• Title/Summary/Keyword: 사이버 3계층

Search Result 27, Processing Time 0.022 seconds

A Study to Hierarchical Visualization of Firewall Access Control Policies (방화벽 접근정책의 계층적 가시화 방법에 대한 연구)

  • Kim, Tae-yong;Kwon, Tae-woong;Lee, Jun;Lee, Youn-su;Song, Jung-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1087-1101
    • /
    • 2020
  • Various security devices are used to protect internal networks and valuable information from rapidly evolving cyber attacks. Firewall, which is the most commonly used security device, tries to prevent malicious attacks based on a text-based filtering rule (i.e., access control policy), by allowing or blocking access to communicate between inside and outside environments. However, in order to protect a valuable internal network from large networks, it has no choice but to increase the number of access control policy. Moreover, the text-based policy requires time-consuming and labor cost to analyze various types of vulnerabilities in firewall. To solve these problems, this paper proposes a 3D-based hierarchical visualization method, for intuitive analysis and management of access control policy. In particular, by providing a drill-down user interface through hierarchical architecture, Can support the access policy analysis for not only comprehensive understanding of large-scale networks, but also sophisticated investigation of anomalies. Finally, we implement the proposed system architecture's to verify the practicality and validity of the hierarchical visualization methodology, and then attempt to identify the applicability of firewall data analysis in the real-world network environment.

A Study on a Computer Program Visualization Method Effective for the e-Learning Contents (이 러닝 콘텐츠에 효과적인 컴퓨터 프로그램 시각화 방안에 대한 연구)

  • Ha, Sang-Ho
    • Journal of Engineering Education Research
    • /
    • v.10 no.3
    • /
    • pp.109-124
    • /
    • 2007
  • With the advance of the Internet and computing technologies, e-learning is now a hot issue worldwide for providing the effective learning on the cyber-space. However, most of existing e-learning contents have been developed mainly based on text, including simple multimedia elements such as images, animations, and voices. This paper suggests a method effective for the computer programming e-learning. The method is based on program visualization using flowcharts. It features the stepwise hierarchical program visualization on the level of statements, the flowchart based visualization for control constructs of languages, visualization over whole programs, visualization compared with source codes, and interaction with users. Finally, we implement a system to realize the suggested method, and execute it for an example program.

A Study on Information Security Policy in the era of Smart Society (스마트시대 정보보호정책에 관한 연구)

  • Kim, Dong-Wook;Sung, Wook-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.883-899
    • /
    • 2012
  • This study will propose the policy priorities of cyber information security by AHP(Analytic Hierarchy Process) survey. The policy categories for AHP survey consist in the foundation of information security and activity of information security(1st hierarchy). In the second hierarchy, the foundation of information security was classified into laws-system, human resources, h/w-s/w technology and sociocultural awareness. And the activity of information security was divided into infrastructure protection, privacy protection, related industry promotion, and national security. Information policy alternatives were composed of 16 categories in the third hierarchy. According to the AHP result, in the perspective of policy importance, the modification of related laws was the first agenda in the policy priority, better treatment of professionals was the second, and the re-establishment of policy system was the third. In the perspective of policy urgency, the re-establishment of policy system was the first item, the modification of related laws was the second, and better treatment of professionals is the third.

Development of an Index Model on the Information and Communication Ethics (정보통신윤리지수 모델 개발)

  • Lee, Jae-Woon;Han, Keun-Woo;Lee, YoungJun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.3
    • /
    • pp.19-29
    • /
    • 2007
  • The informationization policies undertaken in concentration only on the national economic growth invited the unbalance between technology and social culture, displayed the serious reverse function phenomena, and these problems threatened the personal identity of individual in the cyber space. In this study, we developed an index model on the information and communication ethics where the national level of information and communication ethics can be examined. For this purpose, based on diverse previous research data, the areas of the ethical indicators in information and communication has been developed through the brain storming of the research staff. Through the consultation with experts, the feasibility and representation as index was heightened, and the weighted values to the each index was provided by the AHP method. The outcome of questionnaires from the information users and information providers (great portals) was also reflected in simple average method into the calculation of the weighted value to the each index element.

