• Title/Summary/Keyword: 보안성 검토

Search Result 235, Processing Time 0.068 seconds

Studies on Improving the Quality of Sardine Sausage -2. Processing Conditions of Frozen Sardine Meat Paste and Quality Stability during Frozen Storage- (정어리소시지의 품질 개선에 관한 연구 -2. 소시지원료로서의 정어리냉동고기풀의 가공 및 품질 안정성)

  • Cho, Soon-Yeong;Lee, Eung-Ho;Ha, Jae-Ho
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.13 no.2
    • /
    • pp.143-148
    • /
    • 1984
  • Frozen sardine meat paste for fish sausage was prepared to obtain the basic data on improving the quality of sardine sausage, and its gel formation ability was compared with meat paste from raw sardine. In addition, its quality stability was studied during frozen storage. For the preparation of frozen sardine meat paste, the addition of 4% of sorbitol and 0.3f of polyphosphate to the fish meat appeared effective to keep the processing suitability and storage stability. Also, the gel formation ability of the frozen sardine meat paste was not inferior to that of raw sardine paste.

  • PDF

Geospatial Data Catalogue Service ; Status and Issues

  • Chang, Eun-Mi
    • Spatial Information Research
    • /
    • v.17 no.4
    • /
    • pp.463-468
    • /
    • 2009
  • Geospatial interoperability has been pursued by propagating international standards and OGC standards. The NGIC, GeoConnection and other catalogue services are reviewed with aspect to metadata and search functions. Detailed metadata could be driven to users after finding what they want to have. Criteria for search were not fully overlapped with metadata, as simple and typical searches are prevailing. OGC catalogue service standards were made but catalogue services in Korea have been implemented in their own ways, not fully compliance-tested. Different domain technologies have been developed regardless of geospatial service, the relationship and integration methods between catalogue services and other core technologies are reviewed in the form of a pair table. Other issues in geospatial service were discussed in the level of raising issues.

  • PDF

A Middleware Architecture for HTML5-Based PDF Viewer (HTML5기반의 PDF Viewer 제공을 위한 Middleware 구조 제안)

  • Jeong, Kyu-Byeong;Lee, Gi-Beum;Park, Peom;Hwang, Seong-Jin;Oh, Sangyoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.256-259
    • /
    • 2012
  • Paperless 회의 및 행정에 대한 요구가 제기되면서 ISO 14001과 같은 표준들의 제안과 함께 이 요구에 대한 많은 연구와 구현이 제안되고 있다. 최근에는 다양한 플랫폼의 스마트 기기들의 보급이 확산됨에 따라 이 기기들의 플랫폼에 맞는 전자문서서식시스템의 요구도 높아지고 있다. 본 논문에서는 제시된 여러 연구들의 효율성 검토 결과를 기반으로 사용자 중심의 전자문서 공유 및 관리 기능을 제공하는 미들웨어의 구조를 제안한다. 제안하는 미들웨어는 Content Adaptation, 즉 File Format 및 Size Converting, 스마트기기내에서의 전자서식문서 보안 처리기능, 데이터 관리기능을 포함하는 PDF Viewer를 제공하며 최근 표준화 적용이 진행 중인 HTML5를 기반으로 하여 호환성과 적용성을 높였다. 제안된 구조와 구현방식에 대한 검증을 위해 구현 사례를 본 논문에서 제시하였다.

A Study on Improvement Way of Game Rating System (게임물 등급분류제도의 개선방안에 관한 연구)

  • Kim, Sung-Won;Jung, Hae-Sang;Lee, Hwansoo
    • Journal of Korea Game Society
    • /
    • v.19 no.5
    • /
    • pp.15-38
    • /
    • 2019
  • The game rating system of Korea has many issues in terms of 'censorship' and 'ambiguity', and has been pointed out as a factor that hinders industrial development. Although the Ministry of Culture, Sports and Tourism and other related organizations have made various efforts, it still seems to require more academic discussion. Therefore, in this study, the limitations of game rating system are reviewed, and the systems of foreign countries are analyzed to suggest the improvement direction.

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

Increasing Transnational Threats and Terrorism and Establishment of Integrated Border Security Systems: Focused on U.S., Canada and Australia (초국가적 위협 및 테러리즘 증가와 통합국경안보체계 구축: 미국, 캐나다, 호주를 중심으로)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.69-78
    • /
    • 2017
  • Since the September 11, 2001, transnational crimes and terrorism have increased, the importance of border security has been emphasized and integrated CIQ capability has been required. The U.S., Canada, and Australia are consolidating CIQ to strengthen border security, focusing on strengthening travelers and goods immigration control and airports, ports and land border security. In 2003, the U.S. established the Customs and Border Protection(CBP) under the Department of Homeland Security. Canada also established the Canada Border Services Agency(CBSA) under the Public Safety Canada in 2003. The Australian Customs and Border Protection Service was integrated with the Department of Immigration and Border Protection(DIBP) and the Australian Border Force was established in 2015. However, Korea operates a distributed border management system for each CIQ task which is unable to respond to complex border threats such as illegal immigration, entry of terrorists, smuggling of drugs, and gun trade in the airports, ports and land borders. In order to solve this problem, it is possible to consider integrating sequentially the customs and quarantine services which have high similarities, and to integrate the entire CIQ tasks with the Korea Customs Service delegated to the immigration control duties in the mid to long term. There is also a plan to benchmark the CIQ single accountability agencies in the U.S., Canada, and Australia in accordance with the Korean situation and to establish a new integrated border security organization.

