• Title/Summary/Keyword: 디지털 패치

Search Result 45, Processing Time 0.029 seconds

A study on the cyber security assessment modeling of critical infrastructure (핵심기반시설 사이버 보안 평가 모델링 기법 연구)

  • Euom, Ieck-Chae
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.105-113
    • /
    • 2019
  • The purpose of this study is to analyze cyber security risk modeling of critical infrastructure, draw out limitations and improvement measures. This paper analyzed cyber security risk modeling of national critical infrastructure like as electricity sector, nuclear power plant, SCADA. This paper analyzed the 26 precedent research cases of risk modeling in electricity sector, nuclear power plant, SCADA. The latest Critical Infrastructure is digitalized and has a windows operating system. Critical Infrastructure should be operated at all times, it is not possible to patch a vulnerability even though find vulnerability. This paper suggest the advanced cyber security modeling characteristic during the life cycle of the critical infrastructure and can be prevented.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

Real-Time Respiration and Heartbeat Detector Using a Compact 1.6 GHz Single-Channel Doppler Sensor (소형화된 1.6 GHz 단일 채널 도플러 센서를 이용한 실시간 호흡 및 심장 박동 감지기)

  • Lee, Hyun-Woo;Park, Il-Ho;Kim, Dong-Wook
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.4 s.119
    • /
    • pp.379-388
    • /
    • 2007
  • This paper presents a real-time respiration and heartbeat detector comprised of a 1.6 GHz single-channel Doppler sensor and analog/digital signal processing block for remote vital sign detection. The RF front end of the Doppler sensor consists of an oscillator, mixer, low noise amplifier, branch-line hybrid and patch antenna. We apply artificial transmission lines(ATLs) to the branch-line hybrid, which leads to a size reduction of 40 % in the hybrid, while its performance is very comparable to that of a conventional hybrid. The analog signal conditioning block is implemented using second order Sallen-Key active filters and the digital signal processing block is realized with a LabVIEW program on a computer. The respiration and heartbeat detection is demonstrated at a distance of 50 cm using the developed system.

Composite EBG Power Plane Using Magnetic Materials for SSN Suppression in High-Speed Digital Circuits (고속 디지털 회로의 SSN 억제를 위한 자성 재료가 적용된 복합형 EBG 전원면)

  • Eom, Dong-Sik;Kim, Dong-Yeop;Byun, Jin-Do;Lee, Hai-Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.8
    • /
    • pp.933-939
    • /
    • 2008
  • In this paper, a new composite electromagnetic bandgap(EBG) structure using magnetic materials is proposed for simultaneous switching noise(SSN) suppression in the high-speed digital circuits. The proposed EBG structure has periodic unit cells of square-patches connected by spiral-shaped bridges. The magnetic materials are located on the unit cells of spiral-shaped EBG. The real part of the permeability shifts bandgap to the lower frequency region due to the increased effective inductance. The imaginary part of the permeability has magnetic loss that decreases parasitic LC resonance peaks from between the unit cells. As a result, the proposed structure has the lower cut-off frequency compared with conventional EBG structure and -30 dB SSN suppression bandwidth from 175 MHz to 7.7 GHz. The proposed structure is expected to improve the power integrity and reduce the size of the EBG power plane.

Community health promotion and improvement of business for No-Smoking (지역사회의 건강증진을 위한 금연사업의 개선방안)

  • Han, Myung-Yee;Kim, No-Ma;Chandrkant, Mehta Jaydip
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.317-322
    • /
    • 2012
  • Public Health "NO-Smoking Clinic" smokers nine times more than 6 months smoking cessation counseling services and CO measurement, nicotine aids(patches, gum and candy) to provide. Behavioral enrichment items and memorabilia, including the provision of smoking cessation, smoking, andsmokingreducesinductionpracticeto improve the health of local residents to promote. Lifestyle habits such as smoking and excessive drinking, such as hyperlipidemia, and obesity is a major factor causing chronic disease, economic loss, and even new philosophy of life as a healthy culture is a factor that destroys. Smoking, heavy drinking, such as healthy life styles and cultural values of life as well as the economic value of medical care and also when you consider that there is a close relationship, such as smoking prevention and smoking cessation and moderation of the business and institutions involved in health education institutional support for the "NO-Smoking Clinic" should be parallel to the landing.

