• Title/Summary/Keyword: 위치정보 보호

Search Result 590, Processing Time 0.024 seconds

Presidential Archives Management in Crisis - An Archival Approach to the Solutions - (위기에 처한 대통령기록물관리, 문제의 인식과 해결을 위한 접근 방식)

  • Lee, Sang-Min
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.281-315
    • /
    • 2008
  • This paper reviews recent records issues surrounding former president Roh Moo-Hyun's private possession of the copies of the presidential records in Korea. While the former president transferred his records to the National Archives of Korea, he copied his electronic presidential records and kept them in his house after the term. His retention of the "records copies" arouse critical records issues and criminal charges. In this paper, I examined the definition of presidential records and legal status of records copies, authenticity of electronic copies of public records in public and private records systems, nature and scope of presidential privilege of access to his records, and most importantly, political neutrality of national archives. I examined these issues comparing with foreign experience, especially that of the United States which has the Presidential Records Act like Korea. All issues are examined in the professional spirit of archives principles and archives ethics. Legal status of the electronic copies of presidential records is not firmly established and the criminal charge seems groundless. However, it is against public archives principles and ethics that private former president privately possesses and manages private information and national security information held in the electronic copies of the presidential records. Presidential Records Act of Korea provides an effective tool to protect the presidential records for 15 years and it should be respected. It is time to consolidate the public records management institutions in Korea, not to disintegrate them.

A Study on Creation of Secure Storage Area and Access Control to Protect Data from Unspecified Threats (불특정 위협으로부터 데이터를 보호하기 위한 보안 저장 영역의 생성 및 접근 제어에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.897-903
    • /
    • 2021
  • Purpose: Recently, ransomware damage that encrypts victim's data through hacking and demands money in exchange for releasing it is increasing domestically and internationally. Accordingly, research and development on various response technologies and solutions are in progress. Method: A secure storage area and a general storage area were created in the same virtual environment, and the sample data was saved by registering the access process. In order to check whether the stored sample data is infringed, the ransomware sample was executed and the hash function of the sample data was checked to see if it was infringed. The access control performance checked whether the sample data was accessed through the same name and storage location as the registered access process. Result: As a result of the experiment, the sample data in the secure storage area maintained data integrity from ransomware and unauthorized processes. Conclusion: Through this study, the creation of a secure storage area and the whitelist-based access control method are evaluated as suitable as a method to protect important data, and it is possible to provide a more secure computing environment through future technology scalability and convergence with existing solutions.

How to Neutralize China's Advanteges in a South China Sea Conflict for the U.S. Navy and Its Implications for Republic of Korea Navy (남중국해 분쟁 관련 미국 해군의 제한사항과 극복방안, 한국 해군에의 함의)

