• Title/Summary/Keyword: 위협의 평가

Search Result 707, Processing Time 0.031 seconds

Adaptation Policy of ISO 27001 ISMS (Information Security Management System) for e-Government (전자정부 정보보호관리체계(G-ISMS) 적용 정책)

  • Han, Keun-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.119-130
    • /
    • 2009
  • Korea ranked 2nd in the UN Global e-Participation Index and ranked number one as the leader in e-Government for the third consecutive year. However, Korea ranked 51 in the level of information security published by WEF(World Economic Forum), relatively a low level comparing with its great number of users and excellent environments for the Internet service. A series of critical hacking accidents such as the information leak at Auction and GS Caltex emerged consecutively in 2008 year, resulting in the leak of personal & critical information. This led to a strong interest in the necessity and importance of information security and personal information so that demand for IT security is growing fast. In this paper, we survey to benchmark information security in the perspective of service level, system, investment and policy about major foreign countries. Then we research on an effective way to make the most of the benchmark result to Korea e-Government. In addition, the purpose of this paper is to improve national information security index by developing a policy for ISO 27001 ISMS, an international standard for Information Security Management System, and elevate safety and security of the e-Government serviced by central administrative organizations and local authorities.

Comprehensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database (암호화된 데이터베이스 검색 시스템의 보안 요구사항에 대한 통합적 관점에서의 연구)

  • Park, Hyun-A;Lee, Dong-Hoon;Chung, Taik-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.621-635
    • /
    • 2012
  • Although most proposed security schemes have scrutinized their own security models for protecting different types of threats and attacks, this naturally causes a problem as follows-- if a security analysis tool would fit a certain scheme, it may not be proper to other schemes. In order to address this problem, this paper analyzes how security requirements of each paper could be different by comparing with two schemes: Agrawal et al.'s scheme OPES (Order Preserving Encryption Scheme) and Zdonik et al.'s FCE (Fast Comparison Encryption). Zdonik et al. have formally disproved the security of Agrawal et al.'s scheme OPES. Thereafter, some scholars have wondered whether the OPES can guarantee its applicability in a real world for its insecurity or not. However, the analysis by Zdonik et al. does not have valid objectivity because they used the security model INFO-CPA-DB for their scheme FCE to analyze Agrawal et al.'s scheme OPES, in spite of the differences between two schemes. In order to analyze any scheme correctly and apply it to a real world properly, the analysis tool should be comprehensively standardized. We re-analyze Zdonik et al.'s analysis for OPES and then propose general formalizations of security and privacy for all of the encrypted retrieval systems. Finally, we recommend the minimum level of security requirements under our formal definitions. Additional considerations should be also supplemented in accordance with the conditions of each system.

Analysis of relative importance priority based on blockchain technology characteristics using AHP technique (AHP 기법을 이용한 블록체인 기술 특성 기반 상대적 중요도 우선순위 분석)

  • Oh, Kyoung-Sang;Lee, Dong-Myung
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.239-250
    • /
    • 2021
  • When considering the introduction of a new technology, it is important to accurately grasp and selectively apply the technical characteristics related to the technology in order to fully utilize the advantages of the technology. In this study, the technical characteristics of high relative importance were analyzed in order to increase the efficiency of new application of blockchain technology by companies. The technical characteristics of the blockchain identified through previous research were reclassified from the perspective of the system hierarchy, and sub-factors of the technical characteristics were derived. In addition, a questionnaire survey on the relative importance of technical characteristics was conducted for internal experts and SI experts using the Analytical Hierarchy Process (AHP) technique. As a result of the analysis, respondents evaluated data protection as the most important factor in the threat of hacking related to security. In addition, it was different that the comparison results of the importance of the technical characteristics between the experts in the company and the SI experts and the priority of the technical characteristics between the expert groups by industry. It is expected that the results of this study will be usefully utilized when using blockchain technology in enterprises in line with the upcoming changes of the 4th industrial revolution. An empirical analysis of the internal and external factors required for adoption of blockchain technology by industry and the effect of technology introduction will be a meaningful study.

