• Title/Summary/Keyword: 보안성강화

Search Result 840, Processing Time 0.023 seconds

Design and Implementation of a Smart Attendance Integrated Management System (스마트 출결 통합 관리 시스템 설계 및 구현)

  • Kang, Se-Hyeon;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.136-144
    • /
    • 2022
  • Due to the lack of attendance management system, the training conducted by each existing institution was handwritten at the site and managed in writing about the attendance of participants. It not only takes a lot of manpower and time to store and search, but also has a lot of difficulty in storing. In this paper, we design and implement an integrated smart attendance management system using barcodes. Through this, the attendance system of training applicants is developed, security related to attendance is strengthened, and training attendance data is computerized and collected. In addition, standards for necessary data are selected so that each institution can efficiently manage and utilize training information data. The proposed system can add various institutions in a single construction, making it easy to expand institutional management and can expect additional cost reduction effects. In addition, it is expected that the quality of education will be improved by increasing the convenience of training managers who use the management system provided and controlling/managing attendance data of users.

Directions for Policy to the Fourth Industrial Revolution based on Hyper-Connected Society and Smart Technology (초연결사회와 스마트기술에 따른 4차산업혁명의 정책방향)

  • Eun-Yeol Oh;Jun-Ok Shin
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.45-54
    • /
    • 2023
  • This study aims to examine trends so far and proactively seek future policy directions because the degree of implementation of hyper-connected society and smart technology at home and abroad cannot be overlooked at present in Korea. The method of the study focused on differentiating it from this study through literature research and comparison of major previous studies. As a result of the study, data security and maintenance, enhanced privacy of users and users, and related policy directions for entering a super-aged society were identified in the era of the 4th industrial revolution in Korea according to hyper-connected society and smart technology. Research limitations were difficulties in obtaining data and technical limitations in statistical quantification through trend analysis, although research analysis should be approached through quantitative and quantitative methods. It needs to be supplemented in future studies.

Blockchain and AI-based big data processing techniques for sustainable agricultural environments (지속가능한 농업 환경을 위한 블록체인과 AI 기반 빅 데이터 처리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.3 no.2
    • /
    • pp.17-22
    • /
    • 2024
  • Recently, as the ICT field has been used in various environments, it has become possible to analyze pests by crops, use robots when harvesting crops, and predict by big data by utilizing ICT technologies in a sustainable agricultural environment. However, in a sustainable agricultural environment, efforts to solve resource depletion, agricultural population decline, poverty increase, and environmental destruction are constantly being demanded. This paper proposes an artificial intelligence-based big data processing analysis method to reduce the production cost and increase the efficiency of crops based on a sustainable agricultural environment. The proposed technique strengthens the security and reliability of data by processing big data of crops combined with AI, and enables better decision-making and business value extraction. It can lead to innovative changes in various industries and fields and promote the development of data-oriented business models. During the experiment, the proposed technique gave an accurate answer to only a small amount of data, and at a farm site where it is difficult to tag the correct answer one by one, the performance similar to that of learning with a large amount of correct answer data (with an error rate within 0.05) was found.

Location Privacy Enhanced Routing for Sensor Networks in the Presence of Dormant Sources (휴면 소오스들이 존재하는 환경의 센서 네트워크를 위한 위치 보호 강화 라우팅)

  • Yang, Gi-Won;Lim, Hwa-Jung;Tscha, Yeong-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.12-23
    • /
    • 2009
  • Sensor networks deployed in battlefields to support military operations or deployed in natural habitats to monitor the rare wildlifes must take account of protection of the location of valuable assets(i.e., soldiers or wildlifes) from an adversary or malicious tracing as well as the security of messages in transit. In this paper we propose a routing protocol GSLP(GPSR-based Source-Location Privacy) that is capable of enhancing the location privacy of an active source node(i.e., message-originating node) in the presence of multiple dormant sources(i.e., nodes lying nearby an asset whose location needs to be secured). Extended is a simple, yet scalable, routing scheme GPSR(greedy perimeter stateless routing) to select randomly a next-hop node with a certain probability for randomizing paths and to perform perimeter routing for detouring dormant sources so that the privacy strength of the active source, defined as safety period, keeps enhanced. The simulation results obtained by increasing the number of dormant sources up to 1.0% of the total number of nodes show that GSLP yields increased and nearly invariant safety periods, while those of PR-SP(Phantom Routing, Single Path), a notable existing protocol for source-location privacy, rapidly drop off as the number of dormant sources increases. It turns out that delivery latencies of GSLP are roughly less than two-fold of the shortest path length between the active source and the destination.

The Details and Outlook of Three Data Acts Amendment in South Korea: With a Focus on the Changes of Domestic Financial and Data Industry (데이터 3법 개정안의 내용과 전망: 국내 금융 및 데이터 산업계의 변화를 중심으로)

  • Kim, Eun-Chan;Kim, Eun-Young;Lee, Hyo-Chan;Yoo, Byung-Joon
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.49-72
    • /
    • 2021
  • This study analyzes the major content, significances, and future outlook of Three Data Acts amendment enacted in August 2020 in South Korea, with the focus on their impact on the financial and data industries. It seems that the revision of the Credit Information Act will enable the specification of a business which had previously only been regulated as the business of credit inquiry, and also enable the domestic data industry to activate the MyData industry, data trading and platforms, and specify data pseudonymization and trading procedures. For the rational and efficient implementation of the amendments to the Three Data Acts, the Personal Information Protection Committee must be as transparent and lawful in its activities as possible, and fairness must be guaranteed. Even in the utilization of personal information, the development or complementation of the related data processing technologies is essential, and clear data processing methods and areas must be regulated. Furthermore, the amendments must be supported with guarantees and the systematization of a fair competitive system in the data market, stricter regulations on penalties for illegal acts related to data, establishment and strengthening of the related security systems, and reinforcement of the system of cooperation for data transfer.

