• Title/Summary/Keyword: 보안성 검토

Search Result 233, Processing Time 0.024 seconds

Suggestion on the Convention for Anti-Terrorism of North Eastern Asian Countries: Focusing on Tendency Analysis of Regional International Conventions (동북아시아 국가들의 대(對)테러리즘 관련 협약체결을 위한 제언: 지역별 국제협약의 경향분석을 중심으로)

  • Lee, Dae Sung;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.19-26
    • /
    • 2015
  • The threat of international terrorism has been increasing in international society. It could be no exception in northeastern Asian countries. First, north eastern Asian countries have exercised influences on many areas in international society such as politics, military and diplomacy. So international terrorism could occur in the countries. Second, as the north eastern Asian countries such as Korea, China, Russia and Japan have their own unique politics, religions, ethnic group and culture, terrorism have happened or could happen in their own countries. In this research, it will analyze the tendency of seven regional international conventions on anti-terrorism of international society. The result is as follows. It dealt with the following issues. 1. Reason and purpose of terrorism, 2. Contents of conventions on anti-terrorism, 3. Psychological and physical aspects of attacking types of terrorism, 4. Personal and physical aspects of damage of terrorism, 5. Hard targets and soft targets of victims of terrorism. It could be necessary for the north eastern Asian countries to review regional international convention on anti-terrorism based on this.

A Case Study of GTX A Tunnel Station Blasting with Electronic Detonator (GTX A 터널정거장에 대한 전자뇌관 적용 시공 사례)

  • Hwang, Nam-Sun;Kim, Kyung-Hyun;Kim, Jeoung-Hwan;Seong, Yoo-Hyeon;Lee, Chang-Won
    • Explosives and Blasting
    • /
    • v.39 no.3
    • /
    • pp.24-34
    • /
    • 2021
  • Electronic detonators are widely used in various construction sites due to accurate delay time. Including the cases with exceeded noise and vibration from site using electric/non-electric detonator, electronic detonators are used to improve blast fragmentation or to reduce the cost of secondary partial blasting. Furthermore, the number of cases using electronic detonators are increased for reduction of the cost and construction period by maximizing operations efficiency. This case study is about applying electronic detonators on large section station, tunnel construction site which is the part of urban area GTX A project. Although it was initially planned to utilize non-electric detonators, damage was inflicted on safety-thing. We have considered blasting method using electronic detonators as solution of this problem. By applying electronic detonators, we not only satisfied environmental regulations but also prevented nearby safety-thing from getting damaged. In addition, we were able to shorten the construction period than the initial plan by conducting single simultaneous blasting on large section station, in order to ensure safe and efficient construction.

Query-Efficient Black-Box Adversarial Attack Methods on Face Recognition Model (얼굴 인식 모델에 대한 질의 효율적인 블랙박스 적대적 공격 방법)

  • Seo, Seong-gwan;Son, Baehoon;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1081-1090
    • /
    • 2022
  • The face recognition model is used for identity recognition of smartphones, providing convenience to many users. As a result, the security review of the DNN model is becoming important, with adversarial attacks present as a well-known vulnerability of the DNN model. Adversarial attacks have evolved to decision-based attack techniques that use only the recognition results of deep learning models to perform attacks. However, existing decision-based attack technique[14] have a problem that requires a large number of queries when generating adversarial examples. In particular, it takes a large number of queries to approximate the gradient. Therefore, in this paper, we propose a method of generating adversarial examples using orthogonal space sampling and dimensionality reduction sampling to avoid wasting queries that are consumed to approximate the gradient of existing decision-based attack technique[14]. Experiments show that our method can reduce the perturbation size of adversarial examples by about 2.4 compared to existing attack technique[14] and increase the attack success rate by 14% compared to existing attack technique[14]. Experimental results demonstrate that the adversarial example generation method proposed in this paper has superior attack performance.

