• Title/Summary/Keyword: 사전 인증

Search Result 265, Processing Time 0.028 seconds

A Study of Network Forensics related to Internet Criminal at UCC (UCC와 관련된 인터넷 범죄에 대한 네트워크 포렌식 연구)

  • Lee, Gyu-An;Park, Dea-Woo;Shin, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.143-151
    • /
    • 2008
  • 74% of Internet users use the UCC, and You Tube using firearms in a crime occurred. Internet crime occurred in the online, non-face transaction, anonymous, encapsulation. In this paper, we are studied a Network Forensic Way and a technique analyze an aspect criminal the Internet haying appeared at Internet UCC, and to chase. Study ID, IP back-tracking and position chase through corroborative facts collections of the UCC which used UCC search way study of the police and a public prosecutor and storage way and network forensic related to crimes of Internet UCC. Proof data encrypt, and store, and study through approach control and user authentication so that they are adopted to legal proof data through integrity verification after transmission and storages. This research via the Internet and criminal conspiracy to block the advance promotion, and for the criminal investigative agencies of the Internet will contribute to the advancement forensics research.

  • PDF

A Study on Performance Evaluation and Security Measures of U-IT Electrical Safety Integrated Management System's Module (U-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dea-Woo;Choi, Choung-Moon;Kim, Eung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.307-310
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. U-City in order to prevent the disaster of U-IT Power Equipment Performance Module and the security for the safety of the U-City is necessary. In this paper, the power unit of U-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation and security measures will be studied. U-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as U-IT integrated management system for electrical safety and strengthen the security, safety and security with a U-City will contribute to the construction and operation.

  • PDF

A Study on the Deduction of Domestic BIPV Definition Revision Plan through Expert Delphi Survey (전문가 델파이 조사를 통한 국내 BIPV 정의 개정 방안 도출에 관한 연구)

  • Park, Seung-Joon;Oh, Choong-Hyun
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.75-86
    • /
    • 2021
  • Recently, the domestic BIPV market is expected to revitalize with the introduction of the "zero-energy building certification system(2020~)", but it is somewhat stagnant due to the rigidity of definitions in the current domestic BIPV construction standards. Also, since there is delaying revision on definition and standardization of BIPV, the system is so weak that there are cases where it has been approved as BIPV simply by installing a structure on the wall and fixing the module roughly. The damage caused by this can be passed on to consumers, and it can only create a negative perception of BIPV and jeopardize the entire market. The BIPV definition was prepared through a Delphi survey of related experts about market stagnant cause, unreasonable regulation, etc, and a revised plan was derived accordingly.

Verification of Control System Algorithms for Compressed Gas Supply Facility in Launch Complex (발사대 고압가스공급설비 제어시스템 알고리즘 검증)

  • An, Jae-Chel;Moon, Kyung-Rok;Oh, Il-Seok
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.23 no.2
    • /
    • pp.95-103
    • /
    • 2019
  • Control systems of compressed gas supply facility are responsible for storing and supplying compressed gases required for launch complex qualification test and launch operation. Most of the facilities that make up the launch complex require compressed gas for their operation. Therefore, such control systems should be developed and verified earlier rather than the other systems that constitute the launch complex. Each verification for hardware and software is performed separately. In particular, software verification of control algorithms loaded on the controller takes a lot of time and man power during the development period of the control system. Thus, specific test procedures and methods should be prepared in advance for efficient development. This paper introduces the configuration of a compressed gas supply facility and its control system with the verification procedure and results of major algorithms.

The Improvement Plan of the Individual Information Protection of the Law on the Development of Cloud Computing and User Protection (클라우드 컴퓨팅 발전 및 이용자 보호에 관한 법률상 개인정보 보호에 대한 개선방안)

  • Lee, Hie-Houn
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.219-225
    • /
    • 2019
  • Today, in the era of the 4th Industrial Revolution, the cloud computing sector has advantages for cost reduction and efficiency of work, but problems related to privacy may arise. Therefore, the law on the development of cloud computing and user protection should be improved to enable providers of cloud computing services to proactively identify whether or not they contain their personal information, or to take steps to protect their privacy. And this same law is desirable to improve the implementation of a national mandatory certification system for privacy protection systems for cloud computing businesses. This same law is also desirable that cloud computing service providers create direct accountability for privacy breaches and appropriate scope for those responsibilities.

Anomaly Detection System of Smart Farm ICT Device (스마트팜 ICT기기의 이상탐지 시스템)

  • Choi, Hwi-Min;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.169-174
    • /
    • 2019
  • This paper propose a system to notify the user that detects failure of malfunction of smart farm ICT devices. As the fourth industrial revolution approaches, agriculture is also fused with ICT technology to improve competitiveness. Smart farming market is rapidly growing every year, but there is still a lack of standardization and certification systems. Especially, smart farm devices that are widely used in Korea are different in product specifications, software and hardware are developed separately, and quality and compatibility are poor. Therefore, a system that can recognize the abnormality of the equipment due to the frequent damage of farmers using low cost smart farm equipment is needed. In this paper, we review smart farm domestic and overseas policy trends and domestic smart agriculture trends, analyze smart farm failure or malfunctions and proactively prevent them, and propose a system to inform users when problems occur.