  • PDF

Image Steganography for Hiding Hangul Messages in Hybrid Technique using Variable ShiftRows (가변 ShiftRows를 이용한 하이브리드 기법에서 한글 메시지 은닉을 위한 이미지 스테가노그래피)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.217-222
    • /
    • 2022
  • Information plays an important role in modern society. Most of the information is processed and moved in the digital space. In cyberspace, confidential communication based on resistance and security is fundamental. It is essential to protect the information sent and received over the network. However, information may be leaked and forged by unauthorized users. The effectiveness of the existing protection system decreases as an innovative technique is applied to identify the communication contents by a third party. Steganography is a technique for inserting secret information into a specific area of a medium. Stegganography and steganalysis techniques are at odds with each other. A new and sophisticatedly implemented system is needed to cope with the advanced steganalysis. To enhance step-by-step diffusion and irregularity, I propose a hybrid implementation technique of image steganography for Hangul messages based on layered encryption and variable ShiftRows. PSNR was calculated to measure the proposed steganography efficiency and performance. Compared to the basic LSB technique, it was shown that the diffusion and randomness can be increased even though the PSNR decreased by 1.45%.

A Study on the Strategy for Improvement of Operational Test and Evaluation of Weapon System and the Determination of Priority (무기체계 운용시험평가 개선전략 도출 및 우선순위 결정)

  • Lee, Kang Kyong;Kim, Geum Ryul;Yoon, Sang Don;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.177-189
    • /
    • 2021
  • Defense R&D is a key process for securing weapons systems determined by mid- and long-term needs to cope with changing future battlefield environments. In particular, the test and evaluation provides information necessary to determine whether or not to switch to mass production as the last gateway to research and development of weapons systems and plays an important role in ensuring performance linked to the life cycle of weapons systems. Meanwhile, if you look at the recent changes in the operational environment of the Korean Peninsula and the defense acquisition environment, you can see three main characteristics. First of all, continuous safety accidents occurred during the operation of the weapon system, which increased social interest in the safety of combatants, and the efficient execution of the limited defense budget is required as acquisition costs increase. In addition, strategic approaches are needed to respond to future battlefield environments such as robots, autonomous weapons systems (RAS), and cyber security test and evaluation. Therefore, in this study, we would like to present strategies for improving the testing and evaluation of weapons systems by considering the characteristics of the security environment that has changed recently. To this end, the improvement strategy was derived by analyzing the complementary elements of the current weapon system operational test and evaluation system in a multi-dimensional model and prioritized through the hierarchical analysis method (AHP).

Implementation Strategy of Global Framework for Climate Service through Global Initiatives in AgroMeteorology for Agriculture and Food Security Sector (선도적 농림기상 국제협력을 통한 농업과 식량안보분야 전지구기후 서비스체계 구축 전략)

  • Lee, Byong-Lyol;Rossi, Federica;Motha, Raymond;Stefanski, Robert
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.15 no.2
    • /
    • pp.109-117
    • /
    • 2013
  • The Global Framework on Climate Services (GFCS) will guide the development of climate services that link science-based climate information and predictions with climate-risk management and adaptation to climate change. GFCS structure is made up of 5 pillars; Observations/Monitoring (OBS), Research/ Modeling/ Prediction (RES), Climate Services Information System (CSIS) and User Interface Platform (UIP) which are all supplemented with Capacity Development (CD). Corresponding to each GFCS pillar, the Commission for Agricultural Meteorology (CAgM) has been proposing "Global Initiatives in AgroMeteorology" (GIAM) in order to facilitate GFCS implementation scheme from the perspective of AgroMeteorology - Global AgroMeteorological Outlook System (GAMOS) for OBS, Global AgroMeteorological Pilot Projects (GAMPP) for RES, Global Federation of AgroMeteorological Society (GFAMS) for UIP/RES, WAMIS next phase for CSIS/UIP, and Global Centers of Research and Excellence in AgroMeteorology (GCREAM) for CD, through which next generation experts will be brought up as virtuous cycle for human resource procurements. The World AgroMeteorological Information Service (WAMIS) is a dedicated web server in which agrometeorological bulletins and advisories from members are placed. CAgM is about to extend its service into a Grid portal to share computer resources, information and human resources with user communities as a part of GFCS. To facilitate ICT resources sharing, a specialized or dedicated Data Center or Production Center (DCPC) of WMO Information System for WAMIS is under implementation by Korea Meteorological Administration. CAgM will provide land surface information to support LDAS (Land Data Assimilation System) of next generation Earth System as an information provider. The International Society for Agricultural Meteorology (INSAM) is an Internet market place for agrometeorologists. In an effort to strengthen INSAM as UIP for research community in AgroMeteorology, it was proposed by CAgM to establish Global Federation of AgroMeteorological Society (GFAMS). CAgM will try to encourage the next generation agrometeorological experts through Global Center of Excellence in Research and Education in AgroMeteorology (GCREAM) including graduate programmes under the framework of GENRI as a governing hub of Global Initiatives in AgroMeteorology (GIAM of CAgM). It would be coordinated under the framework of GENRI as a governing hub for all global initiatives such as GFAMS, GAMPP, GAPON including WAMIS II, primarily targeting on GFCS implementations.