• Title/Summary/Keyword: 위협요소

Search Result 746, Processing Time 0.03 seconds

Hacking and Countermeasure on Smart TV (스마트 TV 해킹 위협 및 대응방안 분석)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.313-317
    • /
    • 2014
  • Smart-phone, PC or tablet platforms, such as smart terminals spread to the masses trying to capitalize. Smart TV also is increasing. In Korea, market size of TV is growing fast with growth of risk of hacking. In this paper, several kinds of Smart TV hacking cases are presented with the possibility of attacks against the vulnerability analysis and countermeasures. Most of the Linux operating system is open. Thus, it is vulnerable for latest hacking techniques. Most are based on the Linux OS to enhance security mount Sand-Box. However, bypass procedure using the technique, or APT attacks can avoid San-Box technique. New hacking techniques and a variety of ways will occur in the future. Therefore, this paper will develop Smart TV, and it analysis of a security threat and establishes better prepared in the future because new hacking attacks are expected to prepare more.

Design and Implementation of Web-based SWOT Analysis Supporting Tool (웹 기반의 SWOT 분석 지원도구 설계 및 구현)

  • Hwang, Jeena;Seo, Ju Hwan;Lim, Jung-Sun;Yoo, Hyoung Sun;Park, Jinhan;Kim, You-eil;Kim, Ji Hui
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.1-11
    • /
    • 2017
  • The best business strategy leading to innovation and productivity can be achieved by carefully analyzing internal and external environments of a company. Many companies often require, but difficult to find a tool to determine their own internal/external environmental factors including strengths, weaknesses, opportunities and threats(SWOT). SWOT is one analytical base model that is utilized in this research to design semi-automated environmental analysis process. This study investigates on SWOT generation system that is built on existing analysis database created by experts in each field. Companies can search and choose their best expressing environmental elements that are stored in the database. This semi-automated SWOT tool is expected to contribute that companies can recognize their internal capabilities more accurately, and help consider external environment changes around them.

Method on Radar deployment for Ballistic Missile Detection Probability Improvement (탄도미사일 탐지확률 향상을 위한 레이더 배치 방안)

  • Park, Tae-yong;Lim, Jae-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.669-676
    • /
    • 2016
  • North Korea has various ballistic missiles from short range to long range such as inter continental ballistic missiles. Short range ballistic missiles such as SCUD series are threatening to Korea peninsula. Therefore Korea is constructing various missile defense systems to protect country. Parameters influencing the received power from the target to the radar are transmitting power, antenna gain, carrier frequency, RCS(Radar Cross Section) of target and distance from radar to target. Especially, RCS and distance from target are not radar performance defined parameters but external parameters. Therefore radar deployment position that large RCS can be observed and target to radar distance should be considered in parallel to improve target detection probability. In this paper, RCS pattern of SCUD-B ballistic missile is calculated, received power is analyzed based on radar deployment position during ballistic missile trajectory and methode for optimum radar deployment position to improve target detection probability is suggested.

PATERNAL INFANT BONDING : A CRITICAL REVIEW (부아(父兒)애착 : 문헌고찰 및 비평)

  • Kim, Hea-Sook
    • 모자간호학회지
    • /
    • v.2 no.1
    • /
    • pp.34-44
    • /
    • 1992
  • 지난 10년 동안 구미에서는 부모-아동 관계 영역에 혁신을 가져왔다. 특히 부모-아동 애착이론의 획기적인 변화로 가족 중심 출산 경험을 강조하고 있다. 과거에는 남편이 아내의 출산에 참여하던 것이 타부시되어 왔지만 애착의 개념이 대두되면서 남편도 출산에 함께 참여하도록 고려하여 임신에서부터 부부가 함께 이 과업을 완수하도록 모든 환경을 변화시키고 있다. 애착이론은 다양하여 정신분석이론, 학습이론, 인지발달이론과 동물 행동학적 측면에서 이해되고 있다. 다양한 이론적 배경과 개념들을 가지고 아버지-아동의 애착 및 유대관계에 대한 연구가 지난 10여년 이상 되어오고 있다. 가장 관심의 촛점이 되어 연구 되어온 것으로는 애착형성을 위해 중요하다고 하는 민감한 시기(Critical period)를 중심으로 애착의 특성인 시각, 청각, 촉각, 상호호혜적 관계, 긍정적 애정을 바탕으로 연구되어졌다. 이 연구는 부아 애착(Paternal Infant Attachment)의 연구를 연구방법, 측정도구 및 방법상문제와 변수들을 중심으로 재정리하여, 이 분야에 있어서 앞으로의 연구 방향을 살펴보았다. 17편의 연구들을 각각 년도, 표본수, 방법 및 측정, 결과 및 비고난을 비교 분석하여 도표를 작성하였다. 이론적 기틀과 문헌고찰에 근거하여 다음과 같은 적용과 제언을 한다. 1. 출산전 아버지의 특성에 대한 사정이 필요하다. 2. 연구자가 집단간 비교를 용이하게 하기 위해 연구전에 표본의 특성을 정확히 기술해야 한다. 3. 부모와 아버지의 과거력에 대한 상세한 정보수집이 강조되어야 한다. 4. 앞으로의 연구는 이론적 모델에 근거하여 이루어져, 대중교육 뿐 아니라 정책 결정에 기여해야 한다. 5. 연구결과 평가와 해석을 위해 정확한 이론적 근거가 필요로 된다. 6. 간호연구는 부적절한 부아 애착 형성에 있어서 아버지의 특성을 확인하고 부아유대와 애착 증진의 요소를 파악해야한다. 7. 부아 유대에 대한 위협요소 확인을 위한 도구개발과 그들에 대한 효과적인 간호전략이 필요 된다. 8. 가족에 있어서 모든 부모행위가 하나의 독립변수로서 연구되어야 하고 부아유대 증진에 관한 연구가 시도되어야겠다. 오늘날 부모들은 임신기간동안 많은 정보에 접하기를 원한다. 산전, 산후의 교육과 지식은 긍정적인 부아 관계를 증진시키고, 이것은 아동의 발달에 크게 기여할 수 있다. 긍정적으로 이러한 관계는 가족단위를 강하게 통합시키게 되므로 건강관리자(Health care workers)들은 애착에 대해 높은 관심을 갖어야 하겠다.

