• Title/Summary/Keyword: 정보보호품질

Search Result 305, Processing Time 0.028 seconds

The standardization and R&D directions on contents protection technology in UHD broadcasting (UHD방송 콘텐츠 보호기술 개발 및 표준화 추진 방향)

  • Min, J.H.;Koo, H.S.
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.638-641
    • /
    • 2016
  • UHD(Ultra High Definition) broadcasting is an attractive next-generation service of realistic broadcasting that enables you to feels like listening on the spot in ultra-high definition resolution. In addition, the test broadcasting run by UHD broadcasting agencies and UHDTV terminal launch could herald the full-scale UHD broadcasting era. However, in order that UHD broadcasting will be activated, the function of conditional access control and information protection through which we can on pay per view watch the programs of subscriber preference from the channels of various and subdivided genres is essential. To provide a technical foundation for these features and to achieve the UHD TV transition early, determining technology development & standardization strategy through the analysis of the key protection technologies is required In this paper, we propose standardization technologies which our country can lead and present a long-term driving directions by analyzing UHD broadcasting technology & test broadcasting trends and content protection technology & standardization trends.

  • PDF

A Study in the Improvement and Analysis Problem of Privacy Impact Assessment Qualification Criteria: focus on Similarity Analysis between Similar Certificates and Certification System of Privacy Impact Assessment (개인정보영향평가 자격기준의 문제분석과 개선방안 연구 - 유사자격과 개인정보영향평가 자격체계와의 유사성 분석을 중심으로)

  • Kim, Erang;Shim, Mina;Lim, Jong In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.127-142
    • /
    • 2013
  • Since Personal Information Protection Act came into effect on September 2011, PIA(Privacy Impact Assessment) of public institutions has become obliged. Therefore, an increasing demand for PIA professionals is being expected. In domestic, however, no specialized certificates exist and therefore similar certificates have become a requirement for PIA professionals. Henceforth, however, the system based on these similar certificates is to be an obstacle to advancing PIA. Therefore, this study analyzes the sufficiency of current similar certificates compared with the PIA qualification requirements. And then, analyzes the validity of allowance as similar certificates by using this outcome of the validity. As this comparison draws a clear gap between PIA qualification and similar certificates, this paper suggest three suggestions to improve current qualification. Three suggestions are expected to contribute a qualitative improvement of the PIA industry.

A Study on the Supply and Perception of Personal Protective Equipments for Fire Fighters (화재진압대원의 개인보호장구 지급 실태 및 인식에 관한 연구)

  • Choi, Jaehyeong;Kim, Woojae;Kang, Shinwook;Kim, Junggon
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.4
    • /
    • pp.381-388
    • /
    • 2016
  • In this study, we surveyed the supply and perception of Personal Protective Equipments for firefighters. As a result, most of the respondents answered that they were paid in accordance with the supply standard, but 12% of the respondents said that there were insufficient equipment. Also, satisfaction with the performance of the equipment is mostly satisfied, but the safety gloves are more than 50% dissatisfied. In summing up the results of the survey, it is urgently necessary to improve the current supply standard, which is determined by the life of PPE, to the replacement period according to the using time or frequency. Also, a new standard should be prepared through the follow - up study.

Study on Customer's Response to SLA Deployment in Telecommunication Services Industry : Focusing on Customer's Survey on SLA Deployment (통신서비스 서비스수준협약(SLA) 도입에 대한 사용자 반응 연구 : 설문조사결과를 중심으로)

  • 최재경;윤원정
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2004.04a
    • /
    • pp.588-594
    • /
    • 2004
  • 최근 통신서비스 시장 전반적인 성장정체와 경쟁 심화의 영향으로 주요 통신서비스 사업자들은 '고객만족'을 경영의 핵심요소로 설정하고, 다양한 노력을 하고 있다. 이는 신규가입 자 유치가 쉽지 않은 상태에서 고객만족도가 하락할 경우, 결과적으로 가입자 이탈로 이어져 단순한 기업 이미지 하락차원을 벗어나 사업자의 수익에도 직접적인 영향을 미치는 것을 반영하고 있다 이와 관련, 과거의 요금이나 마케팅 차원에서의 가입자 기반 강화 노력에서 탈피해서 서비스 품질에 대한 근본적인 개선과 가입자의 욕구를 미리 파악, 서비스를 제공함으로써 가입자 불만을 최소화하려는 움직임이 증가하고 있다. 특히, 2002년 9월 정보통신부 주도로 초고속인터넷 서비스를 중심으로 서비스수준협약(SLA: Service Level Agreement) 제도가 도입된 이후 아직까지는 제도, 정책, 환경 등의 측면에서 초보적인 수준을 벗어나지는 못 하고 있지만, 통신사업자 입장에서는 점차 증가하는 가입자의 불만에 대응책과 경쟁 사업자 대비 차별화 방안 모색의 필요성 증가로 인해 그 활용도가 증가하고 있다. 이에 본 논문에서는 통신서비스에 대한 SLA 제도 도입과 관련해서 SLA 제도에 대한 사용자의 반응을 파악, 향후 품질보장형 네트워크의 구축, 사용자의 고품질 서비스에 대한 요구 증대, 사용자 보호정책 강화 푸진 등에 따른 통신사업자 입장에서 참고할 만한 사항을 제시 하고자 한다.

