• Title/Summary/Keyword: 방어초점

Search Result 40, Processing Time 0.024 seconds

A Web Service Software Development Lifecycle to Reduce Cyber Attack (웹서비스의 사이버 위협을 줄이기 위한 소프트웨어 개발 방법론)

  • Kim, Ji-Yong;Lee, Song-Hee;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.993-996
    • /
    • 2010
  • 우리나라의 전자정부 서비스 대부분은 웹 환경을 기반으로 하고 있으며, 이는 국민생활의 질적인 향상을 가져온 반면 개인정보의 수집, 활용, 유통이 급격히 증가되면서 각종 프라이버시침해, 사이버 위협 등의 부작용이 수반되고 있으며 웹 브라우저의 다양화에 따른 웹접근성이 해결되어야 하고, 장애우 차별을 금지하기 위한 서비스가 동시에 제공되어야 한다. 따라서 웹서비스를 대상으로 하는 사이버 위협에 대한 보안대책과 다양한 서비스에 대한 대책이 중요한 요소로 부각되고 있다. 웹 환경에서의 보안문제를 해결하기 위해 기존에는 방어벽등 보안 모듈 부분을 강화하는데 초점을 맞추었으나, 본 논문에서는 그에 국한되지 않고 소프트웨어 개발초기 단계인 분석, 설계단계에서부터 보안문제를 고려하여 운영단계에 이르기까지 보안 취약점을 해결할 수 있는 방안을 제시하였다.

Korean Wang-ta: Characteristics and Prevention Program (한국의 왕따와 예방프로그램)

  • Keumjoo Kwak
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.1_spc
    • /
    • pp.255-272
    • /
    • 2008
  • When observing the subjects and seriousness of Korea's Wang-ta, it is urgent that we know the characteristics of Wang-ta and its conditions. In this study, we investigated the definition of Wang-ta, which partly differs from bullying. Also, the phenomenal characteristics of collectivism, the victimization of an individual once stigmatized in the Wang-ta process, the generalization of the Wang-ta process where bullies extend their territory into general students were examined. Moreover, external environment such as Korea's school environment, negative house environment, and collective culture were examined. The three general structures in researching Korea's Wang-ta were presented. The first structure consists of a bully, victim, and a bully-victim. The second structure focuses on the certain groups, which consists of followers, outsider, and the defender. The last structure deals with the psychological characteristics of the participant roles, which are the bully, reinforcer, assistant, defender, victim, and outsider. Wang-ta prevention programs, which reflects the characteristics of Wang-ta, are presented. Implications on future Wang-ta prevention programs are discussed.

  • PDF

The Effect of Bundle Framing on Purchase Intention (묶음제품 프레이밍이 구매의사 결정에 미치는 영향)

  • Lee, So-Young;Kim, Hyang-Mi
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.233-241
    • /
    • 2014
  • This study explore how framing affects the consumer's attitude toward the bundle products. On the basis of the framing theory, response compatibility hypothesis and regulatory focus theory, this study examine the impact of framing on the consumer's choice in multi-alternative set and analyzes the manner in which he/she selects or rejects an alternative. The data obtained from experiment shows that : 1. Consumers focus on the positive attributes of in selection task, however, in rejection task he/she will focus on negative attributes. 2. Consumers are not influenced by prevention framing when he/she selects an alternative however, he/she is not influenced by promotion framing when reject an alternative. Understanding the underlying cognitive process of choosing abd rejecting in multiple alernatives can help marketers to create effective framing strategies for the bundle product.

Interaction Effects of Crisis Responsibility and SNS Interactivity on Acceptances of Crisis Response Strategies in the case of CEO in Crisis (CEO 위기책임성과 SNS 상호작용성이 위기 대응 전략 인식에 미치는 영향)

  • Liu, Le;Choi, Youjin
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.3
    • /
    • pp.59-72
    • /
    • 2020
  • Previous crisis management research has mainly focused on business organizations' responsibility for crises, and yet research on CEOs in crisis still lacks. This research examined the influences of crisis responsibility and response strategies on attitudes toward a CEO, attitudes toward a corporate, and purchase intentions in the case of CEOs in crisis. In addition, this study explored how a CEO's SNS interactivity during normal times moderates the influences of crisis responsibility and response strategies. A 2(responsibility: high vs. low)X2(strategy: defensive vs. apology)X2(interactivity: high vs. low) experimental design was conducted with 200 Chinese students in Seoul. According to the analysis results from effects of response strategies by CEO's crisis responsibility levels, regardless of the crisis responsibility levels, the apology strategy was more effective than the defensive strategy in terms of CEO attitudes, corporate attitudes, and purchasing intentions. The analysis results about the moderating role of SNS interactivity during normal times show that under the CEO's high responsibility condition, keeping high SNS interactivity during normal times and using the apology after crisis brought out most favorable responses. Under the CEO's low responsibility condition, regardless of the SNS interactivity levels, the apology strategy brought out more favorable responses than the defensive strategy.

