• Title/Summary/Keyword: 보안신뢰

Search Result 1,305, Processing Time 0.029 seconds

Development of Measurement Scale for School Police's Job Performance (학교보안관의 직무수행 척도 개발)

  • Kim, Kyong-Sik;Kim, Eun-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.394-405
    • /
    • 2012
  • This study is aimed at developing a tool to measuring school police's job performance, and verifying its credibility and validity. This study collected the sample to 250 subjects using a significance collection method to parents of elementary schools school police work. But excluding dishonestly responding data, this used total 210 people for the final analysis. This study executed experts' meeting, exploratory and confirmatory factor analysis, and item analysis to verify reliability, and verification of internal consistency and reliability. This study extracted and confirmed 7 factors for specialization, attitude, program, prevention activity of school violence, effect, basic duty, teaching for school time and home time, and correlation with related people. Through the above research approach and procedure, this study arrived at the following conclusion. First, validity to school police's job performance and measurement tool to job performance is very high. That is, school police's job performance was explored and confirmed through correlation with specialization, attitude, program, prevention activity of school violence, effect, basic job, teaching for school time and home time, and related people, and of them, explanation of attitude is the highest. Second, reliability to the measurement scale for school police's job performance is very high. That is, school police's job performance has high correlation between items, sub-factors, and total scores, and reliability of internal consistency, Cronbach's ${\alpha}$ value, is over .708. Putting them together, measurement scale for school police's job performance is a questionnaire sheet with very high level of validity and reliability.

Reliability Improvement of the Electronic Security Fence Using Friction Electricity Sensor by Analyzing Frequency Characteristic of Environmental Noise Signal (환경잡음신호의 주파수특성 분석에 의한 전자보안펜스의 신뢰성 향상)

  • Yun, Seok Jin;Won, Seo Yeon;Kim, Hie Sik;Lee, Young Chul;Jang, Woo Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.173-180
    • /
    • 2015
  • A passive type of fence security system was developed, which was based on electric charge detection technique. The implemented fence security system was installed at outskirts of greenhouse laboratory in the University of Seoul. The purpose of this research is to minimize false alarms by analyzing environmental noise. The existing system determines the intrusion alarm by analyzing the power of amplified signal, but the alarm was seriously affected by natural strong wind and heavy rainfall. The SAU(Signal Analysis Unit) sends input signals to remote server which displays intrusion alarm and stores all the information in database. The environmental noise such as temperature, humidity and wind speed was separately gathered to analyze a correlation with input signal. The input signal was analyzed for frequency characteristic using FFT(Fast Fourier Transform) and the algorithm that differentiate between intrusion alarm and environmental noise signal is improved. The proposed algorithm is applied for the site for one month as the same as the existing algorithm and the false alarm data was gathered and analyzed. The false alarm number was decreased by 98% after new algorithm was applied to the fence. The proposed algorithm improved the reliability at the field regarding environmental noise signal.

A Specification-based Intrusion Detection Mechanism for LEACH Protocol (LEACH 프로토콜에 적합한 명세기반 침입탐지 기법)

  • Lee, Yun-Ho;Kang, Jung-Ho;Lee, Soo-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2B
    • /
    • pp.138-147
    • /
    • 2012
  • With the improvement of wireless communication and embedded technology, WSN is used at various fields. Meanwhile, because WSN is resource constrained, it is more vulnerable than other networks. To solve the security problem of WSN, we can use the traditional secure mechanism like as cryptography and authentication. But the traditional secure mechanism is not enough for all security issues that may be happened in WSN, especially attacks caused by the compromised node. So, we need the IDS as the second secure mechanism for WSN. In this paper, we propose the Specification-based Intrusion Detection Mechanism that makes LEACH, which is one of the clustering routing protocol for WSN, more reliable and safety.

An Investigation on Survivable Security Schemes of Home Service Gateway (홈서비스 게이트웨이 보안 체계에 관한 연구)

  • Kim, Hyun Cheol;Kim, Si Hung;An, Seongjin;Jung, Jin Wook;Ryu, Yoon Sik;Jun, Young Il
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.25-33
    • /
    • 2003
  • With the radical improvement of wire and wireless communication technologies, home network which interconnects various home appliances is approaching ripening stage. Digitalization of the home environment will break down the boundaries of information, communications and broadcasting, and enable us to realize many breakthroughs on the home front and connect to our home. In order to enable users to access securely to their home network, we first construct secure home network model which can authorize users using their permission policy. In this paper, we examine various security technique used in home network and propose home network security scheme which can service constantly.

  • PDF

A Study on the Effect of Processor Stack Frame Mechanism on Secure Programming in C Language (C 언어에서 프로세서의 스택관리 형태가 프로그램 보안에 미치는 영향)

  • 이형봉;차홍준;노희영;이상민
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.1-11
    • /
    • 2001
  • There are several traditional factors of software quality. Some of them are such as correctness, reliability, efficiency, compatibility, portability, etc. In addition to them, security is required as another factor of software quality nowadays because some application programs are used as a way to attack information systems by stack frame manipulation. Each processor has its own peculiar stack frame mechanism and C language uses the characteristics of them. This paper explains the concept of security problem caused by stack frame manipulation, and the stack frame mechanism of Pentium, Alpha and SP ARC processor in detail. And then it examines the effect of stack frame mechanism on the security of programs in C language.

