• Title/Summary/Keyword: 정보보호산업

Search Result 1,278, Processing Time 0.029 seconds

A Study on the Improvement of Domestic Policies and Guidelines for Secure AI Services (안전한 AI 서비스를 위한 국내 정책 및 가이드라인 개선방안 연구)

  • Jiyoun Kim;Byougjin Seok;Yeog Kim;Changhoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.975-987
    • /
    • 2023
  • With the advancement of Artificial Intelligence (AI) technologies, the provision of data-driven AI services that enable automation and intelligence is increasing across industries, raising concerns about the AI security risks that may arise from the use of AI. Accordingly, Foreign countries recognize the need and importance of AI regulation and are focusing on developing related policies and regulations. This movement is also happening in Korea, and AI regulations have not been specified, so it is necessary to compare and analyze existing policy proposals or guidelines to derive common factors and identify complementary points, and discuss the direction of domestic AI regulation. In this paper, we investigate AI security risks that may arise in the AI life cycle and derive six points to be considered in establishing domestic AI regulations through analysis of each risk. Based on this, we analyze AI policy proposals and recommendations in Korea and validate additional issues. In addition, based on a review of the main content of AI laws in the US and EU and the analysis of this paper, we propose measures to improve domestic guidelines and policies in the field of AI.

Adaptive Power Saving Mechanism of Low Power Wake-up Receivers against Battery Draining Attack (배터리 소모 공격에 대응하는 저전력 웨이크업 리시버의 적응형 파워 세이빙 메커니즘)

  • So-Yeon Kim;Seong-Won Yoon;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.393-401
    • /
    • 2024
  • Recently, the Internet of Things (IoT) has been widely used in industries and daily life that directly affect human safety, life, and assets. However, IoT devices, which need to meet low-cost, lightweight, and low-power requirements, face a significant problem of shortened battery lifetime due to battery draining attacks and interference. To solve this problem, the 802.11ba standard for the Wake-up Receiver (WuR) has emerged, this feature is playing a crucial role in minimizing energy consumption. However, the WuR protocol did not consider security mechanisms in order to reduce latency and overhead. Therefore, in this study, anAdaptive Power Saving Mechanism (APSM) is proposed for low-power WuR to counter battery draining attacks. APSM can minimize abnormally occurring power consumption by exponentially increasing power-saving time in environments prone to attacks. According to experimental results, the proposed APSM improved energy consumption efficiency by a minimum of 13.77% compared to the traditional Legacy Power Saving Mechanism (LPSM) when attack traffic ratio is 10% or more of the total traffic.

Research on the Investment environment changes and the business tax and value added tax in China (대중국 투자환경변화와 영업세 및 증치세에 관한 연구)

  • Park, Sang-Seob;Shin, Jae-Yeol;Pyun, Marley
    • Management & Information Systems Review
    • /
    • v.32 no.4
    • /
    • pp.127-153
    • /
    • 2013
  • The trend of China's industry has been changed from manufacturing industry based on cheap labor market to service industries gradually as a whole. The investment of Korean corporations toward Chines service industry is gradually being increased. The importance of Chinese service industry related taxations such as business tax and value-added tax are growing. This study, therefore, examines the changes of investment environment and does the business tax and VAT of growing importance in China. From the point of view that the taxation on services is mainly related to the business tax or VAT, this study, also, examines the changes of present condition of investment and corresponding trends of the Korean corporations, in accordance with the domestic investment environment changes tied to the business tax and the VAT in China. With regard to the business tax and the VAT, this study looks into their features and tax requisition and also makes comparison between them and VAT of Korea. This study examines the problems and situations from the cases of separation, integration and trial integration of the business tax and VAT, and also does the development direction of the above two taxation and the corresponding strategy of Korea and her companies The purpose of this study is to provide information about the changing trends of investment environment and the business tax and VAT and to present corresponding plan for the corporations advancing into China.

  • PDF

A Study on Smart Ground Resistance Measurement Technology Based on Aduino (아두이노 기반 IT융합 스마트 대지저항 측정 기술 연구)

  • Kim, Hong Yong
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.684-693
    • /
    • 2021
  • Purpose: The purpose is to establish a safe facility environment from abnormal voltages such as lightning by developing a smart land resistance measuring device that can acquire real-time land resistance data using Arduino. Method: This paper studied design models and application cases by developing a land resistance acquisition and analysis system with Arduino and a power line communication (PLC) system. Some sites in the wind power generation complex in Gyeongsangnam-do were selected as test beds, and real-time land resistance data applied with new technologies were obtained. The electrode arrangement adopted a smart electrode arrangement using a combination of a Wenner four electrode arrangement and a Schlumberger electrode arrangement. Result: First, the characteristic of this technology is that the depth of smart multi-electrodes is organized differently to reduce the error range of the acquired data even in the stratigraphic structure with specificity between floors. Second, IT convergence technology was applied to enable real-time transmission and reception of information on land resistance data acquired from smart ground electrodes through the Internet of Things. Finally, it is possible to establish a regular management system and analyze big data accumulated in the server to check the trend of changes in various elements, and to model the optimal ground algorithm and ground system design for the IT convergence environment. Conclusion: This technology will reduce surge damage caused by lightning on urban infrastructure underlying the 4th industrial era and design an optimized ground system model to protect the safety and life of users. It is also expected to secure intellectual property rights of pure domestic technology to create jobs and revitalize our industry, which has been stagnant as a pandemic in the post-COVID-19 era.

