• Title/Summary/Keyword: 위협요소

Search Result 746, Processing Time 0.027 seconds

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

A Study of the Establishment of Governance to Ensure the Sustainability of Agricultural Water Use (농업용수의 지속가능성 확보를 위한 거버넌스 주요 구축 인자)

  • Lee, Seul Gi;Choi, Kyung Sook
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.73-73
    • /
    • 2022
  • 전 세계적으로 발생하고 있는 기후변화로 인하여 자연재해가 빈번한 실정이며, 특히 가뭄은 농업용수 부족과 직결되어 식량안보를 위협하는 요소가 되고 있다. 최근 우리나라에서도 통합물관리 정책 추진과 더불어 농업용수의 물절약 필요성이 강조되고 있으며, 농업용수 수요관리를 위한 실사용자인 농업인과 이해관계자들의 관심과 노력이 필요한 상황이다. 따라서 농업용수의 지속가능성 확보를 위한 물이용 절감 등 적극적인 수요관리를 위해 농업용수 거버넌스 구축이 요구되고 있다. 이에 본 연구에서는 우리나라 농업 현장에 적용 가능한 농업용수 거버넌스 구축에 필요한 주요 구성 인자를 파악해 보았다. 이를 위해 국내외의 농업 및 농촌 거버넌스 사례와 문헌조사 등을 통해 농업용수 거버넌스 구축을 위한 6개의 주요 인자를 선정한 후, 전문가를 대상으로AHP(Analytic Hierarchy Process) 방법을 이용한 설문조사 및 쌍대비교를 통해 우선순위를 도출해 보았다. 그 결과, 총 6개 주요 인자의 중요도는 '핵심주체', '법률 및 정책 구축', '예산 지원', '정보공유 및 커뮤니케이션', '상호 학습', '외부전문가' 순으로 도출되었다. 여기서 가장 높은 중요도를 차지한 '핵심주체'는 농업인을 의미하며, 이는 공사에서 담당하고 있는 현재의 공적관리체계로는 필지단위의 효율적 물관리에 한계가 있으므로, 물 사용의 주체인 농업인의 물관리 참여를 위한 거버넌스 운영에 농업인이 핵심주체로서의 역할을 하는 것이 필요하다는 것을 나타낸다. 농업인 중심의 상향식 거버넌스(Bottom-up governance) 방식으로 농업용수 거버넌스가 운영된다면, 농업용수 이해관계자들의 관심과 농업인의 자발적인 물절약 참여를 유도할 수 있을 것으로 판단된다. 또한 거버넌스 운영을 통하여 농업인 및 이해관계자의 소통과 문제 제기 및 환류 노력 등을 통해 물절약을 위한 제도개선 및 현장 실천 노력 등이 지속적으로 이루어진다면, 농업용수 지속가능성 확보에 긍정적인 효과를 나타낼 수 있을 것으로 사료된다.

  • PDF

Study of Fish Monitoring for of Exotic Fishes Management of Ecological Park at Nakdong River 1 (Nakdong River Site) (낙동강 생태공원 지역 외래어종 관리를 위한 어종 모니터링 연구 1 (낙동강))

  • Joon Gu Kang;Sung Jung Kim;Hong Koo Yeo
    • Ecology and Resilient Infrastructure
    • /
    • v.10 no.4
    • /
    • pp.184-192
    • /
    • 2023
  • Influx of exotic fishes is the reason of destruction of the ecosystem and Eco-Diversity Recently, River project was conducted to consider environmental function. Therefore, farmlands structure along the river was removed such as vinyl greenhouse. In order to supply water eco-diversity, ecological park was built. In spite of nature river improvement, the ecological system in river will be break down by exotic fishes. This study was conducted to investigate analyze the fish faun and prevailing species occupancy in Nakdong river. This data will be used to make the management plan of exotic fishes in ecological park around Nakdong river.

