet Problems or Network Errors (가상통화거래소 이용자가 가지는 법적 성격과 전산장애로 인한 손해배상 책임 연구)

  • Choi, JangWon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.287-294
    • /
    • 2018
  • This thesis covers legal aspects of the crypto-currency exchange and the legal rights of crypto-currencies holders. Unlike financial markets in which central authorities or intermediaries determine the validity of transactions and manage records, crypto-currency markets utilize a decentralization system based on block chain technology. Such distinct characteristics distinguish crypto-currency from currency, notes, or financial instruments. Therefore, we need to check closely the legal principles that are applicable to crypto-currency. Crypto-currency users possess rights indirectly through the crypto-currency exchange. However, we should look at whether crypto-currency can be an object of ownership. This research found that legal protection for crypto-currency exchanges are limited. Domestic laws have many shortcomings to protect users' rights. This study found that users who incurred damages due to internet computation errors at exchanges require a protective system like stock markets. Therefore, studies on the legal controls and system regulations are required to protect users' rights. Also, crypto-currency information exchanges keep inside and protections for users' private information need to be further examined.

A Study on Payment Finality and Usefulness in the Electronic Payment System -Based on U.C.C. 4A- (국제전자자금이체시스템에서 지급의 최종성과 유용성에 관한 고찰(미국의 전자금융제도를 중심으로))

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.35-53
    • /
    • 2010
  • In connection with a non-cash payment through the banking system, "finality of payment" has acquired diverse meanings. In according to Section 4A-209(2), the acceptance by the beneficiary's bank by means of receiving payment "pursuant to section 4A-403(a)(1) or 4A-403(a)(2)," constitutes final settlement through a Federal Reserve Bank or through a funds-transfer system" or credit to the account of the beneficiary's bank. Above of all, Acceptance by beneficiary's bank is the most important. According to 4A-209(b), the beneficiary's bank can accept a payment order in one of four ways : First, by paying the beneficiary; obligating itself to pay the beneficiary or, Second, by notifying the beneficiary of receipt of the order or notifying the beneficiary that its account was credited or, Thirdly, by receiving full payment from the sender's order or Lastly, by passage of time, i.e., the opening of the next funds transfer business day of the bank following the payment date of the order. A beneficiary's bank is considered to have accepted a payment order when the earliest of the four means of acceptance occurs.

  • PDF

Comparison of model selection criteria in graphical LASSO (그래프 LASSO에서 모형선택기준의 비교)

  • Ahn, Hyeongseok;Park, Changyi
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.4
    • /
    • pp.881-891
    • /
    • 2014
  • Graphical models can be used as an intuitive tool for modeling a complex stochastic system with a large number of variables related each other because the conditional independence between random variables can be visualized as a network. Graphical least absolute shrinkage and selection operator (LASSO) is considered to be effective in avoiding overfitting in the estimation of Gaussian graphical models for high dimensional data. In this paper, we consider the model selection problem in graphical LASSO. Particularly, we compare various model selection criteria via simulations and analyze a real financial data set.

A Study on The Mutually Authentication Mechanism for The Safe Electronic Signature (안전한 전자서명을 위한 상호인증 메커니즘에 관한 연구)

  • Choi, Sang-Wook;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.772-775
    • /
    • 2008
  • As the wireless communication technology developed, the Electric Commerce using a mobile was activated. WPKI was developed in order to guarantee the stability of the Electric Commerce but it is difficult to be ensured for the safe PKI service which is the same at the wire communication in the technical because of restriction of the mobile terminal. In this paper, we propose the authentication system for the electronic financial service which is safe and is effective in consideration of the restrictive characteristic of the mobile terminal. Moreover, the encryption algorithm for the safe electronic signature is proposed. In WPKI, this makes the cross certification of each certificate authority possible. Moreover, a stability was enhanced through the signature authentication using KCDSA and SEED algorithm.

  • PDF