• Title/Summary/Keyword: 인지된 보안

Search Result 353, Processing Time 0.024 seconds

Node.js Module Vulnerability Analysis: Based on AST and CFG (AST 와 CFG 에 기반한 Node.js 모듈 취약점 분석)

  • Kim, Hee Yeon;Oh, Ho Kyun;Kim, Ji Hoon;You, Jaewook;Shin, Jeong Hoon;Kim, Kyounggon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.475-478
    • /
    • 2019
  • 웹어플리케이션의 발전에 따라 자바스크립트 런타임 플랫폼인 Node.js 의 사용도 증가하고 있다. 개발자들은 Node.js 의 다양한 모듈을 활용하여 프로그래밍을 하게 되는데, Node.js 모듈 보안의 중요성에 비하여 모듈 취약점 분석은 충분히 이루어지지 않고 있다. 본 논문에서는 소스코드의 구조를 트리 형태로 표현하는 Abstract Syntax Tree 와 소스코드의 실행 흐름 및 변수의 흐름을 그래프로 나타내는 Control Flow Graph/Data Flow Graph 가 Node.js 모듈 취약점 분석에 효율적으로 활용될 수 있음을 서술하고자 한다. Node.js 모듈은 여러 스크립트 파일로 나누어져 있다는 점과 사용자의 입력이 분명하다는 특징이 있다. 또한 자바스크립트 언어를 사용하므로 선언된 변수들의 타입에 따라 적용되는 범위인 scope 가 다르게 적용된다는 특징이 있다. 본 논문에서는 이러한 Node.js 모듈의 특징을 고려하여 Abstract Syntax Tree 및 Control Flow Graph/Data Flow Graph 을 어떻게 생성하고 취약점 분석에 활용할 것인지에 대한 방법론을 제안하고, 실제 분석에 활용할 수 있는 코드 구현을 통하여 구체화시키고자 한다.

An Analysis of Student Satisfaction According to Learning Experience for Non-Face-to-Face and Face-to-Face Methods in Programming Class (프로그래밍 수업에서 비대면과 대면 방식에 대한 학습경험에 따른 만족도 분석)

  • Kim, Kyong-Ah;Kim, Ji Sim;Ahn, You Jung;Oh, Suk;Jin, Myung Sook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.645-647
    • /
    • 2022
  • 코로나 팬더믹으로 인한 비대면 수업은 지속적인 운영을 통해 개선·발전되었다. 2022학년도부터 대면수업으로 전환되면서 온라인 플랫폼에 대한 적응력이 높아지고, 비대면 수업 경험이 축적된 학습자들을 위한 대면 수업의 변화가 필요하게 되었다. 본 논문은 프로그래밍 수업에서 비대면 방식과 대면 방식에 대한 경험이 있는 학습자들의 수업방식에 따른 만족도 및 의견을 조사·분석함으로써 서로 다른 두 방식의 장점을 활용한 수업모델을 모색하는데 필요한 학습자 의견 도출에 그 목적이 있다. 조사 결과, 학습자들은 대면 수업을 선호하나 비대면 학습경험이 많을수록 대면 수업에서의 단점을 비대면 수업을 통해서 해소할 수 있는 부분이 있음을 인지하고, 비대면 방식을 대면 수업에 활용하는 것을 긍정적으로 생각하는 것으로 나타났다. 이를 통해 향후 대면 프로그래밍 수업에서 비대면 방식을 결합한 하이드리드 방식의 수업 운영을 통한 수업 효과 증진 모델이 필요한 것으로 사료된다.

  • PDF

컨테이너 터미널의 내륙운송 효율화를 위한 플랫폼 개발 모델 구축

  • 황제호;조동현;김시현
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.123-125
    • /
    • 2023
  • 4차 산업혁명의 가속화에 따라 해운 항만 산업 분야 또한 정보적 측면에서 빅 데이터에 대한 업종별 통합과 공유를 통해 연계 산업 간 산업활동 효율화를 위한 노력이 요구된다. 현재 물류 분야에 다양한 플랫폼들이 도입되고 있지만 대부분 화물운송업 또는 창고 중개업 분야에 편중되어 있다. 항만산업의 경우 코로나 펜데믹 이후 발생한 컨테이너 반입 제한 및 장치율 증가 등에 따라 운송사와 컨테이너터미널 간 갈등이 지속적으로 유발되는 상황이 발생되었다. 이에 따라 본 연구는 플랫폼을 활용한 컨테이너터미널과 운송사 간 플랫폼 개발의 필요성을 인지하고 상호 기업 간 연계 효율성을 높일 수 있는 방안을 모색하였으며 산업 관계자인 컨테이너터미널 운영사, 운송사, 포워더 업종 종사자들을 대상으로 설문지 기반 실증 분석을 수행하였다. 결과적으로 EFA를 통해 추출된 14가지 요인으로 IPA 분석을 수행한 결과 1사분면(사용 용이성, 보안성, 정보 정확성, 정보 적시성, 차량 반출/반입정보, 공컨테이너 반입/반출 정보, 풀컨테이너 반입/반출정보)으로 품질에 대한 지속적인 개선이 수행되어야 하며 2사분면(APP 시스템 품질)에 대한 고려가 종합적으로 수행되어야 함이 도출되었다. 또한, 플랫폼 개발의 주체와 이용자의 참여 유도가 필요하며 상호 이해관계자 간 효율적인 연계와 효율화를 위한 인식 구조 개선이 필요하다고 나타났다. 연구결과는 향후 컨테이너터미널과 내륙운송의 효율적인 연계를 위한 플랫폼 구축에 중대한 시사점을 제공한다.