  • Kim, Tae-Sung
    • Strategy21
    • /
    • s.46
    • /
    • pp.277-303
    • /
    • 2020
  • 2000년 이후 중국 해군은 빠르게 성장하고 있고 이러한 해군의 성장과 더불어 중국은 남중국해 내 도서를 군사기지화 하고 대함 미사일을 개발하고 있다. 이는 제1도련선 내 중국의 해양통제를 위한 노력으로써 인도-태평양 지역 내 미 해군 전력 및 기지에 심각한 위협으로 작용하여 미국의 해양 지배력을 약화시키는데 기여하고 있다. 이를 극복하기 위해서 미국은 인도-태평양 지역내 동맹국과 파트너국들과 함께 시간, 공간, 전력(화력, 군수) 측면에서 작전개념을 발전시켜야 한다. 우선 시간적인 측면에서 중국의 위협에 신속하게 대응하기 위해서 인도-태평양 지역내 국가들의 공중전력(UAVs)과 해상전력(Aegis ships)을 활용하여 대중 정보공유 체계를 강화시켜야 한다. 다음으로 공간적인 측면에서 중국의 위협으로터 인도-태평양 지역 내 미해군의 전력 및 기지를 보호하기 위해서 미 해군 전력을 일본과 호주로 분산 배치시키고 동맹국과 파트너국들의 이지스함, 잠수함 및 무인 수중전력을 적극 활용해야 한다. 전력 측면에서는 해상 기반 화력과 지상 기반 화력을 통합하여 화력의 치명성을 강화해야 하고 인도와의 협력 및 인도-태평양 지역내 함정 손상통제 시설의 확충을 통해서 해상 군수지원 능력을 발전시켜야 한다. 이러한 미 해군의 작전개념 발전 방향이 주는 한국 해군에의 함의는 다음과 같다. 첫째, 미·중간 남중국해 분쟁 발생시 중국의 미사일 위협으로부터 한국 내 위치하고 있는 한·미 해군 전력 보호를 위해 미사일 방어체계(이지스함, 사드 등)를 발전시켜야 한다. 둘째, 대중 감시·정찰 및 미 항공모함단 방호 전력으로 활용 가능한 한국형 원자력 잠수함을 개발해야 한다. 셋째, 미국 뿐만 아니라 인도-태평양 지역내 파트너 국가들을 포함하는 연합훈련을 확대·발전시킴으로써 남중국해내 중국의 해양통제 노력에 대응해야 한다. 넷째, 인명손실을 최소화하고 효율적으로 해군력을 현시할 수 있는 무인 수중·수상체계를 지속적으로 발전시켜 나가야 한다.

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

A Threat Assessment Algorithm for Multiple Ground Targets (다수의 대지표적을 위한 위협 평가 알고리즘)

  • Yoon, Moonhyung;Park, Junho;Yi, JeongHoon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.590-599
    • /
    • 2018
  • As a basic information to implement the fire plan that dominates multiple targets effectively under the battle environment with limited resources, such a process is mandatory that gives a priority order to a target with the high level of threat by quantitatively computing the threat level of an individual target through the analysis on the target. However, the study has still remained in the initial level on an evaluation algorithm for the threat level of the ground target. Considering this fact, the present paper proposes the evaluation algorithm for the threat by multiple ground targets. The proposed algorithm has a core point to consider the type of target and protected asset to implement the computation of proximity; set the additional value based on the weights indicating the significance of weapon and protected asset; and compute the threat level of a target that considers the characteristics of the target. The evaluation and verification of performances have been implemented through the simulation and visualization of an algorithm proposed in the present paper. From the performance result, as the proposed algorithm has been able to perform effectively the threat assessment according to the weights indicating the significance of weapons and protected assets under diverse environments where weapons and protected assets are located, high utility and effect are expected when applied to an actual ground weapon system.

Gabor Wavelet Analysis for Face Recognition in Medical Asset Protection (의료자산보호에서 얼굴인식을 위한 가보 웨이블릿 분석)

  • Jun, In-Ja;Chung, Kyung-Yong;Lee, Young-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.10-18
    • /
    • 2011
  • Medical asset protection is important in each medical institution especially because of the law on private medical record protection and face recognition for this protection is one of the most interesting and challenging problems. In recognizing human faces, the distortion of face images can be caused by the change of pose, illumination, expressions and scale. It is difficult to recognize faces due to the locations of lights and the directions of lights. In order to overcome those problems, this paper presents an analysis of coefficients of Gabor wavelets, kernel decision, feature point, size of kernel, for face recognition in CCTV surveillance. The proposed method consists of analyses. The first analysis is to select of the kernel from images, the second is an coefficient analysis for kernel sizes and the last is the measure of changes in garbo kernel sizes according to the change of image sizes. Face recognitions are processed using the coefficients of experiment results and success rate is 97.3%. Ultimately, this paper suggests empirical application to verify the adequacy and the validity with the proposed method. Accordingly, the satisfaction and the quality of services will be improved in the face recognition area.

Packet loss pattern modeling of cdma2000 mobile Internet channel for network-adaptive multimedia service (cdma2000 통신망에서 적응적인 멀티미디어 서비스를 위한 패킷 손실 모델링)

  • Suh Won-Bum;Park Sung-Hee;Suh Doug-Young;Shin Ji-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.52-63
    • /
    • 2004
  • Packet loss process of cdma2000 mobile Internet channel deployed in Korea is modeled as a two state Markov process known as Gilbert model. This paper proposes the procedures to derive four parameters of the our modified Gilbert model from packet loss trace taken from two major cdma2000 networks in Korea. These four parameters are derived in various situations, that is, with fixed and moving terminals, in open field and urban areas. They can be used to produce synthetic packet loss patterns for study of the channel. Moreover, if they are calculated on-line during multimedia service, they can be used to make loss protection controls adaptive to network condition.

Digital Watermarking Technique in Wavelet Domain for Protecting Copyright of Contents (컨텐츠의 저작권 보호를 위한 DWT영역에서의 디지털 워터마킹 기법)

  • Seo, Young-Ho;Choi, Hyun-Jun;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1409-1415
    • /
    • 2010
  • In this paper we proposed the watermarking technique using the markspace which is selected by tree-structure between the subbands in the wavelet domain and feature information in the spatial domain. The watermarking candidate region in the wavelet domain is obtained by the markspace selection algorithm divides the highest frequency subband to several segments and calculates theirs energy and the averages value of the total energy of the subband. Also the markspace of the spatial domain is obtained by the boundary information of a image. The final markspace is selected by the markspaces of the wavelet and spatial domain. The watermark is embedded into the selected markspace using the random addresses by LFSR. Finally the watermarking image is generated using the inverse wavelet transform. The proposed watermarking algorithm shows the robustness against the attacks such as JPEG, blurring, sharpening, and gaussian noise.

A Verification of Intruder Trace-back Algorithm using Network Simulator (NS-2) (네트워크 시뮬레이터 도구를 이용한 침입자 역추적 알고리즘 검증)

  • Seo Dong-il;Kim Hwan-kuk;Lee Sang-ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.1-11
    • /
    • 2005
  • Internet has become an essential part of our daily lives. Many of the day to day activities can already be carried out over Internet, and its convenience has greatly increased the number of Internet users. Hut as Internet gains its popularity, the illicit incidents over Internet has also proliferated. The intruder trace-back technology is the one that enables real time tracking the position of the hacker who attempts to invade the system through the various bypass routes. In this paper, the RTS algorithm which is the TCP connection trace-back system using the watermarking technology on Internet is proposed. Furthermore, the trace-bark elements are modeled by analyzing the Proposed trace-back algorithm, and the results of the simulation under the virtual topology network using ns-2, the network simulation tool are presented.

A study on the Design and Realization of the Wrist Type Module System based on the Smart Device Receiving Information Relay (스마트 디바이스 착신정보 중계 기반 손목형 모듈 시스템 설계 및 구현)

  • Jeong, Hee Ja
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.131-137
    • /
    • 2016
  • Since the phenomenon that the consumers slip important calls since they do not know the receiving information of the smart phone in spaces which smart phones can not be carried, the development of technology to solve this problem is urgent and the cases of burglary and losses of smart phones during hobby and recreation life are increasing and especially since burglary behaviors are occurring much in places such as bathing resort, swimming pool, Korean dry sauna, sauna and spa etc, the schemes to protect smart phones during hobbies and recreation life is needed. Since the smart watch, the conventional wearable device are high price machines and due to the burden about A/S costs for the damage or failure of the machine during exercise, hobbies and recreation activities, the burden about the use is high, development of products which can reduce such burden and emphasize the usefulness is urgent and in order to solve this problem, the added value and psychological repercussion effect will be very high in areas of smart phone users and utilizing them by developing the system which can know if the smart phone has received calls at least in places where smart phones can not be carried.