• Title/Summary/Keyword: 외부 정보 네트워크의 다양성

Search Result 84, Processing Time 0.031 seconds

The Design and Implimentation of Contents Monitoring System based on Web (웹 기반의 컨텐츠 감시 시스템 설계 및 구현)

  • Kim, Young-Sun;Oh, Sang-Yeob;Jang, Deog-Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05a
    • /
    • pp.51-54
    • /
    • 2003
  • 인터넷 사용이 보편화되면서 웹을 통한 광고, 사이버 쇼핑, 인터넷 뱅킹 등 다양한 서비스가 네트워크를 이용하여 제공되면서 웹 보안에 대한 필요성이 증가하고 있다. 또한, 시스템을 다양한 유형의 해킹 위협과 외부의 불법적인 침입으로부터 정보자산의 보호를 위한 감시시스템을 요구하게 된다. 본 논문의 웹 침입 탐지 도구는 웹에 대한 개별적인 모니터링을 통해 소요되는 자원 및 인력의 손실을 방지할 수 있도록 하여 보안 수준을 향상시켜는 것이다. 웹 감시 시스템은 웹 환경에서의 보안 취약성과 정보 노출에 대한 문제점의 원인을 분석하고 보안의 빠른 지원을 결정하기 위해서 모니터링을 이용하여 정보 보안 취약성과 정보 노출을 보호하는데 그 목적이 있다.

  • PDF

무선 홈 네트워킹 기술 표준화 동향 및 발전 전망

  • 전호인
    • Information and Communications Magazine
    • /
    • v.21 no.3
    • /
    • pp.13-40
    • /
    • 2004
  • 홈 네트워킹은 다양한 유ㆍ무선 네트워킹 기술을 적용하여 개개인의 생활을 더 윤택하게 해 주는 서비스를 제공하고 이를 통해 커다란 시장을 형성할 수 있는 미래의 신 성장 동력 산업이다. 이를 위해 PLC, IEEE 1394, HomePNA와 같은 유선 홈 네트워킹 기술은 물론 WLAN, WPAN, UWB 등과 같은 무선 네트워킹 기술이 여러 가지의 응용 분야를 무기로 자신의 영역을 차지하려 하고 있다. 따라서 댁내의 기기는 이와 같은 네트워킹 기술을 지원하도록 설계되어야 하지만, 그 위에 UPnP나 HAVi, Jini, HNCP 등과 같은 미들웨어가 탑재되어야 상호 호환성이 지원된다. 그리고 하나의 표준화된 H/W나 S/W 플랫폼 위에 혼 게이트웨이가 동작하면 집 외부에서 원격으로 새로운 서비스를 지원할 수 있게 되며 응용 분야가 다양하게 확장될 수 있다. 그 위에 유비퀴터스 네트워킹 개념을 도입하여 홈 네트워크가 필요로 하는 서비스를 지원함으로써 커다란 시장을 이끌어 갈 수 있게 된다. 본 논문에서는 홈 네트워킹 기술의 표준화 현황에 대해 정리하고, 차세대 성장 동력으로서의 홈 네트워킹을 위해 반드시 적용해야 할 유비퀴터스 네트워킹 개념과 이로부터 효과를 얻기 위해 집안에 홈 네트워크를 어떻게 수용하게 할 것인지에 대해 논하였다. 끝으로 유비퀴터스 네트리킹을 통한 막대한 시장을 먼저 확보하기 위한 무선 홈 네트워킹 기술의 아키텍처를 정하면서 이를 구현하기 위해 먼저 수행해야 할 Mesh Networking 기술 및 Multi-Hop 네트워킹 기술과 같은 연구분야에 대해 논하였다.(중략)

A study on Access Control Model for Home Network (홈 네트워크 접근 제어 모델에 관한 연구)

  • Kim, Geon-Woo;Kim, Do-Woo;Lee, Jun-Ho;Hwang, Jin-Beon;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.841-844
    • /
    • 2005
  • As various mobile technologies, sensor technologies, remote control and infrastructure are developing and expectations on quality of life are increasing, a lot of researches and developments on home network technologies and services are actively on going. Until now, we focused on how to provide users with high-level home network services, while not many researches on home network security for guaranteeing safety are progressing, So, in this paper, we propose an access control model for home network that provides various users with home network services up one's characteristics and features, and protects home network systems from illegal accesses or intrusions.

