• Title/Summary/Keyword: 보안체계

Search Result 1,468, Processing Time 0.023 seconds

A Study on National Cyber Capability Assessment Methodology (국가 사이버 역량 평가 방법론 연구)

  • Kang, JungMin;Hwang, HyunUk;Lee, JongMoon;Yun, YoungTae;Bae, ByungChul;Jung, SoonYoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1039-1055
    • /
    • 2012
  • It is required for us to enhance the national cyber capability as the worldwide countries have been doing effort to strengthen their cyber capabilities. However, we are encountering the difficulty in estimating national cyber capability due to the absence of any cyber capability assessment methodology. This paper presents the national cyber capability assessment methodology which is used for settle up national cyber policy. We also introduce the result of five major nations(US, China, Japan, Russia, Korea)' cyber capability assessment using the proposed methodology. The methodology is developed using open data and includes three areas; base capability, attack capability and defense capability. The assessment result shows the in the order of US, China, Korea, Russia, Japan. As the analysis of that result, in order to enhance the our cyber capability, we recommend that first, cyber budget and human resources for the base capability should be more invested, second, the strategy for attack capability enhancement is strongly required and lastly, the patch ratio and security monitoring level should be upgraded.

A Study on the Practice Model for Practical Education for Health and Medical Information Management (보건의료정보관리 실습교육을 위한 실습모델 연구)

  • Choi, Joon-Young
    • Journal of the Health Care and Life Science
    • /
    • v.8 no.2
    • /
    • pp.83-93
    • /
    • 2020
  • In this study, a practical model for health information management education using the EMR education system at universities for nurturing health care information managers was studied. Currently, there is no practical training course for health care information management in the standards for evaluation and certification of health care information management education introduced to strengthen the job competency of health care information managers. Accordingly, the program was constructed so that the practice program suggested as an educational environment in the Health and Medical Information Management Education Evaluation and Certification Manual can be practiced in the EMR education system. In addition, a practical model that can be performed according to the on-site practice guidelines for health and medical information management for each program was studied. Using the health care information management education EMR system, master data management, patient registration, doctor prescription, medical cost calculation, health insurance claim management, form management, discharge registration, cancer registration, unrecorded management, health care data management, health care statistics, A practice model was studied so that practice on information protection/security management can be performed. It will be possible to play a role as a health care information management expert by raising the quality level of health care information management education through systematic and standardized health care information management practice courses at universities. Accordingly, it is necessary to cultivate health care information management experts who develop and manage medical services based on medical data analysis through practical training of health care information managers.

Effects of Intensive Course Program on the Sexual Violence for the Re-crime Risky Group in the Sex Offender: Focused on Impulsivity, Anger Expression, Rape Myth, and Self Esteem (재범위험 성폭력사범 집중교육 프로그램의 효과: 충동성, 분노표현, 강간통념, 자기존중감을 중심으로)

  • Gang, Chun-Hee;Kwon, Jae-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.707-719
    • /
    • 2021
  • The purpose of this study was to find out how effect does the second-stage which is the intensive course program for sexual offenders of three-stage(basic, intensive and advanced remedial) on impulsivity, anger expression, rape myth and self-esteem of sexual offenders. To this end, 10 people waiting for the second-stage intensive education among sexual violence offenders serving at M prison located in J province were selected as subjects for the study. To verify the effectiveness of the program, repeated measurement design(pre, post and one month post test) was conducted, and a total of 200 hours of 'Intensive Course Program on the Sexual Violence' was conducted to the subjects. The results of this study are as follows. It was confirmed that the intensive course program on the sexual violence for the re-crime risky group in the sex offender is effective in reducing impulsivity and anger expression, which are risk factors of sexual crime, bringing positive changes to rape myths, which are distorted sexual perceptions of sexual violence criminals, and improving self-esteem. Finally, it suggested the necessity of continuous development and improvement of sexual violence preventive programs targeting sexual offenders, and construction of systematic supervision and related system to ensure the effectiveness of remedial after release of sexual offenders.

A Study on the Improvement of the Intention of Continuous Use of Enterprise Content Management System: Focusing on the Technology Acceptance Model (기업콘텐츠관리시스템의 지속적 이용의도 향상에 대한 연구: 기술수용모델을 중심으로)

  • Hwang, In-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.229-243
    • /
    • 2021
  • As systematic information protection and management is recognized as an organization's core value, organizations are pursuing a shift from an individual-centered information management method to an organization-oriented information management method. The Enterprise content management system(ECMS) is a solution that supports document security and information sharing by insiders and is being introduced by many organizations due to recent technological developments. The purpose of this study is to present a method of improving performance through continuous use of the ECMS from the user's point of view and also suggest a method to improve the intention of continuous use through the expansion of the technology acceptance model. This study surveyed the employees of organizations that adopted the ECMS and verified the research hypothesis derived from previous studies through structural equation modeling. As a result of the analysis, usefulness, and ease of use affected on the intention of continuous use of the ECMS, and the knowledge sharing culture and the ECMS quality factors affected the technology acceptance model factors. The results of this study have academic and practical significance in terms of suggesting a plan to increase the usability of the ECMS from the user's point of view.