Relationship among the Expertise of University Liberal Arts Class Instructor, the Exercise Flow and Persistent Participation Intention Perceived by Non-Sports Major University Students (비체육 전공 대학생이 인지한 대학교 교양 수업 지도자의 전문성과 운동몰입 및 참여지속의도간의 관계)

  • Lee, Young Jun
    • Journal of the Korean Applied Science and Technology
    • /
    • v.38 no.3
    • /
    • pp.735-749
    • /
    • 2021
  • There is true that the evaluation of non-face-to-face swimming classes currently offered by universities due to the COVID-19 outbreak is generally negative. For this reason, the quality of non-face-to-face swimming classes at universities is bound to depend on the expertise of the instructor. However, whether or not of students who lack of practices of swimming could experience exercise flow and could continuously last the swimming exercise after semester or even graduation is difficult to confirm. This is considered to be a significant threat in the future not only for swimming, but also for all liberal arts and lifestyle sports. This study aimed at 281 non-athletic college students with experience of taking both swimming classes, and the need for a study on the structural relationship between exercise flow and participation intention by university swimming class leaders' expertise in non-sports majoring college students. And the results were empirically analyzed. The research results derived in this process are summarized as follows. First, the effect of swimming class leader's expertise (personality, lecture skills, student management, practical skills, basic knowledge) perceived by non-athletic college students on exercise flow (cognitive flow, behavior flow) affects cognitive flow. As a factor influencing, it was found that lecture skills had a statistically positive (+) effect, and as factors influencing behavioral commitment, the positive (+) effect was statistically significant in personality, lecture skills, student management, and basic knowledge. Second, as for the effect of exercise commitment (cognitive commitment, behavior commitment) perceived by non-athletic college students on continuous participation intention, the behavioral commitment factor was found to have a statistically positive (+) effect.

Development of a Prediction Technique for Debris Flow Susceptibility in the Seoraksan National Park, Korea (설악산 국립공원 지역 토석류 발생가능성 평가 기법의 개발)

  • Lee, Sung-Jae;Kim, Gil Won;Jeong, Won-Ok;Kang, Won-Seok;Lee, Eun-Jai
    • Journal of Korean Society of Forest Science
    • /
    • v.110 no.1
    • /
    • pp.64-71
    • /
    • 2021
  • Recently, climate change has gradually accelerated the occurrence of landslides. Among the various effects caused by landslides,debris flow is recognized as particularly threatening because of its high speed and propagating distance. In this study, the impacts of various factors were analyzed using quantification theory(I) for the prediction of debris flow hazard soil volume in Seoraksan National Park, Korea. According to the range using the stepwise regression analysis, the order of impact factors was as follows: vertical slope (0.9676), cross slope (0.6876), altitude (0.2356), slope gradient (0.1590), and aspect (0.1364). The extent of the normalized score using the five-factor categories was 0 to 2.1864, with the median score being 1.0932. The prediction criteria for debris flow occurrence based on the normalized score were divided into four grades: class I, >1.6399; class II, 1.0932-1.6398; class III, 0.5466-1.0931; and class IV, <0.5465. Predictions of debris flow occurrence appeared to be relatively accurate (86.3%) for classes I and II. Therefore, the prediction criteria for debris flow will be useful for judging the dangerousness of slopes.

Classification of hydropower dam in North-han River based on water storage characteristics (저류특성을 고려한 북한강수계 발전용댐의 유형 구분방안 제시)

  • Choi, Jeongwook;Jeong, Gimoon;Kang, Doosun;Ahn, Jeonghwan;Kim, Taesoon
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.8
    • /
    • pp.567-576
    • /
    • 2021
  • Climate change threatens the security of domestic water resources in South Korea. To overcome the potential water shortage, various approaches are being studied by alterning the operation of dams or by integrated operation of multiple dams and reservoirs. However, most of the related researches were developed and applied for multi-purpose dams, and few studies were conducted for the hydropower dams. The main purpose of the hydropower dam is to generate electric energy; however, the potential water shortage due to prolonged droughts brings the idea to supply water from the hydropower dam in the basin. To that end, it is required to estimate the water supply ability of the hydropower dams. In this study, we proposed a methodology to classify the hydropower dam into a "storage-type" and "run-of-river type" dam. The proposed approach was demonstrated using the hydropower dams located in North-han River basin. The results of this study are expected to contribute for further analysis of the hydropower dams, such as evaluation of water supply capacity and drought mitigation purpose operation of the hydropower dams.