  • PDF

A Novel Digital Image Protection using Cellular Automata Transform (셀룰라 오토마타 변환을 이용한 정지영상 보호 방법)

  • Shin, Jin-Wook;Yoon, Sook;Yoo, Hyuck-Min;Park, Dong-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8C
    • /
    • pp.689-696
    • /
    • 2010
  • The goal of this paper is to present a novel method for protecting digital image using 2-D cellular automata transform (CAT). A copyright and transform coefficients are used to generate a new content-based copyright and an original digital image is distributed without any hidden copyright. The parameter, which is called gateway value, for 2-D CAT is consisted of rule number, initial configuration, lattice length, number of neighbors, and etc. Since 2-D CAT has various gateway values, it is more secure than conventional methods. The proposed algorithm is verified using attacked images such as filtering, cropping, JPEG compression, and rotation for robustness.

A Study on the Business Archival System in Korea (한국의 민간기업 기록보존시스템에 관한 연구)

  • 김상호
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.35 no.1
    • /
    • pp.205-228
    • /
    • 2001
  • The purpose of this study is to review the business records management and archival system in Korea. Each private enterprise has several reasons to maintain its own records, archives and historical materials. Those are to meet the legal requirements and the social needs. They are for supporting the business activities and protecting the benefits of corporate. It's needed to establish an integrated knowledge, information, records, and communication center, employing the archivists and records managers who have an ethical sense of duty and the knowledge about business records to improve the current system at own storage facilities.

  • PDF

Development of Reliability Measurement Method and Tool for Nuclear Power Plant Safety Software (원자력 안전 소프트웨어 대상 신뢰도 측정 방법 및 도구 개발)

  • Lingjun Liu;Wooyoung Choi;Eunkyoung Jee;Duksan Ryu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.5
    • /
    • pp.227-235
    • /
    • 2024
  • Since nuclear power plants (NPPs) increasingly employ digital I&C systems, reliability evaluation for NPP software has become crucial for NPP probabilistic risk assessment. Several methods for estimating software reliability have been proposed, but there is no available tool support for those methods. To support NPP software manufacturers, we propose a reliability measurement tool for NPP software. We designed our tool to provide reliability estimation depending on available qualitative and quantitative information that users can offer. We applied the proposed tool to an industrial reactor protection system to evaluate the functionality of this tool. This tool can considerably facilitate the reliability assessment of NPP software.

Necessity of Grade Designation for Location Information (위치정보 등급제 도입의 필요성)

  • Kim Tae-Sung;Yoo Hye-Won;Nam Kwang-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2B
    • /
    • pp.164-173
    • /
    • 2006
  • It is essential to ensure public use of and privacy of location information for promoting the location based services. The grade designation for location information is required to accomplish them. The grade designation for location information can increase the reliability of location information and reinforce the right of choice for user. Therefore the institution of grade designation for location information should be introduced rapidly to keep up with the growth of the location based services industry.

For Improving Security Log Big Data Analysis Efficiency, A Firewall Log Data Standard Format Proposed (보안로그 빅데이터 분석 효율성 향상을 위한 방화벽 로그 데이터 표준 포맷 제안)

  • Bae, Chun-sock;Goh, Sung-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.157-167
    • /
    • 2020
  • The big data and artificial intelligence technology, which has provided the foundation for the recent 4th industrial revolution, has become a major driving force in business innovation across industries. In the field of information security, we are trying to develop and improve an intelligent security system by applying these techniques to large-scale log data, which has been difficult to find effective utilization methods before. The quality of security log big data, which is the basis of information security AI learning, is an important input factor that determines the performance of intelligent security system. However, the difference and complexity of log data by various product has a problem that requires excessive time and effort in preprocessing big data with poor data quality. In this study, we research and analyze the cases related to log data collection of various firewall. By proposing firewall log data collection format standard, we hope to contribute to the development of intelligent security systems based on security log big data.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.