The Determinants of Customer Satisfaction In Electronic Commerce. (전자상거래시 고객만족 결정요인에 관한 연구)

  • Cho, Hyun-Chul;Shim, Gyu-Yul
    • Journal of Global Scholars of Marketing Science
    • /
    • v.7
    • /
    • pp.261-281
    • /
    • 2001
  • As a new environment, the Internet proposes to us the innovative change of our life. With difficulty, we can go after the Internet's potentiality and the growth speed of technology. In the new stream of innovation technology, we can probably feel the fear of tremendous changes, the reverse, also hope to get the opportunity that come out of Internet world. EC(Electronic Commerce) that out of the evolution of Internet technology gets a coporation changes to survive in 21st century. So the corporation must set the strategy to fit a Internet focused society. As one of them, a virtual store is opened on the Internet. Recently, there has been much attention to the Internet shopping mall as a new distribution channel and marketing tool. This study analyzed that the system environment, perceived product risk, easy of order, perceived security risk would have impact on the customer satisfaction in Electronic Commerce. The Purpose of this study is to develope the concept of the determinants of customer satisfaction and to test a theoretical framework that attempts to explain how the perception of satisfaction in Electronic Commerce. The proposed hypotheses were tested internet shopping mall users and the study results show all hypotheses are supported.

  • PDF

Safety Risk Management Policy of United States small unmanned aerial system (미 소형 무인비행체계의 안전성 위험관리 정책)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.35-42
    • /
    • 2021
  • The purpose of this paper is to review the small unmanned aerial system (sUAS) safety policy promoted by the United States(US) government. Therefore, in this paper, along with sUAS risk factors, the risk factors of sUAS that the US government is interested in are described. In addition, the risk factors were classified into physical and non-physical factors, and provisions mentioned in the Federal Aviation Administration(FAA) Relicensing Act were reviewed. Other risk scenarios were analyzed focusing on target scenario items that the FAA is interested in, such as flight operation disruption, infrastructure damage, and facility trespassing. Of course, we looked at the risk management principles promoted by the US FAA. In this paper, as a research method, the direction and contents of the FAA's sUAS policy were studied and reviewed from the analysis of major foreign journals and policy. In the research result of this paper, by analyzing the FAA sUAS safety risk management policy, the integrated operation and safety policy, physical risk management policy, operation and safety regulation, and sUAS policy and technology direction necessary for establishing the sUAS safety risk management guide in Korea are presented. The contribution of this study is to identify the leading US sUAS safety policy direction, and it can be used as basic data for deriving future domestic policy directions from this. Based on the research results presented in the future, policy studies are needed to derive detailed implementation plans.

A Study on the Concept of Operations and Improvement of the Design Methodology for the Physical Protection System of the National Infrastructure - Focused on Nuclear Power Plants - (국가기반시설 물리적 방호체계 운영개념 및 설계방법 개선방안 연구: 원자력발전소를 중심으로)

  • Na, Seog-Jong;Sung, Ha-Yan;Choi, Sun-Hee
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.9-38
    • /
    • 2019
  • As the scales & density of the Korean national infrastructures have been increased, they will be identified as rich and attractive potential targets for intensified North Korea's attack in the rear region and terrorism attack. In addition, due to changes in security environment such as drone threats and lack of security forces under the 52-hour workweek law, I think that it is the proper time point to reevaluate the effectiveness and appropriateness of the current physical protection system and its shift to a new system. In this study, the direction and improvement of the perimeter physical protection systems of the national infrastructures are to be studied from the viewpoints of its concepts of operations and design methodology, focusing on the nuclear power plant. The reason why we focus on nuclear power plants is because they cause wide-range and long-term damages caused by radioactive materials disperal and pollution, along with short-term damage caused by the interruption of electricity generation in the event of damage to nuclear power plants. With the aim of extracting improvement directions, as we will comprehensively review domestic research trends and domestic·overseas related laws, and consider Korea's specificity, we try to reframe the concept of operation - systematization, mobilization and flexibility -, and establish criteria on system change. In order to improve the technical performance of the new perimeter physical protection system, we study on high-fidelity·multi-methodology based integrated design methodology, breaking from individual silo-type design methods, and I suggest improvement of government procurement, its expansion to export business and other national infrastructure.

