• Title/Summary/Keyword: 정보보호 요구사항

Search Result 658, Processing Time 0.023 seconds

Study on the Methods of Security and Quality Evaluation of smart Healthcare System (스마트 헬스케어 시스템의 보안성 품질평가 방법에 대한 연구)

  • Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.11
    • /
    • pp.251-259
    • /
    • 2017
  • Recently, the smart healthcare industry that grafted the Internet of Things (IoT) onto the healthcare and medical services is being highlighted. Smart healthcare refers to the healthcare and medical services offered on the basis of information communication technologies including application, wearable devices and platforms, etc. The number of next generation smart healthcare devices are increasing in the smart healthcare industry through the combination of information technology (IT) and Bio Technology (BT), which are the most active areas among the 6T, which are the areas of the next generation industry. With the emergence of a diverse range of smart healthcare systems or devices, whether the smart healthcare system can be linked with other systems organically and the security and quality of the system have become important elements of evaluation. In this Study, the characteristics and service types of smart healthcare systems were examined, and the trends in the technology and industry of the smart healthcare system were analyzed. Moreover, this Study aims to develop the evaluation method for security and standards for quality evaluation by deducing the factors for the evaluation of smart healthcare system on the basis of the results of aforementioned examination. It is anticipated that this can induce improvement of quality and development of highly reliable products of a smart healthcare system, and will become the core technology to substitute the technology protection barrier.

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

The Grounding Method Application of Power Plant Simulator (발전소 시뮬레이션시스템 접지방식 연구를 위한 타시스템 접지방식 분석)

  • 오영일
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1999.10a
    • /
    • pp.70-74
    • /
    • 1999
  • 발전소 시뮬레이션 시스템 기술은 종합적인 지식을 바탕으로 자료수집 및 분석, 소프트웨어 개발 환경, 수학적 모델, 전산기 구성, 각종 계기류 설계 및 구매 장착 등의 노하우를 알아야만 제작할 수 있는 종합적인 기술이다. 또 지시기반의 기술이며 부가가치가 높은 기술이기 때문에 선진 각국에서는 계측제어 시스템의 기술개발 및 시장 확대를 위하여 힘을 쓰는 동시에 타국으로의 기술정보 유출을 경계하는데 신경을 곤두세우고 있다. 현재 복잡화되어 가고 있는 산업 사회의 전력 수요에 대한 대폭적인 증가 추세에 따라 발전소에서는 보다 효율적이며 합리적이고 경제적인 전력 공급을 위해서 전력 생산에 대한 신뢰성 향상 및 안정성 확보는 물론, 효율성 높은 운전이 절실히 요구되고 있다. 한편, 국내의 시뮬레이션 시스템 분야 기술은 아직도 완벽한 수준에는 미치지 못하며, 이 분야의 기술력 확보 및 신기술 개발은 향후 미래의 모든 시스템산업의 성쇄를 판가름하는 아주 중요한 척도가 될 것이다. 이 중에서 접지 분야는 고전압 혼촉에 의한 저압측 선로의 전압상승 방지, 모선(Bus)이나 전력 기기의 절연보호 및 회로전압의 안정등으로 시스템 성능을 한층 증가 시켜줄 뿐아니라 기기의 오동작이나 낙뇌등으로 인명피해 발생을 없애주는 아주 중요한 분야임에도 불구하고 이 분야의 국내 관련법규등이 미비한 사항이다. 그래서 발전소 분산제어 시스템분야의 장기간 신뢰성 및 안정성을 가지고 있고, 국내에서 많이 사용하는 미국 Bailey의 infi-90 및 독일 ABB의 Procontrol-P를 비교 분석하여 발전소 시뮬레이션 시스템의 접지에 응용 하고져 한다.상호 발생기를 이용한 다양한 시스템 검증 및 분석에 이용할 수 있을 것이다. 본 논문은 가상호 발생기의 구조와 최대 용량 시험 방법을 소개하고, 더 나아가 호 Traffic에 대한 최대 용량 시험뿐 아니라 QoS를 향상시키기 위한 교환 시스템의 제반 성능 시험 및 분석에 이를 이용하기 위해 개선이 필요함을 서술하고자 한다.textrm{m}$~3.4$\mu\textrm{m}$ 범위에서의 투과 및 흡수 스펙트럼을 측정하였다. 결정 성장 결과 B3+, Er3+, Cr3+ 이온은 Ti4+ 이온과 이온의 크기 차이가 심하여 결정의 정상적인 성장을 방해하는 물성을 나타냈고, V5+, Cr3+ 이온은 흑색의 결정, Fe3+ 이온은 적갈색의 결정으로 성장되었다. Al3+, Zr4+, Al3+의 순서로 투과도가 높아지는 것이 관찰되었다. 불순이온의 농도에 따른 영향으로서 Al3+ 이온의 경우 주입농도가 높아질수록 low angle boundary와 oxygen deficiency가 감소하였고, 투과율은 조금 감소하거나 큰 차이가 없는 것으로 나타났다. 반면에 Cr3+ 이온을 주입한 경우 0.003 atomic%에서 최적의 물성을 보였으며, 주입농도가 높아질수록 결정성장이 어려워지고 광의 투과도가 급격히 저하되었다.은 1.3을 나타내었다.로 보인다.하면 수평축과 수직축의 분산 장벽의 비에 따라 cluster의 두께비가 달라지는 성장을 볼 수 있었고, 한 축 방향으로의 팔 넓이는 fcc(100) 표면의 경우 동일한 Ed+Ep값에 대응하는 팔 넓이와 거의 동일한 결과가 나타나는 것을 볼 수 있다. 따라서 이러한 비대칭적인