The Mitigation of Information Security Role Stress: The Role of Information Security Policy Goal Setting and Regulatory Focus (정보보안 업무 스트레스의 완화: 정보보안 정책 목표 설정 및 조절초점의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1177-1188
    • /
    • 2023
  • Socially, organizations are required to maintain strict management of their information resources and invest in the adoption of information security (IS) technologies and policies. However, the ongoing threat of information exposure by employees persists within the organization. This study aims to identify the role stress that employees may experience due to strict IS policies and propose methods for reducing its negative impact. Specifically, our study suggests a mechanism for mitigating role stress by incorporating factors related to IS policy goal setting and work regulatory focus. We conducted a survey among workers in the financial industry, where IS policies are rigorously enforced, and tested our research hypotheses using a sample of 309 participants. The results indicate that increasing the difficulty and specificity of IS policy goals reduces role stress (conflict and ambiguity) and positively influences employees' intention to comply with IS policies. Furthermore, individual work promotion focus moderated the relationship between role stress and IS compliance intention. These findings have important implications for organizations seeking to strengthen their IS compliance among employees and inform the development of effective IS strategies.

Proxy Based Application Digital Signature Validation System (프락시 기반 애플리케이션 전자서명 검증 시스템)

  • Kwon, Sangwan;Kim, Donguk;Lee, Kyoungwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.743-751
    • /
    • 2017
  • As smart phones are becoming popular, an operating system is being used at wearable devices, home appliances and smart TVs. A user is able to use various applications on devices with operating system, but there is an increased threat of hacker. Thus, the technology for detecting the forgery of applications is becoming more important on operating system. To detect the forgery of the application, a digital signature technology is used on the filed of application digital signature. According to W3C recommendation, the signing process of application digital signature must be performed at least twice, and the applications which are signed by the application digital signature have to be validated for all signature files when the application is installed in the operating system. Hence, the performance of the application digital signature validation system is closely related to the installer performance on the operating system. Existing validation system has performance degradation due to redundancy of integrity verification among application components. This research was conducted to improve the performance of the application digital signature validation system. The proposal of validation system which is applied proxy system shows a performance improvement compared to the existing verification system.

Analyses of the current market trend and research status of indoor air quality control to develop an electrostatic force-based dust control technique (정전기적 힘을 이용한 실내공기 미세부유먼지 제거 요소기술의 개발을 위한 기술별 시장현황 및 연구 동향 분석)

  • Yoon, Young H.;Joo, Jin-Chul;Ahn, Ho-Sang;Nam, Sook-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.12
    • /
    • pp.6610-6617
    • /
    • 2013
  • This study examined the current and future Indoor Air Quality (IAQ) control device markets and analyzed the recent studies on indoor air pollutantr emoval to develop a new technology for fine dust control. Currently, the mechanical filter technique occupies the bulk of the IAQ control market but the electronic technique is emerging as an alternative to control fine dust efficiently. Among the gaseous VOCs and fine dust particles contaminating the indoor air quality, fine dust particles are more problematic because they threaten human health by penetrating deep into the body and producing secondary contaminants by chemical reaction with VOCs. The electronic IAQ control device using dielectrophoretic and electrostatic forces is a good option for public spaces where many people pass, and at the same time, it needs to consider temperature, humidity, and the particle properties of specific areas to highlight the control efficiency. Electronic-related technology is expected to be used widely in many public/private spaces wherever a dust-free environment is required.