A Study on Creation of Secure Storage Area and Access Control to Protect Data from Unspecified Threats (불특정 위협으로부터 데이터를 보호하기 위한 보안 저장 영역의 생성 및 접근 제어에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.897-903
    • /
    • 2021
  • Purpose: Recently, ransomware damage that encrypts victim's data through hacking and demands money in exchange for releasing it is increasing domestically and internationally. Accordingly, research and development on various response technologies and solutions are in progress. Method: A secure storage area and a general storage area were created in the same virtual environment, and the sample data was saved by registering the access process. In order to check whether the stored sample data is infringed, the ransomware sample was executed and the hash function of the sample data was checked to see if it was infringed. The access control performance checked whether the sample data was accessed through the same name and storage location as the registered access process. Result: As a result of the experiment, the sample data in the secure storage area maintained data integrity from ransomware and unauthorized processes. Conclusion: Through this study, the creation of a secure storage area and the whitelist-based access control method are evaluated as suitable as a method to protect important data, and it is possible to provide a more secure computing environment through future technology scalability and convergence with existing solutions.

Research on the Necessity of Building the Second Space Rocket Launching Sites for Breakthrough Development of R.O.K National Space Power (도약적 국가 우주력 발전을 선도할 제2 우주센터 구축 필요성 연구)

  • Park, Ki-tae
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.146-168
    • /
    • 2022
  • Witnessing current military conflicts in South China Sea and Eastern Europe, most defense analysts evaluate one of the most serious security threat toward the US is coming from the superpower competitions with Russia and China. The main means for such super power hegemonic competitions is military power and space power is a key enabler to maximize the efficiency and effectiveness of military employment. Reflecting above circumstances, the space hegemonic competition between the Unites States and China is spreading into all aspects of national powers. Under such an environment, R.O.K needs to significantly develop national space power to preserve life and assets of people in space. On the other hand, the R.O.K has a lot of limitations in launching space assets into orbits by land-based space rockets due to its geographic locations. The limitation of rocket launching direction, the failure to secure a significant area enough to secure safety and the limitation to secure open area enough to build associated facilities are among them. On this paper, I will suggest the need to build the 2nd space rocket launching site after analyzing a lot of short-falls the current 'Naro' space center face, compared to those of advanced space powers around the world.

Detection of Marine Oil Spills from PlanetScope Images Using DeepLabV3+ Model (DeepLabV3+ 모델을 이용한 PlanetScope 영상의 해상 유출유 탐지)

  • Kang, Jonggu;Youn, Youjeong;Kim, Geunah;Park, Ganghyun;Choi, Soyeon;Yang, Chan-Su;Yi, Jonghyuk;Lee, Yangwon
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_2
    • /
    • pp.1623-1631
    • /
    • 2022
  • Since oil spills can be a significant threat to the marine ecosystem, it is necessary to obtain information on the current contamination status quickly to minimize the damage. Satellite-based detection of marine oil spills has the advantage of spatiotemporal coverage because it can monitor a wide area compared to aircraft. Due to the recent development of computer vision and deep learning, marine oil spill detection can also be facilitated by deep learning. Unlike the existing studies based on Synthetic Aperture Radar (SAR) images, we conducted a deep learning modeling using PlanetScope optical satellite images. The blind test of the DeepLabV3+ model for oil spill detection showed the performance statistics with an accuracy of 0.885, a precision of 0.888, a recall of 0.886, an F1-score of 0.883, and a Mean Intersection over Union (mIOU) of 0.793.

Expansion of the Scope of Electronic Commerce by Standardization: An Analysis a Secondhand Clothing Market (표준화를 통한 전자상거래의 영역 확장: 중고의류 시장 사례 분석)

  • Kim, Iljoo
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.29-41
    • /
    • 2022
  • Since the first sale of a banner advertisement in 1995, electronic commerce has become a new transaction channel for consumers. With more than 20 years of its history, electronic commerce has become an important consumption channel for everyone and inexperience is no more a reason that discourages the consumption through this channel. The great expansion of this channel is now a formidable thereat to traditional channels. However, products with high asset specificity and complexity are still having difficulty to be traded over the online channel where the experience of the products for a consumer is limited. Especially, variations of the same product's quality depending on how pre-owners used the product and high complexity to describe the quality of the products prevent used goods from being traded over e-channels. Added to that, the information asymmetry between sellers and buyers for used goods makes the establishment of market transaction difficult. Considering the challenges, the current case study discusses thredUP, a clothing resale platform company. In this paper, we study how the company could overcome those limitations in this toughest resale market through the use of AI for dynamic pricing and standarized product quality ratings. In addition, we also hope to provide readers with the opportunity to understand the secondhand industries and its market, and see where it is heading for in the future.