A Study on the Improvement of Response System through the Case of Heavy Rain Disaster Response (폭우재난 대응 사례를 통한 대응체계 개선방안 연구)

  • Woo Sub Shim;Sang Beam Kim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.597-607
    • /
    • 2023
  • Purpose: The Ministry of Employment and Labor has been working hard to ensure the safety of workers due to heavy rain during natural disasters as the responsible ministry in charge of preventing industrial accidents and health problems for workers. Accordingly, the Ministry of Employment and Labor intends to analyze actual cases of responding to heavy rain disasters and suggest ways to improve the response system. Method: An emergency response system implemented to respond to heavy rain disasters with an internal expert group composed of those in charge of disaster work at headquarters, local government offices, and Korea Occupational Safety and Health Agency, and an external expert group composed of professors, consulting representatives, and disaster managers from other ministries. Contents on self-inspection by industry, workplace inspection, use of serious siren, safety management and restoration work guidance were reviewed. Result: First of all, it is necessary to check the regular contact system from time to time, and it is also necessary to prepare and distribute detailed self-checklists for each industry. In addition, it is necessary to check the implementation of self-inspection when inspecting workplaces, and it seems necessary to have measures to increase the readability of information notified through serious disaster sirens. In addition, since safety work is done in the form of a contract, it seems necessary to prepare specific safety guidelines. Conclusion: In order to protect the lives of workers due to seasonal harm and risk factors, unlike the passive coping methods of the past, abnormal weather should not be regarded as an unexpected situation, and it should be actively and preemptively responding beyond the conventional framework.

The Attitude of the Internet Users to Real-Name System and Suggestions for Measures to Handle Adverse Effects of Anonymity - Focused on Comparison between a Group of Experts and a Group of Non-Experts - (인터넷 이용자의 실명제에 대한 태도와 익명성의 역기능 대처 방안 - 관련 종사자 집단과 일반 사용자 집단의 비교를 중심으로 -)

  • Baek, Shin-Jung
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.315-326
    • /
    • 2010
  • Today's society is being caught in a whirlpool of change that is not behind the Industrial Revolution, the Reformation and so on. Technological determinism is the most general perspective that explains information society. It is the belief that information technology will bring about a particular form of information society. It is the opinion that the sequence of change of technology is inevitable and asks for a particular social change(Kim, 2006). When technology asks for it, however, not only the degree of technological development but also the credibility of the degree of technological development plays an important role in changing a society. This study was implemented based on the opinion that social change and individual change can vary depending on the degree of trust of people in the Internet technology. This study analyzes preferences of real-name system depending on the credibility of anonymity on the Internet and its influences on the behaviors of users, focused on the survey on the difference between ordinary users and users related to the Internet business. It also suggests not only the potential and the appropriateness of anonymity on the Internet, but also measures to alleviate adverse effects of it. Lastly, the objective of this study is to offer a dispute of real-name system and the standard of the anonymity policy on web sites.

Designing a Platform Model for Building MyData Ecosystem (마이데이터 생태계 구축을 위한 플랫폼 모델 설계)

  • Kang, Nam-Gyu;Choi, Hee-Seok;Lee, Hye-Jin;Han, Sang-Jun;Lee, Seok-Hyoung
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.123-131
    • /
    • 2021
  • The Fourth Industrial Revolution was triggered by data-driven digital technologies such as AI and big data. There is a rapid movement to expand the scope of data utilization to the privacy area, which was considered only a protected area. Through the revision of the Data 3 Act, laws and systems were established that allow personal information to be freely transferred and utilized under their consent. But, it will be necessary to support the platform that encompasses the entire process from collecting personal information to managing and utilizing it. In this paper, we propose a platform model that can be applied to building mydata ecosystem using personal information. It describes the six essential functional requirements for building MyData platforms and the procedures and methods for implementing them. The six proposed essential features describe consent, sharing/downloading/ receipt of data, data collection and utilization, user authentication, API gateway, and platform services. We also illustrate the case of applying the MyData platform model to real-world, underprivileged mobility support services.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.

Authentication Protocol of Private Code-based for Advanced Security of RFID System (RFID 시스템 보안 강화를 위한 비공개 코드 기반의 인증 프로토콜)

  • Jang, Bong-Im;Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.737-744
    • /
    • 2010
  • The use of RFID recently tends to increase and is expected to expand all over the industry and life. However, RFID is much vulnerable to the malign threats such as eavesdropping, replay attack, spoofing attack, location tracking in the process of authentication. In particular, it is difficult to apply authentication protocol used in the other previous system to low-priced RFID tag. After all, this paper suggests the scheme of efficient authentication protocol for RFID privacy protection. Compared to the previous scheme, suggested scheme reinforces the checking process of transmission data and is secure from eavesdropping and spoofing attack. It minimizes the operation work of the tag and is very useful to apply to the low-priced tag. It also has the merit to confirm the efficiency of communication by reducing the communication rounds.

Study on the Improvement of Laws Related to the Electromagnetic Wave of Mobile Phones

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.231-240
    • /
    • 2020
  • Countries around the world have already taken direct and indirect measures to warn of the harmful effects of mobile phone electromagnetic waves. On the other hand, in the Republic of Korea the installation of Wi-Fi has been expandedwithout restrictions by location, and there is a widespread atmosphere of protesting human rights violations even if young students cannot use mobile phones, ignoring problems caused by the use of mobile phones. Human brain cells are increasingly exposed to electromagnetic waves of mobile phones as the penetration rate of smartphones grows.In order to solve the long-lasting question of whether electromagnetic waves from mobile phones will harm the human body, many studies are being conducted in various countries around the world, andthe recently published findingshave warned of the potential for harm. The labeling of electromagnetic waves alone is not sufficient to raise awareness about the dangers of electromagnetic waves. It is necessary that the Republic of Korea organize and operate a national electromagnetic wave research center in line with its status as an IT powerhouse, along with the revision of the Radio Wave Act, which directly warns the public about the hazards of mobile phone electromagnetic waves and can directly impose obligations on the mobile phone industry.