  • PDF

Infection Control in Pulmonary Function Laboratories in Domestic Hospitals (국내 의료기관의 폐기능검사실에서 감염관리 실태조사)

  • Nan-Hee LEE;Suhng Wook KIM
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.55 no.3
    • /
    • pp.143-150
    • /
    • 2023
  • The global outbreak of COVID-19 has underscored the pressing need for robust infection control practices in pulmonary function laboratories (PFL). However, the existing guidelines and regulatory frameworks provided by relevant authorities in the country have revealed certain deficiencies in effectively addressing this significant public health crisis. This study surveyed the infection control regulations, disposable item usage, ventilation facilities, spatial separation, and the configuration of entrance doors in 51 domestic hospital facilities from Oct 1, 2021, to Nov 2, 2021. The survey findings revealed that while there was a relatively satisfactory adherence to airborne, droplet, and contact precautions with adequate awareness and utilization of personal protective equipment, the environmental disinfection practices exhibited a suboptimal performance rate of 39.22% per patient. Depending on the specific survey domains, substantial variations were observed in the utilization of disposable items (81.05%), ventilation systems (45.75%), dedicated testing spaces (80.39%), separation of administrative areas (15.69%), and the installation of automated doors (19.61%). This study not only highlights the paramount importance of infection control in PFLs within domestic medical institutions but also provides foundational data for developing and enhancing standardized guidelines that align with international benchmarks for infection control in these settings.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

A Study on Establishment of the Optimum Mountain Meteorological Observation Network System for Forest Fire Prevention (산불 방지를 위한 산악기상관측시스템 구축방안)

  • Lee, Si-Young;Chung, Il-Ung;Kim, Sang-Kook
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.1
    • /
    • pp.36-44
    • /
    • 2006
  • In this study, we constructed a forest fire danger map in the Yeongdong area of Gangwon-do and Northeastern area of Gyeongsangbuk-do using a forest fire rating model and geographical information system (GIS). We investigated the appropriate positions of the automatic weather station (AWS) and a comprehensive network solution (a system including measurement, communication and data processing) for the establishment of an optimum mountain meteorological observation network system (MMONS). Also, we suggested a possible plan for combining the MMONS with unmanned monitoring camera systems and wireless relay towers operated by local governments and the Korea Forest Service for prevention of forest fire.

The Analyses of Geographers지 Roles and Demands in Korean GIS Industries (GIS 산업에 있어서 지리학의 역할 및 수요에 대한 분석)

  • Chang Eun-mi
    • Journal of the Korean Geographical Society
    • /
    • v.39 no.4
    • /
    • pp.643-664
    • /
    • 2004
  • This study aims to review what geographers have contributed to GIS industries and national needs. To-be-geographers and geographers are expected to meet the gap between what we have teamed in school and what we have to do after graduation. The characteristics of GIS industry in the 1990 are summarized with approximate evaluation of the contribution of geographers in each stage. Author introduced the requirement for the licenses of geomatics and geospatial engineering experts and the other licenses, which are important to get a job in GIS industry from 2003 to 2004. A set of questionnaire on the user's requirements was given to GIS people in private companies and public GIS research centers and analyzed. Author found that they put an emphasis on hands-on experiences and programming skills. no advantages or geography such as capability or integration and inter-disciplinary collaboration were not appreciated. The prospects for the GIS tend to be positive but the reflectance of the prospect was not accompanied by at the same degree of preference for geography. Most government strategies for the next ten years' GIS focus on new-growth leading industries. SWOT(strength, weakness, opportunity, threat) analysis of geography for GIS industry will give some directions such as telematics, regional marketing strategies with web-based GIS technology, location based service. That means intra-disciplinary study in geography will evoke the potentiality of GIS, compared with interdisciplinary studies.