  • PDF

Security Criteria for Design and Evaluation of Secure Plant Data Network on Nuclear Power Plants (원전 계측제어계통의 안전 네트워크 설계 및 평가를 위한 보안 기준)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.2
    • /
    • pp.267-271
    • /
    • 2014
  • Nuclear power plant data networks and their associated safety systems are being modernized to include many information technology (IT) networks and applications. Along with the advancement of plant data networks (PDN), instrumentation and control systems are being upgraded with modern digital, microprocessor-based systems. However, nuclear PDN is confronted significant side-effects, which PDN is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in nuclear PDN. Consequently, it should be designed fully ensuring the PDN meet all reliability, performance and security requirements in order to overcome the disadvantages raised from adaption of IT technology. In this paper, we provide technical security criteria should be used in design and evaluation of secure PDN. It is believed PDN, which is designed and operated along with these technical security critera, effectively protect against possible outside cyber threats.

An Efficient Key Management Protocol for Wireless Sensor and Actor Networks (무선 센서 및 액터 네트워크를 위한 효율적인 키관리 프로토콜)

  • Kim, Wan-Ju;Nam, Kil-Hyun;Lee, Soo-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.540-544
    • /
    • 2007
  • Researches on Sensor Network has become much more active and is currently being applied to many different fields. However since sensor network is limited to only collecting and reporting information regarding a certain event, and requires human intervention with that given information, it is often difficult to react to an event or situation immediately and proactively. To overcome this kind of limitation, Wireless Sensor and Actor Networks (WSANs) with immediate-response Actor Nodes has been proposed which adds greater mobility and activity to exisiting sensor networks. Although WSANs shares many common grounds with sensor networks, it is difficult to apply exisiting security technologies due to the fact that WSAN contains Actor Nodes that are resource-independent and mobile. This research therefore seeks to demonstrate ways to provide security, integrity and authentication services for WSAN's secure operation, by separating networks into hierarchcial structure by each node's abilities and providing different encryption key-based secure protocols for each level of hierarchy: Pair-wise Key, Node Key, and Region Key for sensor levels, and Public Key for actor levels.

Home Gateway-based Home Network Access Control Mechanism (홈게이트웨이 기반 홈네트워크 접근제어 메커니즘)

  • Kim Geon-Woo;Kim Do-Woo;Lee Jun-Ho;Hwang Jin-Beon;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.733-736
    • /
    • 2006
  • As various mobile technologies, sensor technologies, remote control and network infrastructure are developing and expectations on quality of life are increasing, a lot of researches and developments on home network technologies and services are actively on going. Until now, home network is just beginning, and we are developing home network services necessary to users, incrementing easiness, however we need to research on the safety of home network system guaranteeing the easiness as the services are going actively. So, in this paper, we propose the access control mechanism for protecting the home network system against indoor/outdoor illegal accesses and unauthorized accesses.

  • PDF

An Exploratory Study on the Characteristics of a Solo Teacher Librarian's Personal Networks (1인 사서교사의 인적 네트워크 특성에 관한 탐색적 연구)

