• Title/Summary/Keyword: 보안회사

Search Result 230, Processing Time 0.028 seconds

The Progress of One-Phone Service Using Bluetooth (Bluetooth 기술을 이용한 One-Phone 서비스의 진보)

  • Lee, Sung-Joon;You, Choong-Yeol;Soh, Dea-Wha;Hong, Sang-Jeen
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.757-759
    • /
    • 2005
  • 최근에 낮은 가격과 전력을 내세워 응용서비스를 제공할 수 있는 Bluetooth를 탑재한 많은 무선 제품들이 출시되고 있다. 그러나 1Mbps의 저속, 다른 무선 기기들과의 상호 간섭과 호환성 문제 그리고 보안 문제 등 많은 제약 조건이 따름에도 불구하고 이동전화, 컴퓨터, PDA 등 근거리 무선접속을 사용하고 있는 가정이나 회사의 전화나 컴퓨터들과 어떻게 서로 쉽게 연결될 수 있을까에 대한 꾸준한 연구가 활발히 진행되고 있다. Bluetooth 무선 기술은 음성 및 데이터 전송을 위한 단거리 일대다중 무선 주파수 통신을 위해 제안된 무선통신 기술이다. Bluetooth는 2.4GHz ISM Band에서 동작하며 약 10m 범위의 다양한 이동 장치와 휴대용 장치를 위한 저가격의 기저대역 무선 접속을 제공한다. 본 논문에서 Bluetooth의 기술적 측면을 알아보고 이를 이용해 현재 시장에 출시된 Bluetooth 기기중 하나인 One Phone을 소개하려 한다. 또한 Bluetooth의 발전 가능성에 대하여 알아본다.

  • PDF

Automatic Malware Detection Rule Generation and Verification System (악성코드 침입탐지시스템 탐지규칙 자동생성 및 검증시스템)

  • Kim, Sungho;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.9-19
    • /
    • 2019
  • Service and users over the Internet are increasing rapidly. Cyber attacks are also increasing. As a result, information leakage and financial damage are occurring. Government, public agencies, and companies are using security systems that use signature-based detection rules to respond to known malicious codes. However, it takes a long time to generate and validate signature-based detection rules. In this paper, we propose and develop signature based detection rule generation and verification systems using the signature extraction scheme developed based on the LDA(latent Dirichlet allocation) algorithm and the traffic analysis technique. Experimental results show that detection rules are generated and verified much more quickly than before.

Private security industry based on current status (현황으로 살펴보는 민간경비업)

  • Park, Su-Hyeon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.177-179
    • /
    • 2020
  • 본 논문에서는 경찰청에서 제공하는 2019년 민간경비업체와 민간경비원의 현황을 통해서 민간경비의 다양한 해석과 사각으로 이론적 기반을 마련하는 것을 목적으로 한다. 민간경비업체와 경비원 수는 총 5356개와 16만 3177명으로 나타났다. 현황으로 살펴본 민간경비업의 특징은 크게 4가지가 나타났다. 첫 번째 민간경비업체 수와 경비원의 수가 수도권으로 집중되었다. 기계경비원을 제외하고 53%~89%가 수도권(서울·경기·인천)에 집중되었다. 두 번째, 시설경비에 대한 집중이다. 시설경비가 민간경비업체와 경비원 수에 차지하는 비율은 각각 83%와 86%를 차지함으로써 경비업법에 의한 구분이 아닌 경비원은 곧 시설경비원을 뜻하는 것처럼 느껴지게 되었다. 세 번째, 비정상적인 신변보호 업체 수와 경비원 수이다. 2019년 기준으로 신변보호 업체의 수보다 신변보호원이 없는 상황이 발생하고 있고, 이는 허가만 유지, 시설경비업무와 경계모호, 신고 누락, 자체경비 전환으로 인한 것으로 보인다. 네 번째, 특수경비업의 특수성이다. 국가중요시설에서 일하는 특수경비원은 국가의 정책에 따라서 한국공항공사의 한공보안파트너스, 인천공항공사의 인천공항경비를 자회사로 하고 정규직 전환을 진행 중에 있기 때문에 특수경비업체 수와 경비원 수의 변화는 불가피한 것으로 보인다.