Supercomputer's Security Issues and Defense: Survey (슈퍼컴퓨터 보안 이슈 및 대책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.215-220
    • /
    • 2013
  • The super computer calls usually as the super computer in case the computing power of the computer is 20 G flops (GFLOPS) or greater. In the past, the computer equipped with the vector processor (the instrument processing the order having the logic operation and maximum value or minimum value besides the common computer instruction) processing the scientific calculation with the super high speed was installed as the super computer. Recently, cyber attack focuses on supercomputer because if it is being infected, then it will affect hundreds of client PC. Therefore, our research paper analyzed super computer security issues and biometric countermeasure to develop the level of security on super computer.

Traceback System based on ICMP for Network Intruder Response (네트워크 침입자 대응을 위한 ICMP 기반의 역추적 시스템)

  • Lee, Jik-Su;Lee, Seoung-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.893-897
    • /
    • 2005
  • 최근의 정보보호 환경에서는 자신의 관리 도메인 내로 침입하게 되는 공격을 어떻게 잘 탐지 할 것인가와 탐지된 공격을 어떻게 효율적으로 차단하여 자신의 도메인을 잘 보호할 것인가에 초점이 맞추어 있다. 따라서 탐지된 침입의 공격자에 대한 대응도 자신의 도메인 경계에서 해당 트래픽을 차단하는 수동적인 방법 이외에는 별다른 방법이 없는 상태이고, 이 경우 자신의 도메인에서 파악한 침입자정보를 바탕으로 자신의 도메인 입구에서만 해당 트래픽을 차단함으로써 침입자는 자유로이 인터넷을 이용할 수 있을 뿐만 아니라 다른 공격 기술이나 공격 루트를 이용한 제2, 제3의 공격이 이루어 질수 있다. 반면 인터넷을 이용한 경제 활동 및 그 액수가 점차 증가함에 따라 사이버 공격으로 입게 되는 피해는 점차 기업의 생존을 위협하는 수준에 도달하고 있다. 따라서 해킹에 능동적으로 대응할 수 있는 기술이 요구된다고 할 수 있으며, 능동적인 해킹 방어를 위한 가장 기본적인 기술로 해커의 실제 위치를 추적하는 역추적 기술을 활용할 수 있어야 한다. 그러나 현재까지 제안된 역추적 기술들은 인터넷이 보유한 다양성을 극복하지 못하여 현재의 인터넷 환경에 적용하는데 어려움이 따른다. 이에 본 논문에서는 해킹으로 판단되는 침입에 대하여 라우터의 구조적 변경 없이 효율적으로 역추적 하기 위해서 ICMP 역추적 메시지(ICMP Traceback Message)를 이용한 ICMP 기반의 역추적 시스템을 설계한다.

  • PDF

IP Traceback System Design and Implement based on Agent (에이전트기반의 IP 역추적 시스템 설계 및 구현)

  • Chae, Cheol-Joo;Lee, Seong-Hyeon;Kim, Ji-Hyun;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.823-827
    • /
    • 2005
  • 최근의 정보보호 환경에서는 자신의 관리 도메인 내로 침입하게 되는 공격을 어떻게 잘 탐지 할 것인가와 탐지된 공격을 어떻게 효율적으로 차단하여 자신의 도메인을 잘 보호할 것인가에 초점이 맞추어 있다. 따라서 탐지된 침입의 공격자에 대한 대응도 자신의 도메인 경계에서 해당 트래픽을 차단하는 수동적인 방법 이외에는 별다른 방법이 없는 상태이고, 이 경우 자신의 도메인에서 파악한 침입자 정보를 바탕으로 자신의 도메인 입구에서만 해당 트래픽을 차단함으로써 침입자는 자유로이 인터넷을 이용할 수 있을 뿐만 아니라 다른 공격 기술이나 공격 루트를 이용한 제2, 제3의 공격이 이루어 질수 있다. 반면 인터넷을 이용한 경제 활동 및 그 액수가 점차 증가함에 따라 사이버 공격으로 입게 되는 피해는 점차 기업의 생존을 위협하는 수준에 도달하고 있다. 따라서 해킹에 능동적으로 대응할 수 있는 기술이 요구된다고 할 수 있으며, 능동적인 해킹 방어를 위한 가장 기본적인 기술로 해커의 실제 위치를 추적하는 역추적 기술을 활용할 수 있어야 한다. 그러나 현재까지 제안된 역추적 기술들은 인터넷이 보유한 다양성을 극복하지 못하여 현재의 인터넷 환경에 적용하는데 어려움이 따른다. 이에 본 논문에서는 해킹으로 판단되는 침입에 대하여 효율적으로 역추적 하기 위해서 iTrace 메시지를 이용한 역추적 시스템을 설계하고 구현한다.

