• Title/Summary/Keyword: 사전취약

Search Result 362, Processing Time 0.023 seconds

M2M based personage information monitoring system (M2M기반 인물 정보 모니터링 시스템)

  • Lee, Jong-sung;Jeon, Min-ho;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.1000-1003
    • /
    • 2013
  • The monitoring system using a surveillance camera, has the advantage that can be observed in real time the blind spot of the crime, case to be mounted is increasing. However, surveillance camera, is used for the purpose of verification of the crime later than risk detection of crime before advance. Therefore, in this paper, in order to supplement the weak information collection monitoring system using the monitoring camera, by using the position information of the smartphone, infers the person monitoring region, the movement path of the image information other event occurs it is a fusion iT monitoring system that provides information of the user who judged. Result of the experiment, the proposed system confirmed the improved efficiency and usability than conventional systems.

  • PDF

A Service Platform Development on the GIS-based Analysis and Management of the Fire-fighting Vulnerable Areas (GIS기반 소방취약지 분석관리 서비스 플랫폼 개발)

  • Song, Wanyoung;Cho, Kwanghyun;Cho, Myeongheum;Kim, Seonggon;Kim, Sungjae
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.2
    • /
    • pp.269-278
    • /
    • 2015
  • Developed a service platform technology for automated that analyze the fire-fighting vulnerable area and equipped a map online. As a result, it is possible to provide the information necessary for the vulnerable area of the fire-fighting activity online. If progress on the study of the utilized service, it is possible to reduce the Golden Time of the fire fighting field. In this study, Confirmed the technical viability satisfactory to the management and service expansion improvements to fire-fighting vulnerable area.

Developing Reference Model for National Cybersecurity Strategy Establishment and Improvement (국가 사이버보안 전략 수립과 개선을 위한 참조 모델 개발)

  • YUN, Jaesuk
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.53-61
    • /
    • 2016
  • A number of countries have been developing and implementing national cybersecurity strategy to prevent damages caused by cyber threats and to minimize damages when they happened. However, there are a lot of differences and disparities in respective strategies with their own background and needs. A vulnerability in some places can be a global problem, so various guidelines have been developed by relevant organizations including international organizations to support the establishment of national cybersecurity strategies and improvement of them. In this paper, with analysis on the guidelines for the establishment of national cybersecurity strategies, reference model consisting of common elements of strategies was suggested. And several recommendations for the improvement measures for Korean national cybersecurity strategies were explained with a comparison of the reference model.

A Study on Improvement of Mechanism for Secure Handoff in Wireless Networks (무선랜 환경에서 안전한 핸드오프를 위한 메커니즘 개선에 관한 연구)

  • Cho, Ji-Hoon;Jeon, Joon-Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1047-1055
    • /
    • 2005
  • One of major characteristics in wireless LAN is terminal's frequent mobility, so it makes many overheads in the process of authentications repeatedly at each handoffs. So I propose IAPP(Inter Access Point Protocol) of IEEE 802.11f, modified context block and 4 way handshake of IEEE 802.11i, in order to implement secure and rapid handoff. The context block. I proposed, doesn't makes any communication with RADIUS server at handoff period. Therefore, it guarantee higher efficiency than existing handoff mechanisms. Also it can improve security vulnerability by padding authentication field in the context block for providing in advance against Replay and DoS(Denial of Service) attacks.

The Improvement of Translucent Cryptography (Translucent Cryptography의 취약점 개선)

  • 김종희;이필중
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1276-1281
    • /
    • 2002
  • Bellare and Rivest proposed the translucent cryptography which was a kind of key recovery system. Translucent cryptography is a system in which the third party can recover encrypted message with the probability p(0$\leq$p$\leq$1). The key recovery agency doesn't need to store the user's private key in advance. The balance between key recovery agency and user can be controlled by the value of p. For example, if p is set to be 0.4 then the key recovery agency can recover 40 out of 100 encrypted messages. In this paper, we show that user can easily deceive the key recovery agency in the translucent cryptography. Then we propose the solution of this problem.

The Analysis of the TETRA Authentication Protocol (TETRA 인증 프로토콜 분석)

  • Park Yong-Seok;Ahn Jae-Hwan;Jung Chang-Ho;Ahn Joung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1070-1075
    • /
    • 2006
  • TETRA system provides the radio authentication service which permits only authorized radio to access network. Radio authentication is the process which checks the sameness of authentication-key(K) shared between radio and authentication center by challenge-response protocol. TETRA standard authentication protocol can prevent the clone radio to copy ISSI from accessing network, but can't prevent the clone radio to copy ISSI & authentication-key. This paper analyzes authentication-key generation/delivery/infection model in TETRA authentication system and analyzes the threat of clone radio caused by authentication-key exposure. Finally we propose the new authentication protocol which prevent the clone radio to copy ISSI & authentication-key from accessing network.