  • PDF

Study of DRM Application for the Portable Digital Audio Device (휴대용 디지털 오디오 기기에서의 DRM 적용에 관한 연구)

  • Cho, Nam-Kyu;Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.21-27
    • /
    • 2006
  • With the introduction of sound source sharing over the high speed internet and portable digital audio, the digitalization of sound source has been rapidly expanded and the sales and distribution of sound sources of the former offline markets are stagnant. Also, the problem of infringement of copyright is being issued seriously through illegal reproduction and distribution of digitalized sound sources. To solve these problems, the DRM technology for protecting contents and copyrights in portable digital audio device began to be introduced. However, since the existing DRM was designed based on the fast processing CPU and network environment, there were many problems in directly applying to the devices with small screen resolution, low processing speed and network function such as digital portable audio devices which the contents are downloadable through the PC. In this study, the DRM structural model which maintains similar security level as PC environment in the limited hardware conditions such as portable digital audio devices is proposed and analyzed. The proposed model chose portable digital audio exclusive device as a target platform which showed much better result in the aspect of security and usability compared to the DRM structure of exiting portable digital audio device.

  • PDF

New Perspective for Performance Measurement of Digital Supply Chain Management (디지털 공급-수요 사슬 관리의 성과를 측정하기 위한 새로운 관점)

  • Ronja Rasche;DongBack Seo
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.139-162
    • /
    • 2023
  • With the emergence of new digital technologies into a supply chain, it is essential for companies to incorporate these technologies in managing their supply chains. However, various challenges have been identified in digital supply chain management, especially when it comes to its assessment. There are no universally agreed measurements for the performance of digital supply chain management within the research community so far. This paper explores an option of using user experience as one of possible measurements. Therefore, three different focus-group discussions were held and later analyzed with a qualitative content analysis. The subscription-based video on demand service, Netflix was used as an example in those discussions. Due to the fact that Netflix provides a digital product as a streamline service, user experience is critical for the company. Especially, user experience with a recommender system and related privacy issues have become significant for a company to retain existing customers and attract new customers in many fields. Since the recommender system and related privacy issues are parts of a digital supply chain, user experience can be one of appropriate measurements for digital supply chain management. This study opens a new perspective for research on performance measurements of digital supply chain management.

A Case Study - IT Outsourcing of the Korea Development Bank (산업은행: 금융 IT 아웃소싱 - 공동협력으로 안전한 문을 연다)

  • Kang, Ju-Young;Lee, Jae-Kyu
    • Information Systems Review
    • /
    • v.7 no.2
    • /
    • pp.229-255
    • /
    • 2005
  • The Korea Development Bank promoted a total outsourcing for IT operation in 1999 for the first time in the banking industry. The Korea Development Bank became the center of public attention because the most banks were unwilling to take an outsourcing with external sources for the reason of financial operation accidents, securities, and threats of strikes. After the introduction of the total IT outsourcing, the Korea Development Bank has continuously diagnosed the problems of the IT outsourcing and adopted various proper complements for the enhancement of the IT outsourcing. As the result of the enhancement, the IT outsourcing of the Korea Development Bank marched into the joint liability operation period after going through the outsourcing operation period and the co-operation period. The joint liability operation which is the most leading outsourcing system which is adopted by the Korea Development Bank for the first time in the banking industry. Through the joint liability operation, the Korea Development Bank could accept the most up-to-date IT, concentrate internal manpower on the core capability, and secure flexibility of manpower. Also, the bank changed the relationship between the bank and the external sources from the one-sided relationship between a producers and a consumer to the joint liability relationship on which both sides are responsible for the operation, and could integrate the internal capacity with the professional know-how of the external IT outsourcing company. In this paper, we testified the soundness and validity for the worries of banks about the total IT outsourcing with external sources. And, we arranged the advantages and outcomes of the total IT outsourcing with external sources compared to the IT outsourcing with internal sources. Moreover, we expect that we can improve the closed financial IT outsourcing industry structure and raise the world competitive power of domestic IT outsourcing companies by correcting wrong ideas on the IT outsourcing with external sources.

An Empirical Study on the Improvement of In Situ Soil Remediation Using Plasma Blasting, Pneumatic Fracturing and Vacuum Suction (플라즈마 블라스팅, 공압파쇄, 진공추출이 활용된 지중 토양정화공법의 정화 개선 효과에 대한 실증연구)

