• Title/Summary/Keyword: 서비스 취약요소

Search Result 168, Processing Time 0.025 seconds

A Study on the Extension of the Description Elements for Audio-visual Archives (시청각기록물의 기술요소 확장에 관한 연구)

  • Nam, Young-Joon;Moon, Jung-Hyun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.4
    • /
    • pp.67-80
    • /
    • 2010
  • The output and usage rate of audio-visual materials have sharply increased as the information industry advances and diverse archives became available. However, the awareness of the audio-visual archives are more of a separate record with collateral value. The organizations that hold these materials have very weak system of the various areas such as the categories and archiving methods. Moreover, the management system varies among the organizations, so the users face difficulty retrieving and utilizing the audio-visual materials. Thus, this study examined the feasibility of the synchronized management of audio-visual archives by comparing the descriptive elements of the audio-visual archives in internal key agencies. The study thereby examines the feasibility of the metadata element of the organizations and that of synchronized management to propose the effect of the use of management, retrieval and service of efficient AV materials. The study also proposes the improvement of descriptive element of metadata.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

A Study on Everyday Life Information Seeking and User Experience of Public Library in Contactless Society (비대면 시대의 지식정보취약계층 일상생활 정보요구와 도서관 이용 경험에 관한 연구)

  • Lee, Jungyeoun;Kim, Hyunae
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.223-246
    • /
    • 2021
  • Based on the Everyday Information Seeking Behavior Theory, this study investigates information activities and library experience of 66 elderly or people with disabilities in Autonomous District A. In addition, this study analyzes contextual circumstances of daily information activities through in-depth interviews with a subset of 11 people. Although community welfare centers provide basic welfare, the elderly and people with disabilities seek to learn and socialize in cultural welfare centers, particularly in libraries. This study shows that libraries can fulfill their top three of Maslow's hierarchy of needs: Self-Actualization, Esteem, and Love and Belonging. Specifically, digital literacy education has been identified to be highly demanded. They seek to distinguish correct online information and to socialize using digital technologies in this contactless society. This study proposes a detailed plan for public libraries to offer cultural and information welfare in order to reduce the information gap within the local communities.

An Implementation of the Security Service on Internet Mail System (인터넷 메일 시스템에서의 정보보호 서비스 구현)

  • 강명희;신효영;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.107-122
    • /
    • 1997
  • Most of the currently used electronic mail system has the threat of security such as illegal leak of message, forgery, uncertain identity, denial of sending and receiving, and so forth. The security for this system is not satisfied yet, thus we explore these problems. In this thesis, we implement the security services for internet mail system which cover the weakness for traditional mail system. This system provides not only security services which PEM and PGP provides (i.e message confidentiality, message integrity, originator authentication, non-repudiation of origin), but also message replay prevention. and non-denial of recipient using certification of contents. In addition, this system increases security of the digital signature by signing with signature block formatting on the creation of it. And it increases security of the digital enveloping by encrypting with encryption block formatting of message encryption key.

Pohang City Fire Vulnerable Area Prediction and Fire Damage Rating Measurement by Administrative District (포항시 화재 취약지역 예측 및 이에 따른 행정구역별 화재 피해 등급 측정)

  • Lim, Jung-Hoon;Kim, Heon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.166-176
    • /
    • 2021
  • Due to urbanization and industrialization, the importance of large-scale fire prevention, management and measures is increasing day by day. However, the fire site arrival rate in Golden Time, which is a factor that can minimize large-scale fire damage, of Pohang, a large city with a population of over 500,000, is relatively low. So additional fire fighting power deployment and infrastructure investment are required. However, as budget and manpower are limited, it is necessary to selectively deploy fire fighting power and invest in infrastructure. Therefore, this study attempted to present a fire damage rating that can compare the level of fire damage, which is an index that can help selectively provide fire fighting services in Pohang and make related decisions. For the index, the OD cost matrix was used to predict fire vulnerable areas with a high probability of increasing the fire scale in the event of a fire. Also fire damage was measured by predicting the level of fire damage in the event of a fire according to population, building density, and access of fire trucks. It is expected that the fire damage rating will be able to help in various decisions related to fire fighting service deployment and services not only in Pohang city, but also in other regions.