  • PDF

Adaptive Anomaly Movement Detection Approach Based On Access Log Analysis (접근 기록 분석 기반 적응형 이상 이동 탐지 방법론)

  • Kim, Nam-eui;Shin, Dong-cheon
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.45-51
    • /
    • 2018
  • As data utilization and importance becomes important, data-related accidents and damages are gradually increasing. Especially, insider threats are the most harmful threats. And these insider threats are difficult to detect by traditional security systems, so rule-based abnormal behavior detection method has been widely used. However, it has a lack of adapting flexibly to changes in new attacks and new environments. Therefore, in this paper, we propose an adaptive anomaly movement detection framework based on a statistical Markov model to detect insider threats in advance. This is designed to minimize false positive rate and false negative rate by adopting environment factors that directly influence the behavior, and learning data based on statistical Markov model. In the experimentation, the framework shows good performance with a high F2-score of 0.92 and suspicious behavior detection, which seen as a normal behavior usually. It is also extendable to detect various types of suspicious activities by applying multiple modeling algorithms based on statistical learning and environment factors.

  • PDF

A Comparative Study on the Price Competitiveness of Korean Beef(Hanwoo) in China : An Analysis Based on Market Research Focusing on Beijing and Shanghai (한-중FTA대비 국내 육우산업 가격경쟁력 비교 : 중국 베이징, 상하이 시장조사를 중심으로)

  • Kwon, Ki Jung;Seo, Hyo Dong;Jang, Sun Sik;Park, Ji Hyun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.5
    • /
    • pp.221-234
    • /
    • 2014
  • Recently, the Chinese beef consumption market has faced a sudden surge. With China's beef imports reaching $1.33 billion in 2013, the global market closely monitors China's rising consumption of beef. Because there have been no exports of Korean beef (Hanwoo) to China previously, the negative effects of opening of beef market between South Korea and China are speculated as the South Korean government advances FTA negotiations further with China. In order to prepare for the opening of beef market between the two nations and to understand Hanwoo's export competitiveness, our research team conducted a market research on beef price and quality in Beijing and Shanghai. Based on our research, we deduced the price of Hanwoo and analyzed the price competitiveness of Hanwoo in the emerging Chinese beef market. Based on the market research, the price competitiveness of Hanwoo's topside/inside, rib and loin are well-positioned compared to Chinese and imported high-end beef group in Beijing and Shanghai market. Specifically, the price competitiveness of Hanwoo's topside/inside and loin are dominant in Beijing while that of rib and loin are dominant in Shanghai.

  • PDF

Biomaterials Inhibiting Biofilm Formation of Staphylococcus aureus (생물소재를 이용한 황색포도상구균의 바이오필름 억제 연구)

  • Shin, Kye-Ho;Yun, Yu-Na;Jeon, Gi-Boong;Lee, Tae-Ryong;Yi, Sung-Won;Cho, Jun-Cheol;Park, Ji-Yong
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.37 no.4
    • /
    • pp.347-350
    • /
    • 2011
  • Biofilms are surface-attached microbial communities with phenotypic and biochemical properties distinct from free-living planktonic cells. Biofilm bacteria show much greater resistance than planktonic counterparts and much higher concentration of biocide is needed to treat biofilms compared to the dosage used for planktonic bacteria. As a result, alternative strategies or more effective agents exhibiting activity against biofilm-producing micro-organisms are of great interest. Therefore, we turned our attention to control of biofilm of S. aureus. The aims of this research are to investigate substances which inhibit the formation of biofilm by S. aureus and to suggest effective materials for controlling skin problems. We coated slide glasses with human placental collagen and the coverslip was incubated with test materials and bacteria. The coverslip was stained with crystal violet and we measured optical density of each sample. The biofilm inhibitory activity was calculated by crystal violet staining degrees. In this study, S. aureus ATCC 6538 was used as test organism. Our results show that both water soluble and insoluble Hinoki cypress polysaccharide strongly inhibited biofilm formation. Whereas, green tea and sunset hibiscus root extract promoted biofilm. Xylitol showed a concentration dependent effect; high concentration (3 % and 5 %) of xylitol reduced biofilm while promoted biofilm formation at a concentration of 1 %. These results support that Hinoki cypress polysaccharide and xylitol have ability to suppress biofilm formation.