A Study on Risk Factors of Metabolic Syndrome and Health Behaviors in a Region - 2014 community health survey - (일 지역 대사증후군 위험인자와 건강행태에 관한 연구 -2014 지역사회건강조사-)

  • Ahn, Ok-hee;Choi, Seong-hui;Kim, Seo-Hyeon;Ryu, Si-Ok;Choi, Young-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.218-225
    • /
    • 2016
  • Recently, Korea has undergone rapid social and economic development, and with that came various changes in living habits and disease patterns; the nation, accordingly, has been alerted to the associated risks of chronic ailments. As risk factors of metabolic syndrome commonly include causal factors of chronic diseases, prevention is important. The prevalence of metabolic syndrome in Korean adults is 22.4%, which comprises a large portion of the whole disease (Korean National Health and Nutrition Examination Survey, 2013). This study aims to examine the elements of healthy living practices by analyzing the risk factors of metabolic syndrome and health behaviors, and provide basic materials to contribute to the activation of health promotion. Among 12,481 subjects of the source data from the 2014 community health survey, which was performed on adults aged 19 and over in Jeonlabuk-do, 12,185 people were analyzed in this study using SPSS 23.0. There were significant differences with respect to sex, smoking status, age, education level, and number of days of physical activity among the results of the difference of the risk factors of the metabolic syndrome according to the characteristics of the health behavior of the subjects. Of the risk factors for metabolic syndrome, this study emphasized the necessity of strategies to promote health programs regarding the management of drinking, smoking, physical activities, depression, subjective health condition and quality of life to the group of those with dyslipidemia, hypertension, and diabetes.

An Empirical Study on the Prediction of Future New Defense Technologies in Artificial Intelligence (인공지능 분야 국방 미래 신기술 예측에 관한 실증연구)

  • Ahn, Jin-Woo;Noh, Sang-Woo;Kim, Tae-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.458-465
    • /
    • 2020
  • Technological advances in artificial intelligence are affecting many industries, such as telecommunications, logistics, security, and healthcare, and research and development related to economic, efficiency, linkage with commercial technologies are the current focus. Predicting the changes in the future battlefield environment and ways of conducting war from a strategic point of view, as well as designing/planning the direction of military development for a leading response is not only a basic element to prepare for comprehensive future threats but also an indispensable factor that can produce an optimal effect over a limited budget/time. From this perspective, this study was conducted as part of a technology-driven plan to discover potential future technologies with high potential for use in the defense field and apply them to R&D. In this study, based on research data collected in a defense future technology investigation, the future new technology that requires further research was predicted by considering the redundancy with existing defense research projects and the feasibility of technology. In addition, an empirical study was conducted to verify the significance between the future new defense technology and the evaluation indicators in the AI field.