  • Jae-Yong Song;Geun-Chun Lee;Cha-Won Kang;Eun-Sup Kim;Hyun-Shic Jang;Bo-An Jang;Yu-Chul Park
    • The Journal of Engineering Geology
    • /
    • v.33 no.1
    • /
    • pp.85-103
    • /
    • 2023
  • The in-situ remediation of a solidified stratum containing a large amount of fine-texture material like clay or organic matter in contaminated soil faces limitations such as increased remediation cost resulting from decreased purification efficiency. Even if the soil conditions are good, remediation generally requires a long time to complete because of non-uniform soil properties and low permeability. This study assessed the remediation effect and evaluated the field applicability of a methodology that combines pneumatic fracturing, vacuum extraction, and plasma blasting (the PPV method) to improve the limitations facing existing underground remediation methods. For comparison, underground remediation was performed over 80 days using the experimental PPV method and chemical oxidation (the control method). The control group showed no decrease in the degree of contamination due to the poor delivery of the soil remediation agent, whereas the PPV method clearly reduced the degree of contamination during the remediation period. Remediation effect, as assessed by the reduction of the highest TPH (Total Petroleum Hydrocarbons) concentration by distance from the injection well, was uncleared in the control group, whereas the PPV method showed a remediation effect of 62.6% within a 1 m radius of the injection well radius, 90.1% within 1.1~2.0 m, and 92.1% within 2.1~3.0 m. When evaluating the remediation efficiency by considering the average rate of TPH concentration reduction by distance from the injection well, the control group was not clear; in contrast, the PPV method showed 53.6% remediation effect within 1 m of the injection well, 82.4% within 1.1~2.0 m, and 68.7% within 2.1~3.0 m. Both ways of considering purification efficiency (based on changes in TPH maximum and average contamination concentration) found the PPV method to increase the remediation effect by 149.0~184.8% compared with the control group; its average increase in remediation effect was ~167%. The time taken to reduce contamination by 80% of the initial concentration was evaluated by deriving a correlation equation through analysis of the TPH concentration: the PPV method could reduce the purification time by 184.4% compared with chemical oxidation. However, the present evaluation of a single site cannot be equally applied to all strata, so additional research is necessary to explore more clearly the proposed method's effect.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

The Effect of Welfare Benefit System on Organizational Commitment and Job Satisfaction in Security Agents (시큐리티 요원의 복리후생이 조직몰입 및 직무만족에 미치는 영향)

  • Cho, Sung-Jin;Lee, Hyun-Woo;Lee, Jong-Woo
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.3-13
    • /
    • 2014
  • The purpose of this research is to establish the effects of the welfare benefits for security agents on the organizational commitment and the job satisfaction. To achieve this purpose, data were collected from 288 security agents of the security companies located in Seoul and Gyeonggi regions using the welfare benefit, organizational commitment, and job satisfaction scale, and the collected data were analyzed using SPSS 18.0 and AMOS 18.0. The conclusion obtained from the results of the analysis is as follows : First, it was the difference in welfare benefits, organizational commitment, job satisfaction, depending on individual characteristics of the security agents. Second, it was found that the cultural support, facilities support, economic support, and life support of welfare benefits had positive effects on the organizational commitment of security agents, and the conclusion that the welfare benefit factors are important to increase the organizational commitment was derived. Third, it was found that the cultural support, facilities support, economic support, and life support of welfare benefits had positive effects on the job satisfaction of security agents, and the conclusion that satisfying the welfare benefits is a way to raise the job satisfaction was derived.

Influencing Factors on Outsourcing Success in the Defense Sector (국방부문의 아웃소싱 성공도에 영향을 미치는 요인에 관한 연구)

  • Yu, Dae Beom;Oh, Jay In
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.79-103
    • /
    • 2016
  • The Korean Army has to construct a system that will enable it to cope immediately with the flexible military relationships in Northeast Asia by systematizing and improving the efficiency of operations. These improvements include building a smart and strong army, concentrating on cost-effective combat skills, maximizing the utilization of private resources, and establishing a military structure based on information and technology. Accordingly, this study proposes solutions to solve the problems affecting the success of outsourcing in the defense industry. Unlike outsourcing in other government ministries, outsourcing in the national defense sector may be unrealistic because this strategy is related to the renovation project of the Ministry of the National Defense. In general, the objective of outsourcing in the defense industry, similar to other businesses, is to improve efficiency and not to reduce troops and national defense budget. Several factors, such as identification and security guarantee, risk reduction, cost saving, quality improvement, the reliability of enterprise, and professional technology, are necessary to ensure outsourcing success in the national defense sector. In terms of effectiveness, the improvement in service quality significantly influences outsourcing success in the national defense sector. Eventually, the national defense forces must be strengthened to prevent the provocative actions of North Korea and other threats by improving identification, sense of national security, and quality unlike the current outsourcing of the government, as well as emulating German GEBB or PMC, which utilizes social capital.