• Title/Summary/Keyword: 운영자 인증기술

Search Result 61, Processing Time 0.026 seconds

Deriving Essential Security Requirements of IVN through Case Analysis (사례 분석을 통한 IVN의 필수 보안 요구사항 도출)

  • Song, Yun keun;Woo, Samuel;Lee, Jungho;Lee, You sik
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.2
    • /
    • pp.144-155
    • /
    • 2019
  • One of the issues of the automotive industry today is autonomous driving vehicles. In order to achieve level 3 or higher as defined by SAE International, harmonization of autonomous driving technology and connected technology is essential. Current vehicles have new features such as autonomous driving, which not only increases the number of electrical components, but also the amount and complexity of software. As a result, the attack surface, which is the access point of attack, is widening, and software security vulnerabilities are also increasing. However, the reality is that the essential security requirements for vehicles are not defined. In this paper, based on real attacks and vulnerability cases and trends, we identify the assets in the in-vehicle network and derive the threats. We also defined the security requirements and derived essential security requirements that should be applied at least to the safety of the vehicle occupant through risk analysis.

A Study of Training and Development for Employees of Private Employment Service Agency (민간고용서비스 종사자의 직업능력개발 지원 방안)

  • Lee, Young-Min
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.4 no.1
    • /
    • pp.132-139
    • /
    • 2012
  • In private employment service, providing employment information for job seeker and recruiter, providing information on job, job map, and providing vocational training and development have been paid attention. Particularly, it needs to train the employees, working at private employment service agencies. The purpose of the study was to examine the current trends of private employment service, service employees, and their training status. In the result, we suggest that it needs to manage the quality of service employees' qualification, to initiate the accreditation program for their expertise, and set up an institutions for training them. In addition, providing a program of supervision for employees, considering a set up of an mutual aid association among themselves, and developing specialized training programs.

  • PDF

College-bound Curriculum Developement for Training of Atomic Industry Technician (원자력산업 중견전문인력 양성을 위한 전문대학 교육과정 개발)

  • Lyu, Kwang-Yeul;Kim, Sung-Soo;Ahn, Sung-Min
    • Journal of radiological science and technology
    • /
    • v.28 no.1
    • /
    • pp.33-44
    • /
    • 2005
  • The objective of this study is to supply the good quality of experts the radiation industries in Korea and develop the major subject matter needed in the radiation industries and the curriculum in order to execute it for the variation of fields of employment at the department of radiation in the junior college and the development of the percentage of employment. In addition, this study is to improve the level of radiation experts engaged in the industries in quality, and it is to improve the social recognition of radiation rather negative now because of the development of radiation industry. As for the core results of this research, it was to suggest the detailed choice method curriculum proper to the service fields of radiation industries, but it may be subject to change due to each college's property and the educational objectives. From the result of this research above, it may be summed up as follows. First, as for the detailed curriculum by the service field, this study was to organize two subject matters: 1. the subject matter proper to the field of using the radiation, and 2. the subject matters proper to the safety control field of radiation. Second, as for the detailed curriculum by the pattern of industries, this study was to organize the four subject matters: 1. the subject matter needed in the manufactures, 2. the subject matter needed in the nondestructive testing industries, 3. the subject matter needed in the sales agencies, and 4. the subject matter needed in the laboratories. This study was to suggest the operational model about the curriculum in order to execute these subject matters. It could be executed as two methods below. First, one method is to execute the major systems by the medical field and industrial field in the third course at the department of radiation in the junior college now. Second, the other method is to make them specialize the industrial radiation in the Advanced Course(one year course) after the graduation of junior college. To operate these curricula successively it needs to assume the deeper research and the development of materials about the subject matters related to the nuclear radiation industries hereafter. In addition, it needs to solve the security of finance like the manpower of professor, space for practice, and the educational appliances, etc. needed in the operation of subject matters. Finally, the effect and result from the development or revision of college curriculum did not come out in a short time. It will require considerable time until the undergraduates at the department in the junior college finish a set of curriculum newly developed, and graduate the university, and can get the results while they engage in their works in the industrial sites. Accordingly, all the interested parties have to anticipate the results of this research with the patience in long-standing point of view. Also, this researcher considers it as it is willing to give them the continuous interest and support.

  • PDF

Design of Security Model for Service of Company Information (기업 정보화 서비스를 위한 보안 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.43-49
    • /
    • 2012
  • Recently, the safety of being processed in a corporate enterprise with a wide range of IT skills applied to the Corporate Affairs information services are increasing requirement. Businesses that are required by various IT corporate information technology services to companies that need to protect information being leaked to other companies, a security incident has been applied and is growing, but is lacking about how to respond to the protection of corporate information services. In this paper, the information that is important in the corporate authority by the user's access control model to reduce the number of security incidents such as information leakage and security services for enterprise informatization is proposed. The proposed model can be used in order to block the access of the users to access information managed by a central administrator role and the rights of users to access information any abnormality has been captured. In addition, the proposed model can take advantage of protecting corporate information from the systematic recovery and operational continuity strategies to build your company's information services.

