• Title/Summary/Keyword: 내부정보

Search Result 4,732, Processing Time 0.03 seconds

Implemantation of Smart Home with Fire Detection and Initial Suppression Function (화재 감지 및 초기진압 기능을 가진 스마트 홈 구현)

  • Yeo, Sang-Sam;Kim, Dong-Hwan;Kim, Yang-u;Park, Rae-chang;Kim, Hyeon-u;Kim, Chan-yeong;Kim, Dong-geun;Yu, Injae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.439-440
    • /
    • 2022
  • 대부분의 주거환경은 가전제품이나 전등 등을 수동적으로 제어하는 방식이 일반적이다. 본 연구에서는 주거환경을 스마트화함으로써 사용자의 불편함과 번거로움을 줄이고 효율적인 환경관리와 보안을 강화를 할 수 있도록 한다. 본 논문은 아두이노, 여러 센서와 블루투스모듈을 사용하여 집 내부 환경을 자동제어관리하고 사용자가 스마트폰 어플로 집 내부 환경을 파악하고 가전제품을 제어함으로써 편리함을 추구함과 동시에 에너지 절약에 도움이 될 수 있게 한다. 또한 와이파이로 연결된 카메라로 영상을 스트리밍하여 집 내부를 확인하고 대응할 수 있게 하여, 현대인의 집을 스마트하게 관리할 수 있는 "아두이노를 이용한 스마트홈"을 제안한다. 기존의 주거환경과 다르게 집 내부의 환경을 자동제어 및 환경정보를 확인하고 사용자가 직접 가전제품을 제어할 수 있으며, CCTV를 통해 집 내부를 확인 할 수 있도록 한다. 또한 화재가 감지되면 경보와 스프링클러가 작동하여 초기진압을 할 수 있다.

  • PDF

A implement of blackbox with in vehicle network data and the external sensor data (차량내부정보와 외부센서를 사용한 블랙박스 구현)

  • Kim, Jang-Ju;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2471-2477
    • /
    • 2010
  • lately, vehicle blackbox increasing importance and usability Is needed accuracy and variety of information. because, blackbox help to analyze the exact cause of the accident and use as objective evidence in vehicle-related crime. In the paper, to overcome the limitations of the existing black box, use various sensors and vehicle information blackbox store current state of the vehicle with OBD-II protocol using vehicle state information and store exact current location and direction information of the vehicle with Gyro sensor and GPS and use global time of GPS for synchronization of information. In addition, blackbox back the information up with wifi. because, when blackbox damaged, dirvers were able to verify the information.

A implement of blackbox with in vehicle network data and the external sensor data (차량내부정보와 외부센서를 사용한 블랙박스 구현)

  • Kim, Jang-Ju;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.76-79
    • /
    • 2010
  • lately, vehicle blackbox increasing importance and usability Is needed accuracy and variety of information. because, blackbox help to analyze the exact cause of the accident and use as objective evidence in vehicle-related crime. In the paper, to overcome the limitations of the existing black box, use various sensors and vehicle information blackbox store current state of the vehicle with OBD-II protocol using vehicle state information and store exact current location and direction information of the vehicle with Gyro sensor and GPS and use global time of GPS for synchronization of information. In addition, blackbox back the information up with wifi. because, when blackbox damaged, dirvers were able to verify the information.

  • PDF

Insider Threat Detection Technology against Confidential Information Loss using Email (이메일을 통한 기밀정보 유출 유형의 내부자 위협 탐지 기술)

  • Youngjae Lee;Seongwon Kang;Kyungmi Kim;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.217-218
    • /
    • 2023
  • 내부자 위협이란, 조직의 보안 및 데이터, 시스템에 대한 내부 정보에 접근하는 현 임직원 및 전 임직원, 계약자와 같이, 동일한 조직 내부의 사람들로부터 발생하는 위협을 의미한다. 일반적으로 내부자들은 업무를 위하여, 시스템에 대한 합법적인 접근 권한을 가지며, 만약 이러한 권한이 오남용되는 경우에는 조직에 매우 심각한 피해를 입힐 수 있다. 이러한 내부자 위협은 외부로부터의 위협보다 방어 및 탐지가 훨씬 어려운 한계점이 있으며, 그 피해 규모가 매우 방대하다는 문제점도 존재한다. 이에 따라, 본 논문에서는 내부자 위협을 탐지하기 위하여, 이메일을 통한 기밀정보를 유출하는 유형의 위협에 대응하는 방안을 제안한다. 제안하는 방안은 조직 내에서 이메일을 발신하는 경우를 대상으로, 파일이 포함된 이메일에 발신자를 식별하기 위하여, 파일에 키 값 및 서명을 삽입하며, 발신되는 이메일을 모니터링하여 첨부된 파일의 유형을 파악함으로써, 동적 그래프를 통하여 시각화한다. 내부 시스템 및 네트워크에서의 보안관제 담당자 및 관리자는 시각화된 그래프를 확인함으로써, 직관적으로 정보 유출을 파악하고 대응할 수 있을 것으로 판단된다. 본 논문에서 제안하는 방안을 통하여, 조직 내의 내부자 위협을 탐지할 수 있으며, 데이터 유출 사고가 발생하는 경우, 유출자를 빠르게 식별하고 초기에 대응할 수 있을 것으로 판단된다.