경험적 방법에 의한 두만강 유사량 추정

  • Lee, Kwang-Man;Jang, Chang-Lae;Kim, Joon-Tae
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.1660-1664
    • /
    • 2007
  • 두만강을 중심으로 한 동북아시아의 환경보호를 위한 우선순위에서 토양보호가 높은 순위로 분류된 적은 거의 없었다. 토양손실에 의한 부정적 효과가 사람들에게 잘 알려져 있지 않으며, 특히 농촌에서 토양 보전의 가치를 이해하거나 토양에서 직접적으로 혜택을 받고 있다고 인식하는 사람들은 극히 일부에 지나지 않는다. 실제 동북아시아에서 토양보호와 관련하여 일관되게 접근해야 할 필요성이 국가 정책에 반영되고 그 결과 토양유실보호법이나 환경보호법 내에서 우선순위의 국가정책으로 도입된 것은 불과 지난 10-20년 사이의 일이다. 따라서 이 지역에서의 토사 유실은 매우 심각하며 이로 인해 많은 분제점이 발생하고 있는 것은 당연하다. 수자원과 토지 자원을 잘 보전하고, 물과 토양의 침식을 제어하면서 생태계를 보호하는 것은 두만강 유역에 있는 연안 국가의 현대화를 위한 기초이자 장기 전략과제이다. 대상 지역에서, 토양의 침식형태는 주로 수리적 침식, 바람에 의한 침식, 결빙과 해동에 의한 침식, 산사태, 토석류, 밀도류 및 구릉의 함몰 등이 포함되며 이중 수리적 침식과 산사태에 의한 유실이 가장 일반적이다. 두만강 유역에서 자원의 이용 압력이 땅과 물의 퇴화를 유발한다는 증거가 많아지면서, 자연자원을 관리하는 방법에 더 많은 주의를 기울이고 있으나 퇴사량에 대한 근본적 이해 없이는 불가능해 보인다. 따라서 본 연구에서는 토지 이용관리와 토사를 보호하는 방법을 개발하기 위해 토양의 침식에 대한 현재 상태를 상세하게 확인하였으며, 토양의 중요한 기능이 심각한 퇴화 과정으로 인해 위협받고 있다는 인식에 토대를 두고 토양 보호 프로그램을 유도하기 위해 두만강의 유사량을 경험적 방법을 이용하여 추정하였다.포 분석방법으로는 BW관 방법을 이용하여 분석하였다. 현재까지 국내 외적으로 하천 유사량 산정과 관련된 많은 경험식들이 제시되고 있다. 하지만, 외국의 충적하천에 기초하여 개발되어진 유사량 공식들을 우리나라 하천에 무분별하게 적용하는 것은 위험스러우며, 유사량 산정 결과의 신뢰성을 높이기 위해서는 무엇보다 우리나라 하천의 지형, 수리, 수문학적 요소들이 유사 특성에 미치는 영향을 알아야 한다. 그러므로, 본 연구에서는 실측을 통한 유사량 값을 하천의 지형, 수리, 수문학적 요소들과 비교 분석하여우리나라 하천에 맞는 유사특성을 알아보고, 기타 총유사량산정 공식을 이용하여 실측한 유사량과 비교 분석하고자 한다.호강유역의 급격한 수질개선을 알 수 있다.世宗實錄) $\ulcorner$지리지$\lrcorner$(地理志)와 동년대에 동일한 목적으로 찬술되었음을 알 수 있다. $\ulcorner$경상도실록지리지$\lrcorner$(慶尙道實錄地理志)에는 $\ulcorner$세종실록$\lrcorner$(世宗實錄) $\ulcorner$지리지$\lrcorner$(地理志)와의 비교를 해보면 상 중 하품의 통합 9개소가 삭제되어 있고, $\ulcorner$동국여지승람$\lrcorner$(東國與地勝覽) 에서는 자기소와 도기소의 위치가 완전히 삭제되어 있다. 이러한 현상은 첫째, 15세기 중엽 경제적 태평과 함께 백자의 수요 생산이 증가하자 군신의 변별(辨別)과 사치를 이유로 강력하게 규제하여 백자의 확대와 발전에 걸림돌이

  • PDF

Improvement of the Checklist for Residential Housing's Crime Prevention Accreditation Assessment (주거시설에 대한 CPTED 평가인증 기준 개선방안 연구)

  • Park, Hyeon-Ho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.117-141
    • /
    • 2018
  • Police crime statistics report that residential housing such as apartment, low rise, detached houses is the second most vulnerable to crime, which is closely followed by the number of street crimes. Also residential houses are often exposed to quality-of-life crime, e.g burglary. It threatens the basic human rights of house residents in terms of safety and comfort within the urban living environment. This study examines related precedent studies regarding the vulnerability of residential housing including studios, multi-family housing from the viewpoint of crime prevention through environment design(CPTED), extracted the elements and items suitable for the safety of residential facilities and the certification evaluation indicators and check items to be the basis for the checklist are derived. Based on these evaluation indicators and inspection items, we conducted on-site surveys of residential facilities in three areas of Seoul, Yongin and Asan, and the final draft of the checklist was revised based on the results of the field survey. There are 43 items on the 7 fields of evaluation in the final version of checklist, 11 items in the management and operation, 20 items in the surveillance, 7 items in the access control, 1 item in the territoriality, 2 items in the activity support, and 2 items in the security and safety facilities. In addition, various points of interest were added to allow the administrator of the residential facility to earn points for special measures taken for safety. This checklist can be appropriately modified and utilized in consideration of the characteristics of each facility. Korean national police agency has CPOs to check the residential facilities in their jurisdiction using checklists and to certify excellent facilities with high level of safety.