• Title/Summary/Keyword: 보안우려

Search Result 205, Processing Time 0.02 seconds

A Study of the Improvement for the Military Logistics, focusing on the PLS Truck and the Dual Pallet Standard (PLS트럭 및 표준 파렛트 규격 복수화 적용이 군수지원에 미치는 영향 연구)

  • Kwon, Kang-Min;Kim, Min-Woo;Kang, Seong-Jin;Kang, Kyung-Woo;Suh, Sun-Duck
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.2
    • /
    • pp.87-98
    • /
    • 2009
  • In the military logistics, the Outsourcing such as 3PL (3rd Party Logistics) and 4PL has emerged recently as an important agenda. However, when 3PL applied prematurely, side effects will occur such as the loss of combat power in wartime, the security vulnerabilities and the high cost by a small amount of military order. Recently, the developed countries such as the United States and the Britain want to compensate for these side effects. Therefore, They are developing the private-public competitive sourcing concept for the complementary partnership and the foster competition with the private sector. To apply this concept to the Korean Military, they need to be reorganized and promote the efficiency in the military logistics. Especially, the transportation sector. Therefore, this study, which is focused on the transportation sector, offers two kinds of measures to improve such as the Dual Pallet Standard (T11, T12) and the PLS(Palletized Loading System) truck system. Finally, these improvements will be analyzed by the simulation in this paper.

Implementation of Radar Drone Detection Based on ISAR Technique (ISAR 영상 기반 소형 드론 탐지 구현)

  • Lee, Kee-Woong;Song, Kyoung-Min;Song, Jung-Hwan;Jung, Chul-Ho;Lee, Woo-kyung;Lee, Myeong-Jin;Song, Yong-Kyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.2
    • /
    • pp.159-162
    • /
    • 2017
  • Along with the popular use of commercial drones, there are increased concerns on the possible threats from drones intruding into secured areas. The difficulty of drone detection is attributed to its stealthy operation flying at low altitude with low level signature. Consequently, the anti-drone technique has been of major research topic in recent years and among others, the radar detection is considered as the most promising technique. However, the use of conventional radar detection may not be effective due to the low level radar cross sections of the commercial drones. In this paper, ISAR technique has been employed to implement drone detection in urban area. To this purpose, a pulsed radar system is set up on the ground to track flying drones and the corresponding ISAR images are produced by coherent processing.

A Study on the Transaction Security of Electronic Payment (전자결제의 보안성에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.173-188
    • /
    • 1998
  • In this paper we discussed various types of electronic payment schemes that are emerging. Threats vary from malicious hackers attempting to crash a system, to threats to data or transaction integrity. An understanding of the various types of threats can assist a security manager in selecting appropriate cost-effective controls to protect valuable information resources. An overview of many of today's common threats presented in this paper will be useful to mangers studying their own threat environments with a view toward developing solutions specific to their organization. To ensure security on the Internet, several methods have been developed and deployed. They include authentication of users and servers, encryption, and data integrity. Transaction security is critical : without it, information transmitted over the Internet is susceptible to fraud and other misuse. So computer systems represents an Intermediary with the potential to access the flow of information between a user. Security is needed to ensure that intermediaries cannot eavesdrop on transactions, or copy/modify data. Online firms must take additional precautions to prevent security breaches. To protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniques such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF

A study on the improvements of law for industrial technology outflow prevention : Focusing on international M&A (해외 M&A시 산업기술 유출 방지를 위한 법 개선 연구)

  • Kim, Seong-Jun;Kim, Woo-Hyun;Yi, Yeong-Seo
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.7-34
    • /
    • 2011
  • Achieving high-level technology in fields such as IT-related industry, semiconductors, mobile phones, LCD, automobile, shipbuilding, etc., Korea has become an international market leader in those fields. In results, there are the increasing numbers of technology leakage attempts in various manners. Recently, technology leakages are not limited to illegal industrial espionage, but also occur during usual corporate proceedings such as technology transfer, joint research and M&A. In fact, there was a technology leakage issue in the M&A between Ssangyong Motors of Korea and Shanghai Motors of China. Current M&A regulations of Korea are not independent laws, but are spread over various laws, such as commercial law, Capital Markets and the Financial Investment Services Act, Foreign Trade Act, etc. This paper focuses on whether the current Korean regulations regarding M&A are able to effectively restrict the leakage of major information of corporate during M&A and seeks the complements.

  • PDF

Study on Remodeling Korean Logistics Laws for Strengthening Integration and Adjustment Function of Logistics Policy (물류정책의 통합.조정기능 강화를 위한 물류법제 개선 방안에 관한 연구)

  • Park, Min-Gyu
    • Journal of Korea Port Economic Association
    • /
    • v.23 no.2
    • /
    • pp.63-86
    • /
    • 2007
  • Historically, government has facilitated logistics by building the airports, the seaports, the rail and transit lines, subsidized their operations where necessary, and established the basic laws and regulations pursuant to which the industry serves the public. In the late 1990s and early 2000s, Korean government began to prepare the basic laws of logistics and nowadays it has tried to refine national logistics laws to reflect contemporary industry conditions and evolving ideological attitudes. The policy objectives governing logistics regulation have changed significantly since 2000. This article traces the current status of the Korean logistics laws which regulate one of the nation's most important industries and suggests certain amendment of current laws.