A Study on National Cyber Capability Assessment Methodology (국가 사이버 역량 평가 방법론 연구)

  • Kang, JungMin;Hwang, HyunUk;Lee, JongMoon;Yun, YoungTae;Bae, ByungChul;Jung, SoonYoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1039-1055
    • /
    • 2012
  • It is required for us to enhance the national cyber capability as the worldwide countries have been doing effort to strengthen their cyber capabilities. However, we are encountering the difficulty in estimating national cyber capability due to the absence of any cyber capability assessment methodology. This paper presents the national cyber capability assessment methodology which is used for settle up national cyber policy. We also introduce the result of five major nations(US, China, Japan, Russia, Korea)' cyber capability assessment using the proposed methodology. The methodology is developed using open data and includes three areas; base capability, attack capability and defense capability. The assessment result shows the in the order of US, China, Korea, Russia, Japan. As the analysis of that result, in order to enhance the our cyber capability, we recommend that first, cyber budget and human resources for the base capability should be more invested, second, the strategy for attack capability enhancement is strongly required and lastly, the patch ratio and security monitoring level should be upgraded.

The Memorial Park Planning of 5·18 Historic Sites - For Gwangju Hospital of Korea Army and 505 Security Forces - (5·18 사적지 기념공원화 계획 - 국군광주병원과 505보안부대 옛터를 대상으로 -)

  • Lee, Jeong-Hee;Yun, Young-Jo
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.5
    • /
    • pp.14-27
    • /
    • 2019
  • This study presents a plan for a memorial park that respects the characteristics based on the historical facts for the concept of space of the Gwangju Hospital of Korea Army and the location of the 505 Security Forces, which were designated as historic sites after the 5-18 Democratization Movement. The Gwangju Metropolitan City as it is the location of the 5-18 historic sites, is taking part in the 5-18 Memorial Project, and plans to establish a city park recognizing the historic site of the 5-18 Democratization Movement, which has been preserved only as a memory space to this point. The park is promoting a phased development plan. This study suggests that the 5-18 historic sites can be modernized and that social consensus can establish the framework of the step-by-step planning and composition process to ensure the plans for the space heals wounds while preserving the history. In this paper, we propose a solution to a problem. We solve the approach for space utilization through an analysis of precedent research and planning cases related to park planning at historical sites. In addition to exploring the value of the site, we also describe the space utilization strategy that covers the historical characteristics and facts while maintaining the concept of park planning. As a result of the research, the historic site of the Gwangju Hospital of Korea Army is planned as a park of historical memory and healing in order to solve the problems left behind by the 5-18 Democratization Movement. The historic site of the 505 Security Forces was selected as an area for historical experiences and a place for learning that can be sympathized with by future generations of children and adolescents in terms of expanding and sustaining the memory of the 5-18 Democratization Movement. In the planning stage, the historical sites suggested the direction of space utilization for representation as did the social consensus of citizens, related groups, and specialists. Through this study, we will contribute to construction of a memorial park containing historical values in from 5-18 historic sites. It is meaningful to suggest a direction that can revitalize the life of the city as well as its citizen and can share with the history with future generations beyond being a place to heal wounds and keep alive the memory of the past.

Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service (소셜 네트워크 서비스를 위한 선별적 암호화 기능을 제공하는 관계 기반 동적 접근제어 모델)

  • Kwon, Keun;Jung, Youngman;Jung, Jaewook;Choi, Younsung;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.59-74
    • /
    • 2014
  • The social network service is a online service letting users express the personality and enhancing the human network. However, these features result in side effects which diffuse personal information and make users access to treacherous information. Therefore, various access control models have been proposed. However, the access control mechanisms which encrypt data are only able to be applied for controlling access from direct node, and the access control mechanisms without data encryption allow service provider to access all the information. Moreover, both mechanisms do not consider dynamic changes in reliability of the users. In this paper, we propose relationship-based dynamic access control model including encryption of sensitive data, which consider the characteristics of SNS and improves the security of SNS.

Study on the Current Status of Data Science Curriculum in Library and Information Science and its Direction (문헌정보학과의 데이터 사이언스 커리큘럼 개발 실태와 방향성 고찰)

  • Kang, Ji Hei
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.343-363
    • /
    • 2016
  • This study determines 69 iSchools provided which data science curriculum, and presents the direction for Korean LIS schools. It is certain that iSchools extend their subject territory including areas related to health, technology and biotechnology. However, this phenomenon is not actively observed in Korea. iSchools also focus on the area about how to process and manage data. iSchools, in deed, offer courses regarding data science, data management and data security. The 'database' was a higher proportion of 'data warehouse' curriculum, and, 'data statistic and analysis' curriculum are forming similar portion. As a result of analysis of the iSchool's curriculum and comparison with Korean curriculum, this study suggests: the expansion of LIS curriculum related to data science; the enhanced role of the data translational data science; development of curriculum to raise the mathematical analysis capabilities, development of specialized curriculum and experimental classes; and support new knowledge skills to interact with technology.

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.235-244
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated. the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread. and design a logic engine module. Three engines judge attack grades (Attack Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF