• Title/Summary/Keyword: 정보보안관리체계

Search Result 517, Processing Time 0.028 seconds

Analyses of Total Information Security Infrastructure of School Affairs Information System for Secure Ubiquitous-Campus (안전한 Ubiquitous-Campus를 위한 학사정보시스템의 종합정보보안 체계 구축에 관한 분석)

  • Kim, Jung-Tae;Lee, Jun-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.287-291
    • /
    • 2006
  • E-learning has increased on importance as people realize that the use of technology can improve the teaming process. Consequently, new learning environments have been developed. However, in general they are oriented to address a specific e-learning functionality. Therefore, in most of the cases, they are not developed to interoperate with other e-learning tools, which makes the creation of a fully functional e-learning environment more difficult. We analyses of total information security infrastructure of school affairs information system for secure ubiquitous campus.

  • PDF

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Economic impact of the technical security utilizing the inter-industry relations table (산업연관표를 활용한 기술보안의 경제적 효과)

  • Lim, Heon-Wook;Shim, Jae-Young
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.99-106
    • /
    • 2017
  • Research on technology security has been limited to technology leakage prevention. Companies recognize technology security as an investment. so It is a passive situation for recruitment and equipment installation. Therefore, the amount of damage caused by the technology leakage is regarded as profit, The purpose of this study is to investigate the effect of technology security on the domestic economy by using the inter-industry relations table. The inter-industry relations table was created by Vasily Leontiyev. In 1960, the Bank of Korea made it for the first time in Korea. Korea introduced the ISMS in 2001 and conducted a study on the technology security economy. Through this study, we hope that technology security will be recognized as income, not investment.

The Effect of Trust and Distrust on the Purchase Intention at Internet Shopping Malls - Focusing on the Chinese Users - (인터넷 쇼핑몰에서 신뢰와 불신이 구매의도에 미치는 영향 - 중국 인터넷 쇼핑몰 사용자를 중심으로 -)

  • Park, Hye-Ryeong;Lee, Jin-Yong
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2006.05a
    • /
    • pp.103-115
    • /
    • 2006
  • 중국은 세계 무역기구에 가입하면서 세계경제에서 차지하는 위치가 강화되고 디지털 경제체제에 편입되면서 산업구조를 고부가가치 산업으로 개편하고 있다. 동안 상대적으로 외국기업에 대해 폐쇄적이었던 중국의 유통시장은 2006년부터 전면개방이 시작될 것으로 전망되고 있다. 그러나 중국전자상거래 시장에서 정보 기초화와 물류배송 금융체계의 문제는 나날이 안정화되어 온라인 구매환경은 나아지고 있으나, 오히려 해마다 인터넷쇼핑물 구매율의 하락은 온라인 쇼핑몰 상거래에 대한 불신 문제가 그대로 남아있음을 알 수 있다. 따라서 본 연구에서는 중국의 소비자수준에서의 온라인 구매가 활성화되지 못하는 주요 장애요인으로써 불신(distrust)을 제기하고자 하며 신뢰를 신뢰와 불신의 2차원으로 파악하여 각각의 차원(신뢰와 불신)이 마케팅 성과에 차별적으로 공헌하고 있음을 밝히고자 한다. 본 연구에서 선행변수로 상호작용, 지각된 평판, 정보유용성, 지각된 보안위험, 지각된 거래위험을 설정했으며 매개변수로는 신뢰와 불신을, 결과 변수로는 관계몰입과 구매의도로 구성하였다. 결과에서는 온라인 맥락에서는 신뢰와 불신의 선행요인이 온라인 쇼핑몰에 대한 관계몰입과 구매의도에 서로 차별적으로 공헌한다는 것을 밝혔다. 이는 기존의 신뢰를 2차원으로 구분하여 신뢰와 불신으로 분리하여 관리하는 것이 필요하다는 것을 시사한다고 할 수 있다.

  • PDF

A Study on Security Architecture for Digital Content Dissemination (디지탈 컨텐츠 배포를 위한 보안 체계에 관한 연구)

  • 김대엽;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.147-155
    • /
    • 2003
  • The diffusion of internet infrastructure and a fast increase of Population to use it is becoming a base of the service that can use various information, data and digital contents which were provided through off-line physically and used. Recently, the. techniques for copy deterrence and copyright protection have been important in e-commerce because various contents in digital form can be duplicated easily. The Access Control(AC) technique that only a user having the qualifications can access and use contents normally has been studied. The Conditional Access System(CAS) used in a satellite broadcasting md Digital Right Management System(DRMS) used for contents service are representative models of current commercialized access control. The CAS and DRM can be considered as an access control technique based on the payment based type(PBT). This paper describe the access control method of payment free type(PFT) suggested in [5] which are independent on the payment structure. And then we suggest a new access control method of payment free type which is more efficient than the previous one.

Study of Information Hiding Methods for SONAR Images in the Naval Combat System (정보은닉기법을 적용한 함정 전투체계 소나 영상의 정보관리 방안 연구)

  • Lee, Joon-Ho;Shin, Sang-Ho;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.779-788
    • /
    • 2015
  • The SONAR waterfall image(SWI) is used typically to target detection in SONAR operation and is managed with additional data linked in the naval combat system. The SWI and additional data are very important to classify a kind of target. Although additional data of the SWI is essential and must be kept together with the SWI, it was stored separately in the current system. In this paper, we propose an improved information management method in the naval combat system, where additional data can be contained in the SWI together by using information hiding techniques. The experimental results show that the effectiveness of information hiding techniques in the naval combat system. It is demonstrated that the information hiding techniques can be applied to the SWI that can make the naval combat system to be robust and secure.

A Study on the Revision Direction of National Geographic Information System Law and Institution (국가GIS 법.제도의 개정방향에 관한 연구)

  • Kim, Tae-Jin;Park, Jong-Taek
    • Spatial Information Research
    • /
    • v.14 no.2 s.37
    • /
    • pp.191-209
    • /
    • 2006
  • This study is analyzing what necessary law and institution is to solve various problem that is happened in process that execute the first$\sim$second National GIS Master Plan in the meantime at visual point that the second National GIS Master Plan(2001-2005) period is expired. Specially, it is that present what improvement direction of law and institution by each field is. Minimize of obstacle factors far National GIS Master Plan is purposeful during the third National GIS Master Plan period. To achieve study purpose, this study analyzes background of National GIS law and institution, objective, system. It is expected that of this article can contribute to the picture of National GIS law and institution.

  • PDF

A Study on Measures for Preventing Credit Card Fraud (신용카드 부정사용 방지 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.33-40
    • /
    • 2016
  • Credit card is means of payment used like cash in terms of function and its users have increased consistently. With development of Internet and electronic commerce a role as payment method of credit card has been growing. But as the risk which results from centralized information and online increases, credit card fraud is also growing. Card theft and loss are decreasing due to countermeasure of card companies and financial supervisory authorities, while card forge and identity theft are increasing. Recently because of frequent personal information leakage and deregulation of financial security following easy-to-use payment enforcement, customer's anxiety about card fraud is growing. And the increase of card fraud lowers trust on credit system as well as causes social costs. In this paper, the security problems of card operating system are addressed in depth and the measures such as immediate switch to IC card terminals, introduction of new security technology, supervision reinforcement of the authorities are proposed.

A Study on Standardization of Copyright Collective Management for Digital Contents (디지털콘덴츠 집중관리를 위한 표준화에 관한 연구)

  • 조윤희;황도열
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.301-320
    • /
    • 2003
  • The rapidly increasing use of the Internet and advancement of the communication network, the explosive growth of digital contents from personal home pages to professional information service the emerging file exchange service and the development of hacking techniques . these are some of the trends contributing to the spread of illegal reproduction and distribution of digital contents, thus threatening the exclusive copyrights of the creative works that should be legally protected Accordingly, there is urgent need for a digital copyright management system designed to provide centralized management while playing the role of bridge between the copyright owners and users for smooth trading of the rights to digital contents, reliable billing, security measures, and monitoring of illegal use. Therefore, in this study, I examined the requirements of laws and systems for the introduction of the centralized management system to support smooth distribution of digital contents, and also researched on the current status of domestic and international centralized management system for copyrights. Furthermore, 1 tried to provide basic materials for the standardization of digital contents copyright management information through the examination of the essential elements of the centralized digital contents management such as the system for unique identification the standardization for data elements, and the digital rights management (DHM) .

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.