A Study on the Improvement of Defect Information Management System of Apartment House (공동주택의 하자정보관리시스템 개선을 위한 연구)

  • Jang, Hyo-Sung;Seo, Chee-Ho
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.2
    • /
    • pp.115-123
    • /
    • 2010
  • Defects in apartments, which are one of the major residential types in Korea,produce unexpected inconvenience for their owners. If construction companiespaid more careful attention to the management of defect information, manydefects could be prevented. In this context, this study attempted to derive an improved defect information management system. First, research into cases of defects that were caused by weaknesses in the defect information management system were advanced to confirm the necessity of improving the defect information management system, and as the next step, a survey was conducted to identify problems with the current defect information management system, and the requirements of animproved system. In conclusion, an improved defect information management system will contribute to preventing defects in apartments in Korea.

A Study on the Stress Simulation for the Body Design of a PFA-lined Plug Valve (PFA 라이닝 플러그 밸브 설계를 위한 밸브 본체의 응력 시뮬레이션)

  • Kang, Shin-Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.500-506
    • /
    • 2009
  • This study, is aimed to support the valve design engineer by a CAE simulation on the body of a PFA-lined plug valve, and focuses on static stress analysis, location of the weak point on bending and stiffness of the valve body. To determine whether the valve body can resist being transformed by loads, 1 simulated the stress distribution using CAD/CAE softwares. The 'step' file converted by CAD software after solid modeling is imported to the CAE software. Through simulation procedure, it is shown that the designed-solid-model fur a valve body has stiffness on bending and torsion but has weakness for side bending moment. Also, it is expected that the valve design engineer will understand the basic process of CAE and will be able to apply on his task.

A Study on Promoting the Disaster Safety Consciousness of the Rural Residents Against the Storm and Flood (풍수해 대비 농촌 주민 재난안전 의식 고취를 위한 연구)

  • Park, Miri;Lee, Young Kune
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.94-94
    • /
    • 2018
  • 풍수해로부터 안전한 지역사회를 만들기 위해서는 국가적인 대책과 함께 지역내 사회구성원이 풍수해에 대한 사전대비의 중요성 인식과 피해를 최소화 시켜야한다는 사회적 인식이 강화되어야 한다. 그러나 농촌의 경우, 지역 개발 정책이 우선순위에 있어 농촌의 풍수해 예방정책이 후순위에 있는 경우가 많다. 더욱이 농촌의 풍수해 피해는 유사한 지역에서 반복적으로 발생하는 유형을 가지고 있으며, 지리 지형적, 고령화 인구 비중 등 사회적으로 풍수해에 취약한 지역이다. 또한 농촌 주민들 또한 예방보다는 풍수해 발생 후 복구에 대한 대책이 풍수해 대책이라 생각하는 인식을 지니고 있다. 실제로 농촌주민의 안전 불감증은 인터뷰 및 설문조사를 통해 나타났으며, 재난 대책에 대해 이장 혹은 관공서 직원에게만 의존하는 등 풍수해대비에 대해 무지하고 낙관적인 태도를 지니고 있었다. 농촌 주민의 재난 대응에 대한 무지와 무관심등의 인식 변화를 고려하지 않은 채 구조적인 차원의 대응은 풍수해의 예방에 있어 한계성이 발생한다. 농촌의 재난에 대한 인식변화는 주민들의 구조 및 체제에 대한 태도를 변화하게 함으로 써 보다 실효성 있는 변화를 가능하게 한다. 그러나 현 재난 대책에서는 농촌 주민의 재난대책 등에 대한 의식의 반영이 미비하며, 수준에 대한 정확한 측정 또한 어려운 실정이다. 본 연구에서는 농촌주민의 재난안전 의식의 고취를 위해 현재의 주민의 재난안전 의식의 수준과 실태를 파악할 수 있는 측정도구를 모색하였다. 따라서 본 연구에서 개발된 측정도구를 통해 농촌 주민의 재난안전의식에 측정 결과에 따른 각각 개선방향이 도출되어 농촌의 풍수해 대비 재난 대책에 대한 실효성이 증가될 것으로 기대된다.

  • PDF

A Study on Social Exclusion Perception Type of the Juvenile Deliquents (비행청소년의 사회적 배제 인식유형에 관한 연구)

  • Shin, Geun Hwa
    • 한국사회정책
    • /
    • v.24 no.2
    • /
    • pp.127-155
    • /
    • 2017
  • The physical and psychological weaknesses of delinquent adolescents increase the possibility of socialization and the possibility of social exclusion. Therefore, this study aims to clarify the characteristics of the social exclusion through the Q methodology and to suggest policy and practical intervention directions. For this purpose, 36 statements about social exclusion were conducted through 15 prejudicial adolescents with the prior cooperation of the institution and the consent of the subjects. As a result of the analysis, four types were derived. Type 1 can be named as social disconnect type 'Type 2 is total type', type 3 is 'poverty type' and type 4 is 'service type'. Based on this, it can be said that the characteristics of social exclusion of juvenile delinquents are complexity, inclusivity, individuality, universality.