A Multi-Agent Scheme Considering User's Mobility RFID based on Knowledge Management System (사용자의 이동성을 고려한 멀티 에이전트 방식의 RFID 기반 지식 관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.99-108
    • /
    • 2010
  • The Wireless Ad Hoc network is discussed as a core technology for ubiquitous computing, and the smart tag technology is currently being actively discussed as a part of the sensor network. Thus, considering its security may advance the realization of ubiquitous computing. RFID (Radio Frequency Identification) technology using the smart tag technology as a part of the sensor network is currently in the limelight. In particular, when RFID is applied to a knowledge management system managing various data, data mobility and management convenience are ensured and automated knowledge service can be provided to users. Accordingly, this paper to proposed a secure scheme for mobility knowledge management systems using multi-agents differentiated from the existing knowledge management systems. Specifically, the proposed scheme designates user's authentication and privilege information in multi-agents and provides effective knowledge service through grouping based on user information. Moreover, even user's movement, the proposed scheme ensures service availability and provides continuous information through communication with multi-agent systems.

The Role of Bank Payment Obligation under SWIFTNet's Trade Service Utility (SWIFTNet TSU BPO의 역할)

  • Lee, Bong-Soo
    • International Commerce and Information Review
    • /
    • v.17 no.2
    • /
    • pp.3-18
    • /
    • 2015
  • This thesis examines the performance and improvement strategy of SWIFTNet TSU's BPO for computerization and suggests the following results: First, the URBPO should be legally complemented, and the SWIFT and banks need to keep improving the systems to meet trade parties' diverse needs. Second, the SWIFTNet TSU's BPO should have an institutionally unified sharing platform with security, stability and convenience. In other words, it is needed to develop services which meet e-payment paradigm and international and regional environments through continued analysis on market changes and flow. Third, in order for the SWIFTNet TSU BPO to evolve into a perfect global system, there should be an innovative payment solution which can meet all trade parties all over the world. For this, technology standardization for a worldwide e-trade payment system is essential. Lastly, based on the results derived from this study, an analysis framework with which more diverse and practical environmental variables can be analyzed should be developed.

  • PDF

Analysis of Steganography and Countermeasures for Criminal Laws in National Security Offenses (안보사건에서 스테가노그라피 분석 및 형사법적 대응방안)

  • Oh, SoJung;Joo, JiYeon;Park, HyeonMin;Park, JungHwan;Shin, SangHyun;Jang, EungHyuk;Kim, GiBum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.723-736
    • /
    • 2022
  • Steganography is being used as a means of secret communication for crimes that threaten national security such as terrorism and espionage. With the development of computers, steganography technologies develop and criminals produce and use their own programs. However, the research for steganography is not active because detailed information on national security cases is not disclosed. The development of investigation technologies and the responses of criminal law are insufficient. Therefore, in this paper, the detection and decoding process was examined for steganography investigation, and the method was analyzed for 'the spy case of Pastor Kim', who was convicted by the Supreme Court. Multiple security devices were prepared using symmetric steganography using the pre-promised stego key. Furthermore, the three criminal legal issues: (1) the relevance issue, (2) the right to participate, and (3) the public trial issue a countermeasure were considered in national security cases. Through this paper, we hope that the investigative agency will develop analysis techniques for steganography.

Security and Law for Medical Information (의료정보보호를 위한 법률과 방안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.677-680
    • /
    • 2013
  • The risk of leakage of personal information is growing with new services such as social networking and cloud services by the rapid development of information. In particular, the field of medical IT technology is required to solve problems arising from the aging society and sustainable economic development, and in accordance with the requirements to improve the quality of life, a new market for medical devices and healthcare services can be expected. However, most of the medical information system was computerized with the introduction of IT technology, and when they exchange and transfer of medical information between institutions, medical information leakage occurs and security risk is growing. In this paper we review and analyse the security of personal health information related to the major legal systems and technical and administrative protection.

  • PDF