Industrialization of Jeju Plant Resources (제주 자원식물의 산업소재화)

  • Jung, Yong-Hwan
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2019.10a
    • /
    • pp.4-4
    • /
    • 2019
  • 과학기술의 발달로 인해 국민의 생활수준 향상과 건강에 대한 관심 증대 등으로 인해 화장품을 비롯한 향장품산업, 기능성식품 및 천연물 신약 등에 대한 자원식물 유래 천연물질 수요가 증가되고 있다. 자원식물을 활용한 기능성 제품의 개발은 국민의 건강증진 뿐만 아니라 국제경쟁력 강화나 윤택한 삶의 추구에도 절대적 역할을 할 것으로 기대되고 있으며, 이러한 수요에 따라 제주의 특산 또는 우수 자원식물을 활용한 생리활성 물질에 대한 연구들이 활발하게 진행되고 있다. 우리나라에 자생하는 관속식물은 총 4,500여 종으로 국가생물종목록에 작성되어 있으며 제주의 생물자원 중 관속식물은 해발 1,950m 한라산의 영향으로 2,200여 종이 분포한다고 최근 기록되고 있다. 이 중 식용 및 약용으로 활용 가능성을 갖고 있는 식물자원들도 약 800여 종이 분포한다고 보고되고 있다. 이들 자원은 대한약전, 생약규격집, 중약본초, 중약대사전 등 문헌에 근거한 자원으로 공정서에 수록된 약용식물 약 500여 종 중 제주 분포 약용식물도 217종으로 조사되고 있다. 이러한 제주의 약용식물 자원은 다양한 한의약재로 활용되고 있으며 민간약으로 활용되는 약용식물도 170여 종이 포함되어 있다. 특히, 최근에는 나고야의정서 발효에 따른 자원전쟁이 시작되어 자원식물을 포함한 생물자원 관리의 중요성이 그 어느 때보다 부각되고 있어 각 지역마다 자생 생물자원에 대한 주권을 확보하기 위한 연구들이 많이 추진되고 있다. 이와 더불어 지자체연구소인 생물종다양성연구소에서도 제주에 분포하는 자원식물들에 대한 주권 확립을 위한 생태사진 900여 종, 표본 1,400여 종, 유전자 정보 800여 종 등을 확보하고 있으며 추출물 2,000점을 확보하여 산업소재화 연구를 추진하고 있다. 저자는 여기에 제주의 자원식물을 활용하여 화장품 원료등재, 건강기능식품개별인증 소재 및 천연의약품 소재 등 산업소재화 연구를 수행했었던 생물종다양성연구소의 연구 결과를 소개함으로써 유사한 목적으로 연구를 수행하는 대학, 연구소 및 기업으로의 정보를 제공하여 제주의 자원식물을 활용한 산업소재화 분야에 작은 도움이나마 제공하고자 한다.

  • PDF

Improvement Plan for Public Institution Remote Security Model in the New-Normal Era (뉴노멀 시대의 공공기관 원격보안 모델 개선방안)

  • Shin, SeungWoo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.104-112
    • /
    • 2022
  • The pandemic caused by the COVID-19 virus, which has lasted for the past three years, has changed society and the way people live in many ways. These changes also affect cyberspace, so the pre-pandemic information security model and standards have limitations when applied to the current situation. In this paper, a new method to improve the information security model of public institutions was proposed in consideration of various situations in the new normal era. In other words, through the proposed information security model, the possibility of external intrusion is blocked in advance through the policy and technical supplementation of remote work, which is a weakness of the existing information security operation of public institutions. Also, how to prevent abnormal authentication attempts by building a secure VPN environment, how to prevent social engineering cyber attacks targeting fear and uncertainty caused by COVID-19, and how to use a smooth network and create a remote work environment. For this purpose, methods for securing service availability were additionally presented.

Designing a Healthcare Service Model for IoB Environments (IoB 환경을 위한 헬스케어 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Digital Policy
    • /
    • v.1 no.1
    • /
    • pp.15-20
    • /
    • 2022
  • Recently, the healthcare field is trying to develop a model that can improve service quality by reflecting the requirements of various industrial fields. In this paper, we propose an Internet of Behavior (IoB) environment model that can process users' healthcare information in real time in a 5G environment to improve healthcare services. The purpose of the proposed model is to analyze the user's healthcare information through deep learning and then check the health status in real time. In this case, the biometric information of the user is transmitted through communication equipment attached to the portable medical equipment, and user authentication is performed through information previously input to the attached IoB device. The difference from the existing IoT healthcare service is that it analyzes the user's habits and behavior patterns and converts them into digital data, and it can induce user-specific behaviors to improve the user's healthcare service based on the collected data.

A Study on DB Security Problem Improvement of DB Masking by Security Grade (DB 보안의 문제점 개선을 위한 보안등급별 Masking 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.101-109
    • /
    • 2009
  • An encryption module is equipped basically at 8i version ideal of Oracle DBMS, encryption module, but a performance decrease is caused, and users are restrictive. We analyze problem of DB security by technology by circles at this paper whether or not there is an index search, object management disorder, a serious DB performance decrease by encryption, real-time data encryption beauty whether or not there is data approach control beauty circular-based IP. And presentation does the comprehensive security Frame Work which utilized the DB Masking technique that is an alternative means technical encryption in order to improve availability of DB security. We use a virtual account, and set up a DB Masking basis by security grades as alternatives, we check advance user authentication and SQL inquiry approvals and integrity after the fact through virtual accounts, utilize to method as collect by an auditing log that an officer was able to do safely DB.