  • PDF

Intel SGX를 이용한 온라인 게임 보안 향상 방안

  • Kang, Su In;Kim, Huy Kang
    • Review of KIISC
    • /
    • v.27 no.4
    • /
    • pp.22-26
    • /
    • 2017
  • 온라인 게임은 가장 성공적인 인터넷 서비스 중 하나로서 빠른 속도로 성장해 왔다. 그러나 게임을 대상으로 하는 다양한 공격들이 있었고 그로 인해 많은 정상 사용자들 및 게임서비스 회사에 피해가 발생함에 따라, 온라인 게임 서비스를 보호하기 위한 다양한 기법들이 연구되어 왔다. 실제로 대규모 이용자들이 접속하는 PC 게임들의 경우, 게임 클라이언트단, 네트워크 단, 서버 단 각 구간별로 다양한 보안 기법들이 개발되어 적용되어 왔다. 이 중, 게임 클라이언트는 사용자 및 해커 쪽에서 손쉽게 접근이 가능하기 때문에 공격에 쉽게 노출되어 있어 신뢰하기 어려운 구간이었다. 더불어, 게임 클라이언트 단에 강력한 보안을 적용할 경우 성능저하가 발생하기 때문에 상용 게임보안 솔루션에 의해 프로세스 및 메모리 보호를 받는 등 역공학 방지 기법 및 난독화 기법 정도만을 최소한으로 적용하고, 그 외에는 대부분의 탐지 및 차단 기법들을 네트워크 단 및 서버 단에 적용하는 것이 일반화 되어 있다. 하지만, 최근 하드웨어의 지원을 받아 클라이언트 단의 성능저하를 최소화 하면서도, 게임 클라이언트를 TEE (Trusted Execution Environment)에서 안전하게 실행할 수 있는 기술들이 등장하면서, 게임 클라이언트 단의 보안기술이 다시 주목받고 있다. 본 논문에서는 메모리 변조 공격 및 게임프로세스에 인젝션 공격을 하는 게임해킹 기법들에 대응하기 위하여 Intel에서 발표한 새로운 하드웨어 보안 기술인 Intel SGX(Software Guard Extensions)를 적용하는 방안에 대해 소개한다. Intel SGX를 적용하여 게임프로그램의 프로세스를 보호할 경우 코드와 데이터의 무결성 및 기밀성을 보장하며 실행시킬 수 있기 때문에, 온라인게임보안 발전에 상당히 기여할 수 있을 것으로 기대된다.

Development of Convergence Security Industry Knowledge Map for the 4th Industrial Revolution Security Infrastructure (4차 산업혁명의 보안 인프라 구축을 위한 융합보안산업 지식 맵 개발)

  • Lee, Daesung
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.173-180
    • /
    • 2019
  • As the 4th Industrial Revolution(Industry 4.0), symbolized as CPS(Cyber Physical System), spreads around the world, it is essential to establish a converged security infrastructure to secure technical stability and reliability of various cyber systems to be implemented in the future. In this study, we will investigate the phenomenon of broad convergence security industry and technology including the concept of life safety in relation to the spread of the 4th industrial revolution, and analyze the possibility of linkage between related knowledge to promote academic-industrial cooperation necessary for the convergence of security. we would like to propose a comprehensive development policy on human resource development, technology development and policy improvement.

The design and implementation of security kernel assured trusted path (신뢰경로가 보장되는 보안커널 설계 및 구현)

  • 이해균;김재명;조인준
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.340-347
    • /
    • 2001
  • Security operating system applied to MAC(Mandatory Access Control) or to MLS(Multi Level Security) gives both subject and object both Security Level and value of Category, and it restrict access to object from subject. But it violates Security policy of system and could be a circulated course of illegal information. This is correctly IPC(Interprocess Communication)mechanism and Covert Channel. In this thesis, I tried to design and implementation as OS kernel in order not only to give confidence of information circulation in the Security system, but also to defend from Covert Channel by Storage and IPC mechanism used as a circulated course of illegal information. For removing a illegal information flow by IPC mechanism. I applied IPC mechanism to MLS Security policy, and I made Storage Covert Channel analyze system call Spec. and than distinguish Storage Covert Channel. By appling auditing and delaying, I dealt with making low bandwidth.

  • PDF

An Analysis on Role of Stakeholders for Security System in Smart Healthcare Environment (스마트 의료환경에서 보안체계 구축을 위한 이해관계자 역할 분석)

  • Kim, Yanghoon;Jeong, Wonwho
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.17-27
    • /
    • 2019
  • With the occurrence of the 4th Industrial Revolution, environmental change is happening in the healthcare industry as overall flow of Industry heads to ICT-based business environment. Healthcare Industry, which has the characteristic of public goods, is requiring a reliability and continuity of healthcare industry, however, the introduction of security is being delayed due to the problem of compatibility and extendability of existing system. Accordingly, in this research, we have built a section and role for stakeholders to be concerned in order to induce, analyze and introduce a needed security technology for rapidly building a security system in a smart healthcare environment. We have suggested a possibility of extendability regarding a multi-dimensional effort of stakeholders for establishing a healthcare security system.

The Comparative Study for Truncated Software Reliability Growth Model based on Log-Logistic Distribution (로그-로지스틱 분포에 근거한 소프트웨어 고장 시간 절단 모형에 관한 비교연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.85-91
    • /
    • 2011
  • Due to the large-scale application software syslmls, software reliability, software development has animportantrole. In this paper, software truncated software reliability growth model was proposed based on log-logistic distribution. According to fixed time, the intensity function, the mean value function, the reliability was estimated and the parameter estimation used to maximum likelihood. In the empirical analysis, Poisson execution time model of the existiog model in this area and the log-logistic model were compared Because log-logistic model is more efficient in tems of reliability, in this area, the log-logistic model as an alternative 1D the existiog model also were able to confim that you can use.