  • JaeYeon, Kang;Ji-Hong, Park
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.4
    • /
    • pp.215-239
    • /
    • 2022
  • Human networks can be an important means of solving various information problems including tacit knowledge, as an essential channel of knowledge sharing. Particularly, in the case of a teacher librarian(or librarian) of a school library composed of one person in the organization, the human networks for work can be more effective with people outside the organization who are in charge of the same duties than with members inside the organization. Thus, this study aims at exploring the characteristics of the personal networks related to the work of teacher librarians and understanding the effect of these network characteristics on job satisfaction and role ambiguity resolution. A survey was conducted on one of the teacher librarian associations in Seoul, and the collected data were analyzed using social network analysis(SNA) method. As a result, it was found that personal networking of teacher librarians is active in experienced teacher librarians, while those with shorter career have fewer channels of help-seeking. Also, the characteristics of personal networking do not affect job satisfaction and the resolution of role ambiguity. Based on these results, this study proposes the expansion of collaborating and networking among teacher librarians to solve information problems in a single-person workplace.

An Analysis of Security Problem against Wireless Network in Smartphone (스마트폰 상에서 무선 네트워크 보안 문제점 분석)

  • Kim, Ki-Hawn;Lee, Young Sil;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.383-386
    • /
    • 2014
  • Due to the development of communication technology, a conventional major business through PC, laptop or Tablet PC can be performed via a smartphone and it is increasing the user's convenience. At this point, the user prefers to connect to the Internet using the wireless network because it occurs an additional charge according to the amount of data to be transmitted when using a data communication through 3G or 4G. However, when using a wireless network, there is a possibility of several attacks such as easily steal or modulate the information from the outside or to gain access to personal information stored in the user's smartphone with man-in-the-middle attacks by using the fake AP. IIn this paper, we describe how you can detect the AP when you use LAN of the smartphone, were analyzed for this vulnerability, has not been approved. Furthermore, Also, we discuss ways which can enhance the security when user the access to the internet services (i.e., internet, public/private cloud service, etc.) via wireless network in smartphone.

  • PDF

A Study on the Development of One-way Bypass TAP Device for Strengthening the Security of Flood and Environment Surveillance Network (홍수 및 환경 감시망의 보안성 강화를 위한 단방향 Bypass TAP 장치 개발에 관한 연구)

  • Lee, Jin-Young;Kong, Heon-Tag
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.473-481
    • /
    • 2015
  • The flood and environment surveillance network on riverside is a network requiring a way to efficiently manage the information from all kinds of sensors, along with an optical communication device that can deliver high-quality video information at high speed. Since on-site prompt recovery is very important especially for communication problems that occurred due to cut-off or aged network, various researches have been carried out on this. However, because the security against outside hacking or outside intrusion with illegal purposes is very important for environment surveillance network, such as the national backbone network, an efficient network maintenance and repair should be enabled while satisfying security and reliability at the same time. A characteristic of requirement is that when security is improved, the efficiency of maintenance and repair drops as they are conflicting to each other. Therefore, this research proposed a system in order to satisfy the conflicting requirement and improve security, by developing a one-way Bypass TAP and an android-based smartphone app that can enable efficient network maintenance and repair.

A study on the method of linking heterogeneous data between collection systems (수집 시스템간의 이기종 데이터 연계 방법 연구)

  • Park, Min-woo;Shim, Hyeong-seop
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.585-586
    • /
    • 2022
  • 사회현안을 해결하기 위한 데이터 분석을 위해서는 많은 양의 데이터 수집과 데이터 분석에 활용할 수 있도록 데이터 전처리가 필요하다. 많은 양의 데이터를 수집 및 처리를 위해 데이터 수집, 데이터 저장, 활용 시스템이 기능적으로 분리하여 시스템을 구성하고, 이에 따른 시스템간의 데이터 상호 연계가 필요하게 된다. 또한 외부 네트워크에 구성되어 있는 시스템간의 데이터 연계나, OpenAPI와 같이 다양한 데이터 서비스에서도 적용이 가능할 수 있도록 확장성과 유연성을 고려할 필요가 있다. 본 논문에서는 부산 지역현안 해결을 위한 시스템 구성에 있어, 확장성을 고려한 데이터 수집 시스템간의 효율적인 데이터 연계 방법을 제안하고자 한다.

  • PDF