Method of estimating the deleted time of applications using Amcache.hve (앰캐시(Amcache.hve) 파일을 활용한 응용 프로그램 삭제시간 추정방법)

  • Kim, Moon-Ho;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.573-583
    • /
    • 2015
  • Amcache.hve file is a registry hive file regarding Program Compatibility Assistant, which stores the executed information of applications. With Amcache.hve file, We can know execution path, first executed time as well as deleted time. Since it checks both the first install time and deleted time, Amcache.hve file can be used to draw up the overall timeline of applications when used with the Prefetch files and Iconcache.db files. Amcache.hve file is also an important artifact to record the traces of anti-forensic programs, portable programs and external storage devices. This paper illustrates the features of Amcache.hve file and methods for utilization in digital forensics such as estimation of deleted time of applications.

Design and Fabrication of Rectenna for Microwave Wireless Power Transmission (마이크로파 무선전력전송을 위한 렉테나 설계와 구현)

  • Park, Jeong-Heum
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.6
    • /
    • pp.43-48
    • /
    • 2006
  • In this paper, the rectenna converting 2.45[GHz] microwave into DC power is designed and fabricated for wireless power transmission using microwave and the methode for impedance matching and tuning are proposed in order to maximize RF-DC conversion efficiency. The fabricated rectenna can be easily tuned by using a broad open stub and has the RF-DC conversion efficiency up to 59[%] when the 5[dBm] input power is applied. The 2.2[V], 1.5[mW] DC level, in the 1[m] distance between the transmitter and the receiver can be obtained and this value is avaliable in the small power digital system.

Color Correction for Projected Image on Light Colored Screen using a Still Camera (카메라를 사용한 유색 스크린에 투영된 영상의 색 보정 기법)

  • Kim, Dae-Chul;Lee, Tae-Hyoung;Ha, Yeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.1
    • /
    • pp.16-22
    • /
    • 2011
  • Recently, the use of portable projector expands applications to meeting at fields. Accordingly, the projection is not always guaranteed on white screen, causing some color distortion. Several algorithms have been suggested to correct the projected color on the light colored screen. These have limitation on the use of measurement equipment which can't bring always. In this paper, color correction method using general still camera as convenient measurement equipment is proposed to match the colors between on white and colored screens. A patch containing 9 ramps of each channel are firstly projected on white and colored screens, then captured by the camera, respectively, Next, digital values are obtained by the captured image for each ramp patch on both screens, resulting in different values to the same patch. After that, we check which ramp patch on colored screen has the same digital value on white screen, repeating this procedure for all ramp patches. The difference between corresponding ramp patches reveals the quantity of color shift. Then, color correction matrix is obtained by regression method using matched values. In the experimental results, the proposed method gives better color correction on the objective and subjective evaluation than the previous methods.

Research Trends of SCADA Digital Forensics and Future Research Proposal (SCADA 디지털포렌식 동향과 향후 연구 제안)

  • Shin, Jiho;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1351-1364
    • /
    • 2019
  • When SCADA is exposed to cyber threats and attacks, serious disasters can occur throughout society. This is because various security threats have not been considered when building SCADA. The bigger problem is that it is difficult to patch vulnerabilities quickly because of its availability. Digital forensics procedures and techniques need to be used to analyze and investigate vulnerabilities in SCADA systems in order to respond quickly against cyber threats and to prevent incidents. This paper addresses SCADA forensics taxonomy and research trends for effective digital forensics investigation on SCADA system. As a result, we have not been able to find any research that goes far beyond traditional digital forensics on procedures and methodologies. But it is meaningful to develop an approach methodology using the characteristics of the SCADA system, or an exclusive tool for SCADA. Analysis techniques mainly focused on PLC and SCADA network protocol. It is because the cyber threats and attacks targeting SCADA are mostly related to PLC or network protocol. Such research seems to continue in the future. Unfortunately, there is lack of discussion about the 'Evidence Capability' such as the preservation or integrity of the evidence extracting from SCADA system in the past researches.