  • PDF

Secure Knowledge Management for Prevent illegal data leakage by Internal users (내부 사용자에 의한 불법 데이터 유출 방지를 위한 안전한 지식관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Lee, Min-Kyung;Yoon, Mi-Yeon;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.73-84
    • /
    • 2010
  • Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.

(벡터) 부울 함수의 비선형성에 관한 연구

  • 정하봉
    • Review of KIISC
    • /
    • v.4 no.1
    • /
    • pp.88-95
    • /
    • 1994
  • 본 논문에서는 벡터 부울함수의 비선형성의 척도인 선형 함수군까지의 거리에 대해 알아본다. 특히 S-Box의 내부 함수로 이용될 수 있는 출력의 균등 분포성을 만족하는 벡터 부울함수의 선형함수군까지의 거리의 하계를 유도한다. 더불어 EDS에서의 S-Box내부함수의 비선형도를 산출하고 보다 비선형도가 높은, 즉 선형 함수군까지으 거리가 더 먼 새로운 S-Box의 존재를 밝힌다.

  • PDF

The effect of Internal control over financial reporting on probability of firm failure (내부회계관리제도가 기업실패가능성에 미치는 영향)

  • Kim, Hyun-Jin
    • Management & Information Systems Review
    • /
    • v.33 no.1
    • /
    • pp.173-190
    • /
    • 2014
  • According to COSO(2013) "Internal control is a process that is designed to provide reasonable assurance that a firm can achieve its objectives, where differing aspects of internal control can be partitioned into operating objectives, reporting objectives, and compliance objectives." Internal control over financial reporting(ICFR) is focus on reporting objectives and includes that provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use or disposition of the company's assets that could have a material effect on the financial statements. Thus, firms with weak ICFR have negative a effect on Firm value because those firms are great likelihood of misappropriation and inefficiency decision. In this regard, this study investigates the association of ICFR with the likelihood of firm failure. Specially, I measure the characteristic of ICFR as disclosures of material weaknesses and operating personnel of ICFR. I identify the likelihood of firm failure as going-concern opinion issued in audit report. As result, I find that a higher probability of firm failure is positively associated with the material weakness in ICFR also I find that a higher probability of firm failure is negatively associated with experience and qualified CPA of personnel in ICFR.

  • PDF

Leakage Prevention System of Mobile Data using Object Recognition and Beacon (사물인식과 비콘을 활용한 모바일 내부정보 유출방지 시스템)

  • Chae, Geonhui;Choi, Seongmin;Seol, Jihwan;Lee, Jaeheung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.17-23
    • /
    • 2018
  • The rapid development of mobile technology has increased the use of mobile devices, and the possibility of security incidents is also increasing. The leakage of information through photos is the most representative. Previous methods for preventing this are disadvantageous in that they can not take pictures for other purposes. In this paper, we design and implement a system to prevent information leakage through photos using object recognition and beacon. The system inspects pictures through object recognition based on deep learning and verifies whether security policies are violated. In addition, the location of the mobile device is identified through the beacon and the appropriate rules are applied. Web applications for administrator allow you to set rules for taking photos by location. As soon as a user takes a photo, they apply appropriate rules to the location to automatically detect photos that do not conform to security policies.

A Study on Security Container to Prevent Data Leaks (정보 유출 방지를 위한 보안 컨테이너의 효과성 연구)

  • Lee, Jong-Shik;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1225-1241
    • /
    • 2014
  • Recently, Financial companies implement DLP(Data Leaks Prevention) security products and enforce internal controls to prevent customer information leaks. Accidental data leaks in financial business increase more and more because internal controls are insufficient. Security officials and IT operation staffs struggle to plan countermeasures to respond to all kinds of accidental data leaks. It is difficult to prevent data leaks and to control information flow in business without research applications that handle business and privacy information. Therefore this paper describes business and privacy information flow on applications and how to plan and deploy security container based OS-level and Hypervisor virtualization technology to enforce internal controls for applications. After building security container, it was verified to implement internal controls and to prevent customer information leaks. With security policies additional security functions was implemented in security container and With recycling security container costs and time of response to security vulnerabilities was reduced.