  • PDF

Proposal for a Peer Decentralized Identity System Using Short-Range Wireless Communications (단거리 무선 통신을 이용한 개인 간 분산 신원증명 시스템 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.959-972
    • /
    • 2021
  • Decentralized Identity is based on the concept of self-sovereign identity, in which holders manage and provide their own credentials. However, a procedure is required to obtain credentials from issuers, and there is a risk of mess personal information leaking due to negligence of the issuers. In this paper, we propose a peer decentralized identity system based on Peer DID technology that allows only participants to verify their identity in 1:1 or 1:N small groups by matching the holder with the issuer. It is directly connected to a mobile device using short-range wireless communications such as bluetooth, and the holders create and provide their own credentials in person to the other party, thus fully realizing the self-sovereignty identity. The proposed system can simplify the identification process, improve security and privacy, and reduce costs. Furthermore, an extended architecture is possible to connect the proposed system and the distributed ledger to identify users in other domains. In the future, based on various technologies, it is also necessary to expand research on identity systems that can be utilized for human-to-thing and things-to-things authentication.

Cancelable Iris Templates Using Index-of-Max Hashing (Index-of-Max 해싱을 이용한 폐기가능한 홍채 템플릿)

  • Kim, Jina;Jeong, Jae Yeol;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.565-577
    • /
    • 2019
  • In recent years, biometric authentication has been used for various applications. Since biometric features are unchangeable and cannot be revoked unlike other personal information, there is increasing concern about leakage of biometric information. Recently, Jin et al. proposed a new cancelable biometric scheme, called "Index-of-Max" (IoM) to protect fingerprint template. The authors presented two realizations, namely, Gaussian random projection-based and uniformly random permutation-based hashing schemes. They also showed that their schemes can provide high accuracy, guarantee the security against recently presented privacy attacks, and satisfy some criteria of cancelable biometrics. However, the authors did not provide experimental results for other biometric features (e.g. finger-vein, iris). In this paper, we present the results of applying Jin et al.'s scheme to iris data. To do this, we propose a new method for processing iris data into a suitable form applicable to the Jin et al.'s scheme. Our experimental results show that it can guarantee favorable accuracy performance compared to the previous schemes. We also show that our scheme satisfies cancelable biometrics criteria and robustness to security and privacy attacks demonstrated in the Jin et al.'s work.

On Artifact Analysis for User Behaviors in Collaboration Tools - Using differential forensics for distinct operating environments (협업 툴의 사용자 행위별 아티팩트 분석 연구 - 운영환경에 따른 differential forensic 개념을 이용하여)

  • Kim, Young-hoon;Kwon, Tae-kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.353-363
    • /
    • 2021
  • As the Untact era is rapidly changing, collaboration tools are increasing their utilization and value as digital technologies for non-face-to-face work. While instant messenger-based collaboration tools support a variety of functions, crime and accident concerns are also increasing in proportion to their convenience, such as information leakage and security incidents. Meanwhile, the digital forensics perspective on collaborative tools is not enough, so forensics research is needed. This study analyzes significant artifacts in the two operating environments through Windows and Android forensics research on Microsoft Teams, the collaboration tool with the highest share in the world. Also, based on differences in artifacts and data attributes according to the operating environment, by applying 'differential forensic', we proved that the usefulness of evidence can be improved by presenting a complementary analysis method and timeline configuration through information linkage.

Eligibility Verification based on Immutable Personal Information without Revealing the Owner's Identity (불변 개인정보에 기반하여 소유자 신원 드러나지 않도록 적격성 검증)

  • Jun-Cheol Park
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.38-48
    • /
    • 2023
  • When an individual needs to prove eligibility, it is sufficient to know whether or not s/he meets the eligibility, but any existing method inevitably exposes the identity of the owner or unnecessary additional information in the process of providing personal information. In this paper, among the immutable items of personal information such as gender, date of birth, and place of birth, we propose a method in which the owner provides only essential item(s) to the eligibility verifier with each iterm marked on one option among multiple choices. In this way, the eligibility verifier can access the combination of items stored in the blockchain with the consent of the information owner, and can safely store the access history by requesting recording in the blockchain again. In the proposed method, the user does not worry about his/her identity being revealed or his/her personal information being overly exposed, and the eligibility verifier can check only necessary items and search later records without separately storing the records.

A Study on The Need for AI Literacy According to The Development of Artificial Intelligence Chatbot (인공지능 챗봇 발전에 따른 AI 리터러시 필요성 연구)

  • Cheol-Seung Lee;Hye-Jin Baek
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.421-426
    • /
    • 2023
  • Among artificial intelligence convergence technologies, Chatbot is an artificial intelligence-based interactive system and refers to a system that can provide interaction with humans. Chatbots are being re-examined as chatbots develop into NLP, NLU, and NLG. However, artificial intelligence chatbots can provide biased information based on learned data and cause serious damage such as privacy infringement and cybersecurity concerns, and it is essential to understand artificial intelligence technology and foster AI literacy. With the continued evolution and universalization of artificial intelligence, AI Literacy will also expand its scope and include new areas. This study is meaningful in raising awareness of artificial intelligence technology and proposing the use of human respect technology that is not buried in technology by cultivating human AI literacy capabilities.