  • PDF

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone (정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향)

  • Park, Jong-jin;Choi, Min-kyong;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.105-119
    • /
    • 2017
  • Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.

The Countermeasures of North Korea's Nuclear Weapon Terror (북한의 핵테러와 대응방안)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.129-138
    • /
    • 2014
  • South Korea should correspond to the primary threat to North Korea's nuclear weapons. It is necessary to have countermeasures to solve the realistic problems of North Korea's nuclear weapons. We can intensify military pact between the United States and Korea and at the same time strengthening the current military power. Currently, we take note the threat North Korea's missile. We can not control the development of a nuclear weapon and there are possibilities that North Korea have successfully miniaturized nuclear enough to carry by the missile. We should overview and check the Korea's missile defenses system. While the direction of the overall missile defense system deployment with a focus on lower and upper air defense network. And discuss defense research should be to build a system that can be protected with a key strategic facilities and cities. While North Korea have nuclear weapon, the main issues related to North Korea's nuclear threat. The six party talks countries try to solve the problem by the international and diplomatic approach. At the same time we should make somewhat to defend measures such as military defenses of Kill chain system to protect our country. Kill Chain is on of the effective defense system. We know that North Korea do not abandon to develop nuclear weapons by diplomatic efforts. We should performed in fact by a variety of military suppression method.

A Study on the Effects of After-purchase Feedback About Customer Service Quality on Purchase Process - Focusing on Internet Shopping Mall - (고객 서비스 품질에 대한 구매 후기 댓글이 구매과정에 미치는 영향 - 인터넷 쇼핑몰을 중심으로 -)

  • Shin, Chang-Nag;Kim, Young-Ei;Park, Young-Kyun
    • Journal of Distribution Research
    • /
    • v.14 no.1
    • /
    • pp.27-44
    • /
    • 2009
  • This research classified the customer service factor of on-line shopping mall into tangibility, reliability, responsiveness, and empathy and analyzed the effect that the factors affect to consumer's purchase and re-purchase. If we present suggestions on the basis of these results of study, we would provide next two points: First, purchasers have utilized online shopping mall who pursued free from hard sell that being done in off-line and convenience of purchase affected more by reliability and responsiveness such as the fame of shopping mall that visit, reliability of security, and quick product search than the Customer of After-purchase Feedback influence for online purchasers decision factor out of consumer's purchase and re-purchase by on-line shopping mall customer service factor. Second, This study analyzed that online re-purchaser recognized the Customer of After-purchase Feedback factor high and built their loyalty through friendly emotion of on-line shopping mall and satisfaction of shopping mall service, and recommendation. In addition, they behave themselves as an affirmative messenger that is role of the Customer of After-purchase Feedback that make active opinion presentation and participation through community by important adjustment impact that empathy factor of on-line shopping mall customer service.

  • PDF

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

A Study on Exercise Intervention for Improving Physical Activity for the Disabled: From the Perspective of Convergence Device (장애인 신체활동 증가를 위한 운동중재에 관한 연구: 융합형 디바이스 활용 관점에서)

  • Kang, Sunyoung
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.85-90
    • /
    • 2019
  • The purpose of this study is to analyze the trend of exercise intervention applying various devices to increase the physical activity of the disabled, and to suggest the exercise intervention using converged devices that meet the needs of the times due to the increase of elderly people with disabilities. Exercise intervention using converged devices applicable to the disabled is divided into two types: first, exercise intervention using virtual reality-based gamification, and second, exercise intervention based on wearable devices of wearable or body-attached such as bands and watches. For exercise intervention using converged devices that can be enjoyed by the elderly with disability, minimize of environmental limitations, and easy to personalize, there is a need for configuration requirements such as easy operation and simple rules of operation, easy device installation and wearing, a trainer who can complement immature device utilization. In order to maintain and improve the daily living performance of the elderly with disabilities who experience a significant decrease in their cognitive and physical functions, it is necessary to use a physical activity game that can be experienced and can be interested in everyday life or a variety of devices to increase the amount of physical activity.

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF