• Title/Summary/Keyword: 인증 요소

Search Result 745, Processing Time 0.029 seconds

Development of Security Audit Agent for the Safety in School Network (학내전산망의 안전성 확보를 위한 보안진단 에이전트 개발)

  • Park, Jong-O;Lee, Chul-Hyun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.27-34
    • /
    • 2002
  • Internet has being grown explosively in recent years, hence it becomes easy to search and access information. But it is happening frequently to access illegally into the systems and data, there are many damage caused by them. So, it is very important that we construct security plan for the systems and data. It is not exception on school network being diffused to all schools. But, we have weakness about security to manage server and network safely. So it is causing much anxieties. In this paper, we searched security points make sure of safety of school network, and developed security audit agent helping management of security. Through simple registration process, this agent is able to audit basic and important security problems about not only server systems but also pc systems, and notify to administrator automatically. It is expected to provide efficiency in managing school network.

  • PDF

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.117-126
    • /
    • 2007
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBs. Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch, BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these Paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF

A Efficient Key Distribution Scheme for Individual/Group Communication on TRS (TRS 상의 개별/그룹 통신을 위한 효율적인 키 분배 기법)

  • Lee, Deok-Gyu;Park, Yong-Suk;Ahn, Jong-Chul;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.913-922
    • /
    • 2006
  • It used exclusively the radio communication where is the TRS(Trunked Radio Service) at frequency where the person whom it does is specific with hitherto radio communication method differently frequency of the decimal which is allocated to the relay station it talks the at the room which the multiple user uses with commonness. The TRS system the most big feature is the region multiple group and order communication method. The TRS the composition of system is composed of the multi mind group, the each group is composed of the terminal of the users who have the objective which is similar relates in business contents. With above it follows in same multi objective and the connection of the form which is various or group communication accomplishes and quality case, a possibility a or of having many problem point in key distribution for a large scale communication there is it could be exposed to attack of the form which is various. There is a place where it accomplishes the communication which is safe at the TRS from research which it sees it investigates group key distribution method which is an essential element. The method which it sees when it reduces a communication frequency, it stands but is the user, it proposes the efficient group key distribution method it will be able to accomplish.

An Analysis of the AHP of the Lifelong Education Program based on the Six Classification Scheme (6진 분류에 따른 평생교육 프로그램의 AHP 분석)

  • Han, Sang-Hoon;Park, Myeung-Sin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.995-1005
    • /
    • 2015
  • This study is to analyze the AHP of the lifelong education program per each domain of six classifications. According to this study result, the relative importance of the lifelong education program per each domain is as following: Literacy education, Vocation and Workforce education, Citizen Participatory education in descending order of importance. As for the relative importance of the lifelong education program per each subcomponent is Expended literacy, Fundamental Life Skill, Workforce Continuing Education in descending order of importance. The results of this study can be used in lifelong educators of education and training and lifelong education, designed, theoretically realistic lifelong education programs development and management of educational practice field, provides many implications for the development of lifelong learning as practical implications.

Architecture Evaluation Utilizing CBAM and AHP (생체인식 소프트웨어의 품질 평가모듈에 관한 연구)

  • Yang, Hae-Sool;Lee, Man-Ho;Yoon, Young-Mi
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.699-708
    • /
    • 2006
  • The latest biometric field have marched fast with security technology of IT. As importance of present biometrics is realized, internal and external biometrics software market is trend that is soaring. Accordingly, high reliability of biometric software and request of high quality software are enlarged. Evaluation items and criteria must be established for biometric software quality assurance. In this paper, we development the evaluation module for biometric software test based on ISO/IEC 12119 that is the standard about software quality requirement and test, and ISO/IEC 9126 that is standard about evaluation of software product, and ISO/IEC 14598-6 that is the standard about construction of the evaluation module. Constituents of biometric software products(product descriptor, user document program and data) is subject to the quality evaluation module that we developed in this paper, we can expect improvement in the quality of software by using with a standard such as ISO/IEC 9126-3 that can be used in software development process.

Analysis and Improvement of Animal Farm HACCP Evaluation (축산 농가 HACCP 심사 분석과 개선)

  • Nam, In-Sik
    • Korean Journal of Organic Agriculture
    • /
    • v.25 no.1
    • /
    • pp.101-112
    • /
    • 2017
  • HACCP is the one of best tool to prevent biological, chemical and physical hazards of livestock products. In Korea, HACCP is implementing all livestock industry including animal farm. According to the result of HACCP assessment in animal farm for three years, we have found a high non-compliance rate in some evaluation items of HACCP. To improve this problem, revision of HACCP evaluation items, difficult HACCP terms change to easy understand and development of intensive HACCP training program are needed.

Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 구조)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.643-650
    • /
    • 2008
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

Feasibility Study for Technology and Policy on Water Footprint Introduction (물발자국 도입의 기술적·정책적 타당성 분석연구)

  • Park, Sung Je;Park, Nu Ree;Ryu, Si Saeng
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.265-265
    • /
    • 2015
  • 기후변화에 대비하여 한정된 수자원을 효율적으로 사용하기 위한 제도적 규제는 앞으로 기업의 제품 생산에서 발생하는 오염까지 확대될 전망이다. 기관투자가 등이 지원하는 영국의 NPO인 탄소정보공개프로젝트(CDP)는 2010년부터 온실가스배출량과 함께 물 사용 상황을 공개할 것을 전 세계 기업에 요구했다. 이에 따라 전 세계에서 탄소발자국과 물발자국에 대한 연구가 활발하게 진행 중에 있다. 우선 본 연구는 선진국을 중심으로 진행되고 있는 물발자국 개념의 활용현황을 분석하였다. 호주와 미국을 비롯한 일부 국가에서는 물발자국의 라벨 제도를 도입하여 기업의 제품에 대한 등급을 구분하고 있다. 라벨의 부착은 인증기관의 검토를 통하여 기존 제품보다 물 사용 효율이 높다는 것을 의미하며, 물발자국 라벨제도는 제품 생산의 전 과정 환경성 평가를 통하여 기업이나 제품의 물발자국 관련 영향을 줄이는 것을 목표로 하고 있다. 또한 스페인에서는 물발자국을 물의 효율적인 분배와 사용을 위한 정책적 요소로 도입하였다. 이상의 분석을 바탕으로 물발자국의 기술적 활용 및 효과를 도출하기 위하여 법과 제도적 측면, 기술적 측면에서 살펴보았으며, 우리나라의 현황과 비교를 진행하였다. 이와 관련하여 분야별 기술 사업에 대한 목표와 최종성과물, 활용방안을 정리하여 해당 개념의 주요쟁점사항에 대해 기술적, 정책적으로 타당한지를 지표를 설정하여 분석하였다. 물발자국의 활용에서 기술적 타당성에 대한 지표는 적절성, 성공가능성, 우수성, 경제성 측면에서 제시가 되었으며, 정책적 타당성은 해당계획 및 기업 및 지자체의 추진의지, 위험요인, 특수평가 항목을 통해 개업 및 지자체의 물발자국 활용 타당성을 분석하였다. 이상을 바탕으로 본 연구에서는, 물발자국 도입을 위한 종합평가로서 AHP 분석을 실시하여 물발자국 도입을 위한 중요도와 종합목적 및 위기상황에 따른 대체안을 설정할 수 있도록 우선순위를 도출하였다. 현재 우리나라는 본격적인 정책적 도입에 앞서 개념의 정의, 정책 공감대의 확대, 한국형 데이터베이스를 구축하는 시범단계에 있다. 물 산업의 확대와 우리 기업들의 해외진출은 가상수와 물발자국의 데이터베이스의 구축이 시급하다는 것을 보여준다. 따라서 본 연구는 앞으로 우리나라의 물발자국 도입을 위한 방향을 설정할 수 있는 기초연구로서 큰 의미를 지니며, 기업의 물산업 전략을 수립을 위한 지표 설정에 있어서도 기초자료를 제공할 수 있을 것으로 기대된다.

  • PDF

An Evaluation of the Efficiency of Information Protection Activities of Private Companies (기업의 정보보호활동의 효율성 평가)

  • Choi, Won-Nyeong;Kim, Woo-Je;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.25-32
    • /
    • 2018
  • Cyber hackings are increasing and becoming more intelligent. The government and private companies conduct various information protection activities by investing lots of money and employing security personnel to protect import ant assets and personal information. It is important to evaluate the efficiency of the information protection activities that cost lots of money and manpower. However, the studies on the efficiency of the information protection activities were mainly conducted for government agencies the information of which is more readily available. This study suggests a model that can evaluate the efficiency of the activities of information protection and information security certification of various private companies. Our model evaluates the efficiency of the information protection activities by applying AHP and DEA on the information that are publicly announced by the private companies. Our model identifies the DMUs that are efficiently operated and suggests the improvement policies for the DMU that are non-efficiently operated.

  • PDF

The Traceability System of Agricultural Products by using RFID (RFID를 이용한 농산물 생산이력정보 제공 시스템)

  • Im, Dae-Myung;Ham, Jong-Wan;Kim, Chang-Su;Min, Byung-Hun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1042-1045
    • /
    • 2009
  • The Food is very important in our life, And the agricultural products are one of the most important food materials. For buying it, it's hard for the consumer to trust the agricultural products. That this reason, why they can't easily get the product information about agricultural productions. If you can get it, It is only mark of information about The country of production, They can not get reliable informations such as Producers, productions, residual pesticides, and soil conditions, etc. Accordingly, When consumers buy these agricultural productions, They want to provide reliable information. In this paper, using an RFID(Radio-Frequency IDentification) reader who reads RFID TAG attached to products. Then, Acquired Certification Number sent to a web server. To get the Production informations and Safety Inspection Information. The way that consumers can trust the Agricultural Products. These Traceability systems were implemented.

  • PDF