A Study on the Development of the Tourism Information Service based on a Service Science - Focus on Using VWORLD - (서비스 사이언스에 기반을 둔 관광정보 서비스 개발에 관한 연구 - VWORLD 활용을 중심으로 -)

  • Oh, Myung Woo;Kim, Hyung June;Koh, Junehwan
    • Spatial Information Research
    • /
    • v.21 no.1
    • /
    • pp.23-36
    • /
    • 2013
  • Recently, the VWORLD was built to ensure competition on the advance of domestic enterprise into foreign markets with rapid expansion of spatial information industry of the world. However, the policy to secure user is insufficient because the VWORLD's service is embryonic stages. Then again, tourist industry is growing rapidly and leading the world economy and number of domestic tourists are also steadily increasing. Although the size was expanded, Korean tourist industry's competition is relatively weak, so some scholars insist that raising the tourist industry's quality. This backgrounds make a study of the tourism information service. So, this paper progressed a study on the development of the tourism information service based on a service science and used VWORLD as a test model. This paper drew the customer's demands on the tourism information service and strategic points of the development from those by using a Quality Function of Deployment of service science's new service development methodologies. After that this study prioritized those strategic points. As a result, 'Face Map' that is a service model was made. Moreover, this study have try to raise the development's effectiveness and efficiency based on service science's a new service development process.

A Study on Secure Data Access Control in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 데이터 접근 제어에 관한 연구)

  • Kim, Si-Jung;Yeo, Sang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.317-322
    • /
    • 2013
  • Mobile cloud environment is recently becoming popular due to Internet access through various environments. Driven by computer performance improvement and service development, the demand for mobile cloud is increasing and accordingly the damage is on the rise. Therefore, it needs to conduct a study on problems of security necessary in large database that occurs in mobile cloud services. Although various security solutions limiting database access, security strategies about new user environments should be analyzed. This study analyzes weakness of safe data access through database management in mobile cloud environment and examines security requirements for safe data management. In addition, this study looks into threatening factors of security in cloud services and then draws security requirements about safer access control. A study on system application and evaluation of security requirements about access control is required.

A Study on Residents' Attitude Toward the Development and Management of Jirisan Dulegil (지리산둘레길 조성과 운영 관련 지역주민 태도에 관한 연구)

  • Yoo, Ki-Joon
    • Korean Journal of Environment and Ecology
    • /
    • v.28 no.3
    • /
    • pp.374-380
    • /
    • 2014
  • This study was conducted to provide baseline information which will be useful for managing the forest trails as the outdoor recreation facility. To investigate residents' attitudes toward the forest trail construction and use, a questionnaire survey was employed in Jirisan Dulegil. As the results, 4 impact factors that are influenced to local communities due to Jirisan Dulegil construction were resulted in. Most of the respondents perceived that the Jirisan Dulegil have positive impact economically on community growth. Contrastively, a negative perception existed in the environmental aspect. Local lodging industry was selected one of preference business models. In viewpoint of community business, a more professional and systematic approach to find appropriate business model is needed because of structural vulnerability of business.

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.

A Study on the Performance of VPN based on MPLS Networks (MPLS 망을 기반으로 하는 VPN의 성능에 관한 연구)

  • Shin, Tae-Sam;Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2007
  • In this paper we introduce the concept of MPLS-based VPN and propose a scheme for providing VPN services in MPLS networks. Furthermore, we design the control components and the operational procedures and evaluated the performance of traditional VPN implementation methods and MPLS-based VPN. In this scheme it is possible to solve several problems that IP-based VPN pertains via the allocation of VPN ID and virtual space without tunneling, thereby providing effective VPN services. In other words, the MPLS-based VPN scheme uses MPLS networking technology together with the PSTN which can achieve a perfect segregation of user traffic on per-customer basis in a physical link and can guarantee high reliability and security levels. Specially, in the perspective of customers, it can save networking facilities installation and maintenance costs considerably. On the contrary, it possesses some shortcomings in that its deployment tends to be restricted within an ISP's network boundary and it is vulnerable to external security break-ins when going through public networks such as the Internet due to its lack of data encryption capability.

  • PDF