  • PDF

Development of Checking System for Emergency using Behavior-based Object Detection (행동기반 사물 감지를 통한 위급상황 확인 시스템 개발)

  • Kim, MinJe;Koh, KyuHan;Jo, JaeChoon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.140-146
    • /
    • 2020
  • Since the current crime prevention systems have a standard mechanism that victims request for help by themselves or ask for help from a third party nearby, it is difficult to obtain appropriate help in situations where a prompt response is not possible. In this study, we proposed and developed an automatic rescue request model and system using Deep Learning and OpenCV. This study is based on the prerequisite that immediate and precise threat detection is essential to ensure the user's safety. We validated and verified that the system identified by more than 99% of the object's accuracy to ensure the user's safety, and it took only three seconds to complete all necessary algorithms. We plan to collect various types of threats and a large amount of data to reinforce the system's capabilities so that the system can recognize and deal with all dangerous situations, including various threats and unpredictable cases.

A Study on Information Security Consulting Method according to Type of Company (기업 업종에 따른 정보보안컨설팅 방법 연구)

  • Lee, Su-youn
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.121-126
    • /
    • 2015
  • Exposure of personal information that is held by hacking accident near the company has led to severe water level. And, it has changed security threat elements generated according to businessenterprise. Therefore, in this paper, I looked at security threat elements and proposed the way of appropriate information security consulting according type of company. First, In the financial and insurance industries, and should not have been compromised by a worm virus infection due to lack of awareness inside of members, by collectively apply in the same way the internal security standards of the organization to members, the risk of customer information. It shall be provided in advance that the security accident occurs due to a higher job group. Therefore, information security consulting method based on people and information is applied. Secondly, in industry of company, to perform consulting information security based on the attributes of the case industry groups.

A Study on Hometown Terrorism Possibility and Measures in Multiculturalism (다문화주의에 따른 자생테러리즘의 가능성과 대책에 관한 연구)

  • Kim, Soon-Seok
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.1-19
    • /
    • 2010
  • As the world becomes more global, entry simplification measure increases many foreigners' entry and international marriage around the low income countries of southeast Asia. Those are adding multicultural phenomena to Korean society, which has a bad influence on public order environment and leads to side effect in society. Since the 9/11 terror attacks, a sudden increase in the threat of terror has been worldwide. Besides, the threat tends toward New Terrorism and contributes to factor to social malaise in Korea. Therefore, this study examines all the possibilities of hometown terrorism by multiculturalism and suggests measures for it. To achieve this, it is required to lead the people's understanding and national participation for multiculturalism. The mature civic awareness should be given priority over any others, which means the understanding and consideration of various countries' cultures and traditions. It is also necessary to inspect the dangers of hometown terrorism. Furthermore, there should be an urgent need for an institutional device to prevent and suppress terror through a close examination of countermeasures system of terror.

  • PDF

Personal Information Protection for Biometric Verification based TeleHealth Services (바이오인식을 이용한 원격의료에서의 개인정보보호)

  • Shin, Yong-Nyuo;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.659-664
    • /
    • 2010
  • This paper provides an integrated framework for biometric data and private information protection in TeleHealth. Biometric technology is indispensable in providing identification and convenience in the TeleHealth environment. Once biometric information is exposed to mallicious attacker, he will suffer great loss from the illegferuse of his biometric data by someone else because of difficulty of change not like ID and password. We have to buil by someone esystem data bon the integrated framework for biometric data and private information protection in TeleHealth. First, we consider the structure of the biometric system and the security requirements of y someone esystem data bon the biometrics. And then, we define the TeleHealth system model and provide the vulnerabilities and countermeasures of the biometric-data by someone eintegrated model.byhe TeleHealth sse bec requires two-phata authentication for countermeasure. Finally, we made some functionferrequirements for main componenets of biometric-data bintegrated TeleHealth system framework to protect biometric data.

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

A Survey of applying Fully Homomorphic Encryption in the Cloud system (클라우드 컴퓨팅 환경에서의 개인정보보호를 위한 완전 동형 암호 적용 방안 고찰)

  • Kim, Sehwan;Yoon, Hyunsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.941-949
    • /
    • 2014
  • Demands for cloud computing service rapidly increased along with the expansion of supplying smart devices. Interest in cloud system has led to the question whether it is really safe. Due to the nature of cloud system, cloud service provider can get a user's private information and disclose it. There is a large range of opinion on this issue and recently many researchers are looking into fully homomorphic encryption as a solution for this problem. Fully homomorphic encryption can permit arbitrary computation on encrypted data. Many security threats will disappear by using fully homomorphic encryption, because fully homomorphic encryption keeps the confidentiality. In this paper, we research possible security threats in cloud computing service and study on the application method of fully homomorphic encryption for cloud computing system.