The Nature of Reform in the U.S., UK, Germany National Intelligence Systems and Implications for Reform of the Korean National Intelligence Service (미국·영국·독일 국가정보체계 개혁 양상과 한국 국가정보원 개혁에 대한 시사점)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.167-177
    • /
    • 2018
  • Major countries, such as the U.S., UK and Germany have reformed their national intelligence systems in the face of transnational, asymmetric and comprehensive threats since September 11, 2001 and have strengthened the intelligence capacity involved in countering terrorism and WMD proliferation, right/left extremism threats. The Korean Moon Jae-in government is preparing a reform plan to eliminate illegal political intervention and abuse of power by the National Intelligence Service(NIS) and to rebuild it as an efficient national intelligence agency for national security. In discussing the reform direction of the NIS, it is necessary to discuss in detail whether adopting a separate model of intelligence agencies to restrict domestic intelligence activities of the NIS and concentrate on foreign intelligence activities or establish new domestic intelligence agencies. Second, as for the issue of transferring anti-Communism investigation authority of the NIS to the police, it needs to be carefully considered in terms of balancing the efficiency and professionalism of intelligence agency activity in the context of North Korea's continuous military provocation, covert operations and cyber threats. Third, it should strive to strengthen the control and supervision functions of the administration and the National Assembly to ensure the political neutrality of the NIS in accordance with the democratization era, to guarantee citizens' basic rights and to improve the transparency of budget execution.

  • PDF

Vulnerabilities Analysis of the OTP Implemented on a PC (PC에 탑재된 OTP의 취약점 분석)

  • Hong, Woo-Chan;Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.361-370
    • /
    • 2010
  • OTP(One Time Password) is a user authentication using secure mechanism to authenticate each other in a way to generate a password, an attacker could intercept the password to masquerade as legitimate users is a way to prevent attacks. The OTP can be implemented as H/W or S/W. Token and card type OTP, implemented as H/W, is difficult to popularize because of having problem with deployment and usability. As a way to replace it implemented as S/W on Mobile or PC is introduced. However, S/W products can be target of malicious attacks if S/W products have vulnerability of implementation. In fact, FSA said the OTP implemented on a mobile have vulnerability of implementation. However, the OTP implemented on a PC have no case about analysis of vulnerability. So, in this paper derive security review and vulnerabilities analysis of implemented on a PC.

An Analysis of the US 3rd Offset Strategy (미국의 제3차 국방과학기술 상쇄전략에 대한 분석)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.27-35
    • /
    • 2016
  • This thesis analyzes the backgrounds of the third offset strategy of the US Department of Defense. The key technology areas to be developed and the implications of the 3rd strategy are also examined. The potential great powers, China and Russia have catched up with US in the certain areas of military technologies. The technological superiority of US military is found to have been eroded. The US DOD needs a new defense policy called the 3rd offset strategy to meet this new challenge. The 5 basic technology areas were identified; learning machines, human-machine collaboration, machine-assisted human operations, human-machine combat teaming, and autonomous weapons. The 3rd offset strategy should be managed not to move to the new arms race with rivalries. The defense acquisition system also needs to be improved for the smooth flow of the advanced commercial technologies to the defense sector. Korea needs to figure out the possible technologies of co-research and development with US.

Information and Communications Technology in the Field of Public Security: Crime Prevention and Response System (치안분야의 정보통신기술 활용방안 연구 - 빅데이터기반 치안수요분석과 대응체계를 중심으로 -)

  • Kim, Yeon Soo
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.23-32
    • /
    • 2016
  • Rapid advances in information and communications technology are new challenges and also opportunities for the police. For the purpose of identifying its implications, this study reviews utilization cases of information and communications technology in the field of public security in South Korea and other countries. As theoretical basis for utilization of information and communications technology, this study introduces intelligence-led policing, predictive policing and evidence-based policing. Also, utilization of big-data based crime analysis and crime prediction technology, as well as advancement of information and communications system and command and control technology of the police, are discussed. Based on the identified implications in this study, the following proposals are made. They are (1) procuring basic data, (2) creating an integrated database, (3) increasing utilization of policy decision-makers, (4) exchange and cooperation between related institutions, (5) training professional analyzers, (6) establishing legal basis and practical guidelines for an integrated database.