A study on the Influence of Enterprise Content Management System Success Factors and Task Characteristics on Intention to Use (기업콘텐츠관리시스템 성공 요인과 업무적 특성이 시스템 사용 의도에 미치는 영향)

  • Hwang, Inho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.333-349
    • /
    • 2021
  • As information is recognized as an important asset of an organization, organizations are increasing their resource input for knowledge management. In particular, the enterprise content management system(ECMS) is a solution for organization-oriented content management, and it has high utility by helping to achieve business performance through systematic utilization of content and improve the level of internal information security. The purpose of this study is to suggest a plan to improve the intention to use organizational employee's ECMS and to suggest the effect of the relationships between information system quality characteristics and work environment characteristics on intention to use. In this study, a research hypothesis was presented based on previous studies, a questionnaire was conducted on workers of organizations that adopted an ECMS, and the hypothesis was verified by applying structural equation modeling. As a result of the analysis, information and service quality of the ECMS and task interdependence increased the intention to use, but task conflict decreased the intention to use. In addition, task interdependence and task conflict moderated the positive relationship between the quality factors of the ECMS and the intention to use it. This study has implications in terms of suggesting the direction of the organization's behavior through factors that increase the use of ECMS.

Trend Forecasting and Analysis of Quantum Computer Technology (양자 컴퓨터 기술 트렌드 예측과 분석)

  • Cha, Eunju;Chang, Byeong-Yun
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.35-44
    • /
    • 2022
  • In this study, we analyze and forecast quantum computer technology trends. Previous research has been mainly focused on application fields centered on technology for quantum computer technology trends analysis. Therefore, this paper analyzes important quantum computer technologies and performs future signal detection and prediction, for a more market driven technical analysis and prediction. As analyzing words used in news articles to identify rapidly changing market changes and public interest. This paper extends conference presentation of Cha & Chang (2022). The research is conducted by collecting domestic news articles from 2019 to 2021. First, we organize the main keywords through text mining. Next, we explore future quantum computer technologies through analysis of Term Frequency - Inverse Document Frequency(TF-IDF), Key Issue Map(KIM), and Key Emergence Map (KEM). Finally, the relationship between future technologies and supply and demand is identified through random forests, decision trees, and correlation analysis. As results of the study, the interest in artificial intelligence was the highest in frequency analysis, keyword diffusion and visibility analysis. In terms of cyber-security, the rate of mention in news articles is getting overwhelmingly higher than that of other technologies. Quantum communication, resistant cryptography, and augmented reality also showed a high rate of increase in interest. These results show that the expectation is high for applying trend technology in the market. The results of this study can be applied to identifying areas of interest in the quantum computer market and establishing a response system related to technology investment.

A study on the improvement of artificial intelligence-based Parking control system to prevent vehicle access with fake license plates (위조번호판 부착 차량 출입 방지를 위한 인공지능 기반의 주차관제시스템 개선 방안)

  • Jang, Sungmin;Iee, Jeongwoo;Park, Jonghyuk
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.57-74
    • /
    • 2022
  • Recently, artificial intelligence parking control systems have increased the recognition rate of vehicle license plates using deep learning, but there is a problem that they cannot determine vehicles with fake license plates. Despite these security problems, several institutions have been using the existing system so far. For example, in an experiment using a counterfeit license plate, there are cases of successful entry into major government agencies. This paper proposes an improved system over the existing artificial intelligence parking control system to prevent vehicles with such fake license plates from entering. The proposed method is to use the degree of matching of the front feature points of the vehicle as a passing criterion using the ORB algorithm that extracts information on feature points characterized by an image, just as the existing system uses the matching of vehicle license plates as a passing criterion. In addition, a procedure for checking whether a vehicle exists inside was included in the proposed system to prevent the entry of the same type of vehicle with a fake license plate. As a result of the experiment, it showed the improved performance in identifying vehicles with fake license plates compared to the existing system. These results confirmed that the methods proposed in this paper could be applied to the existing parking control system while taking the flow of the original artificial intelligence parking control system to prevent vehicles with fake license plates from entering.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

A Study on the Improvement of Collection, Management and Sharing of Maritime Traffic Information (해상교통정보의 수집, 관리 및 공유 개선방안에 관한 연구)

  • Shin, Gil-Ho;Song, Chae-Uk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.515-524
    • /
    • 2022
  • To effectively collect, manage, and share the maritime traffic information, it is necessary to identify the technology trends concerning this particular information and analyze its current status and problems. Therefore, this study observes the domestic and foreign technology trends involving maritime traffic information while analyzing and summarizing the current status and problems in collecting, managing, and sharing it. According to the data analysis, the problems in the collecting stage are difficulties in collecting visual information from long-distance radars, CCTVs, and cameras in areas outside the LTE network coverage. Notably, this explains the challenges in detecting smuggling ships entering the territorial waters through the exclusive economic zone (EEZ) in the early stage. The problems in the management stage include difficult reductions and expansions of maritime traffic information caused by the lack of flexibility in storage spaces mostly constructed by the maritime transportation system. Additionally, it is challenging to deal with system failure with system redundancy and backup as a countermeasure. Furthermore, the problems in the sharing stage show that it is difficult to share information with external operating organizations since the internal network is mainly used to share maritime transportation information. If at all through the government cloud via platforms such as LRIT and SASS, it often fails to effectively provide various S/W applications that help use maritime big data. Therefore, it is suggested that collecting equipment such as unmanned aerial vehicles and satellites should be constructed to expand collecting areas in the collecting stage. In the management and sharing stages, the introduction and construction of private clouds are suggested, considering the operational administration and information disclosure of each maritime transportation system. Through these efforts, an enhancement of the expertise and security of clouds is expected.