  • PDF

A Study on Improving the Quality of General Education at an Engineering College - Hongik University, College of Science and Technology - (공과대학의 소양교육 개선 방안 연구 - 홍익대학교 과학기술대학을 중심으로 -)

  • Baek Hyun-Deok;Park Jin-Won;Sim Soo-Man;Shin Pan-Seok
    • Journal of Engineering Education Research
    • /
    • v.8 no.1
    • /
    • pp.84-98
    • /
    • 2005
  • This study is on improving the general engineering education for enhancing the quality of engineers at a local engineering school in which the students are not highly qualified for engineering education. Based on the analysis on the current engineering education by asking questions to professors, students and alumni of Hongik College of Science and Engineering, we have set the basic educational philosophy as educating practical engineers and have decided the goals of basic engineering education as changing to student oriented education, enhancing the field adaptation capability, improving the problem solving ability and introducing engineering design courses. For achieving the foregoing goals, we have changed several basic engineering courses. Mathematics, science courses, computer related courses, English, communication skill related courses are strengthened, but general college education courses are reduced. We also have encouraged students to participate the classes actively and study efficiently, think logically and creatively. For the operational details, we have tried to impose less courses to freshmen and sophomores, to impose the prerequisite courses, to activate summer and winter schools. Finally, we have tried to find the ways to support continuous improvement on the basic engineering education.

NextAuction: A DID-based Robust Auction Service for Digital Contents

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.115-124
    • /
    • 2022
  • In this paper, we present an NFT auction service for the next generation, named NextAuction, which can reliably trade ownership of individual content using DID technology. Recently, as the types and sizes of tradable digital assets have expanded, the number of NFT transactions has also increased, and a significant number of marketplaces are being operated. But, the current user authentication methods of NFT marketplaces are done only through the associated blockchain wallets. It is desirable that ownership transfer through NFT transactions be transparently managed based on a more reliable identity authentication service. NextAuction increases the reliability of auction service participants by transparently and consistently providing identity authentication for users of auction services based on the DID technique using the Klaytn blockchain. In addition, in preparation for server failure that may occur during the auction of individual content, it provides users with a robust auction service using the BR2K technique that continuously provides consistent service through the replication of a target service. The NextAuction service is developed by extending BCON, a blockchain-based content management service.

A Study on Response System of Marine Pollution Accident by Chemicals in United States (화학물질 해양오염사고에 대한 미국의 방제체제 연구)

  • Choi, Jong-Wook;Lee, Seung-Hwan
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2007.11a
    • /
    • pp.61-67
    • /
    • 2007
  • With an entering into force of OPRC-HNS started in June 14th 2007, establishment of response system in a nationwide scale to take care of accidents is required to respond rapidly and effectively. This necessities drove us to analyze national contingency plan for chemicals including national response system against accidents, which is in operation in the US. Main characteristics of the system are well described as an integrated incident command system with a cooperation of responsibilities facilities, manpower, and technical support. In addition, state anψor local authorities tend to have responsibilities on management of disaster with its response activities. Polluters are also charged to pay expenses 3 times expensive provided state or local authorities are conducted. In general, response activities are conducted by private sectors. However, the government will take action with Superfund if the response capacity is over than the polluters can. However, safety are regarded as a primary factor to be considered in the response activities, and try not to recover any pollutants. Personals belonging to USCG and EPA are required to complete specialized courses to promαe professional skills, and are also welcomed to participate in "certification program"

  • PDF

Developing an Endangered Species Habitat Management System based on Location Information (위치정보 기반 멸종위기종 서식지 관리시스템 개발)

  • Kim, Sun-Jib;Kim, Sang-hyup
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.67-73
    • /
    • 2020
  • The research status of endangered amphibians in Korea was mainly studied the life-cycle and distribution status of species from the 1980s to the early 2000s. Although a relatively diverse range of studies have been conducted on mackerels, studies on habitat prediction, analysis, change and management are insufficient. WEB, which provides biota information using location information in Korea, is a site operated by the National Bio Resource Center under the Ministry of Environment, but there is no information on endangered species and general species information has also been found to be very scantily. For this research, we secured a database of location information of Narrow-mouth frog, an endangered species, by combining literature and field research, and established a system by applying new technologies and open-based platform technologies that can be easily accessed by non-technical personnel of IT among IT technologies. The system was divided into administrator functions and user functions to prevent indiscriminate sharing of information through authentication procedures through user membership of users. The established system was authorized to show the distance between the current location and the location of the Narrow-mouth frog. Considering the ecological characteristics of the Narrow-mouth frog, which is an endangered species, a radius of 500m was marked to determine the habitat range. The system is expected to be applied to the legal system to change existing protected areas, etc. and to select new ones. It is estimated that practical reduction measures can be derived by utilizing the development plan for reviewing the natural environment. In addition, the deployed system has the advantage of being able to apply to a wide variety of endangered species by modifying the information entered.

A Case Study on the Linkage of Lifelong Education between Social Enterprises and the Vulnerable (사회적기업과 취약계층의 평생교육 연계에 관한 탐색적 사례연구)

  • Lee, Hyo-Young;Han, Sang-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.293-303
    • /
    • 2017
  • Thus study examined the possible the link between social enterprises and lifelong education for the underprivileged. To this end, this study searched for the definition and position of social enterprises emerging from the welfare system under the influence of neoliberalism and overcoming the problems in terms of creating social jobs and providing welfare services. In addition, the lifelong education for the underprivileged was examined according to the subjects, such as the disabled, migrant women, young and adult low-income group, and senior citizens. The plan was as follows. First, the expansion of the proportion of community-affiliated social enterprises was analyzed. Second, it provides a differentiated support and protection market for social enterprise. Third, the development and dissemination of social entrepreneur training programs was examined. The results showed that the entire society should have a sense of responsibility for the support of the underprivileged. This provides implications for the linkage of lifelong education and social enterprise in the expansion possibility to improve the quality of life and expand lifelong education for the underprivileged.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF