• Title/Summary/Keyword: 키관리

Search Result 1,065, Processing Time 0.033 seconds

Insider Threat Detection Technology against Confidential Information Loss using Email (이메일을 통한 기밀정보 유출 유형의 내부자 위협 탐지 기술)

  • Youngjae Lee;Seongwon Kang;Kyungmi Kim;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.217-218
    • /
    • 2023
  • 내부자 위협이란, 조직의 보안 및 데이터, 시스템에 대한 내부 정보에 접근하는 현 임직원 및 전 임직원, 계약자와 같이, 동일한 조직 내부의 사람들로부터 발생하는 위협을 의미한다. 일반적으로 내부자들은 업무를 위하여, 시스템에 대한 합법적인 접근 권한을 가지며, 만약 이러한 권한이 오남용되는 경우에는 조직에 매우 심각한 피해를 입힐 수 있다. 이러한 내부자 위협은 외부로부터의 위협보다 방어 및 탐지가 훨씬 어려운 한계점이 있으며, 그 피해 규모가 매우 방대하다는 문제점도 존재한다. 이에 따라, 본 논문에서는 내부자 위협을 탐지하기 위하여, 이메일을 통한 기밀정보를 유출하는 유형의 위협에 대응하는 방안을 제안한다. 제안하는 방안은 조직 내에서 이메일을 발신하는 경우를 대상으로, 파일이 포함된 이메일에 발신자를 식별하기 위하여, 파일에 키 값 및 서명을 삽입하며, 발신되는 이메일을 모니터링하여 첨부된 파일의 유형을 파악함으로써, 동적 그래프를 통하여 시각화한다. 내부 시스템 및 네트워크에서의 보안관제 담당자 및 관리자는 시각화된 그래프를 확인함으로써, 직관적으로 정보 유출을 파악하고 대응할 수 있을 것으로 판단된다. 본 논문에서 제안하는 방안을 통하여, 조직 내의 내부자 위협을 탐지할 수 있으며, 데이터 유출 사고가 발생하는 경우, 유출자를 빠르게 식별하고 초기에 대응할 수 있을 것으로 판단된다.

  • PDF

User privacy protection model through enhancing the administrator role in the cloud environment (클라우드 환경에서 관리자 역할을 강화한 사용자 프라이버시 보호 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.79-84
    • /
    • 2018
  • Cloud services are readily available through a variety of media, attracting a lot of attention from users. However, there are various security damages that abuse the privacy of users who use cloud services, so there is not enough technology to prevent them. In this paper, we propose a protection model to safeguard user's privacy in a cloud environment so as not to illegally exploit user's privacy. The proposed model randomly manages the user's signature to strengthen the role of the middle manager and the cloud server. In the proposed model, the user's privacy information is provided illegally by the cloud server to the user through the security function and the user signature. Also, the signature of the user can be safely used by bundling the random number of the multiplication group and the one-way hash function into the hash chain to protect the user's privacy. As a result of the performance evaluation, the proposed model achieved an average improvement of data processing time of 24.5% compared to the existing model and the efficiency of the proposed model was improved by 13.7% than the existing model because the user's privacy information was group managed.

Automatic Summary Method of Linguistic Educational Video Using Multiple Visual Features (다중 비주얼 특징을 이용한 어학 교육 비디오의 자동 요약 방법)

  • Han Hee-Jun;Kim Cheon-Seog;Choo Jin-Ho;Ro Yong-Man
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.10
    • /
    • pp.1452-1463
    • /
    • 2004
  • The requirement of automatic video summary is increasing as bi-directional broadcasting contents and various user requests and preferences for the bi -directional broadcast environment are increasing. Automatic video summary is needed for an efficient management and usage of many contents in service provider as well. In this paper, we propose a method to generate a content-based summary of linguistic educational videos automatically. First, shot-boundaries and keyframes are generated from linguistic educational video and then multiple(low-level) visual features are extracted. Next, the semantic parts (Explanation part, Dialog part, Text-based part) of the linguistic educational video are generated using extracted visual features. Lastly the XMI- document describing summary information is made based on HieraTchical Summary architecture oi MPEG-7 MDS (Multimedia I)escription Scheme). Experimental results show that our proposed algorithm provides reasonable performance for automatic summary of linguistic educational videos. We verified that the proposed method is useful ior video summary system to provide various services as well as management of educational contents.

  • PDF

Secure and Efficient Client-side Deduplication for Cloud Storage (안전하고 효율적인 클라이언트 사이드 중복 제거 기술)

  • Park, Kyungsu;Eom, Ji Eun;Park, Jeongsu;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.83-94
    • /
    • 2015
  • Deduplication, which is a technique of eliminating redundant data by storing only a single copy of each data, provides clients and a cloud server with efficiency for managing stored data. Since the data is saved in untrusted public cloud server, however, both invasion of data privacy and data loss can be occurred. Over recent years, although many studies have been proposed secure deduplication schemes, there still remains both the security problems causing serious damages and inefficiency. In this paper, we propose secure and efficient client-side deduplication with Key-server based on Bellare et. al's scheme and challenge-response method. Furthermore, we point out potential risks of client-side deduplication and show that our scheme is secure against various attacks and provides high efficiency for uploading big size of data.

Development and Operation of Marine Environmental Portal Service System (해양환경 포탈서비스시스템 구축과 운영)

  • 최현우;권순철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.338-341
    • /
    • 2003
  • According to a long-term master plan for the implementing of MOMAF's marine environmental informatization, we have developed marine environment portal web site which consists of 7 main-menu and 39 sub-menu including various types of contents (text, image and multimedia) based on RDBMS. This portal site was opened in Oct., 2002 (http://www.meps.info). Also, for the national institutions' distributed DB which is archived and managed respectively the marine chemical data and biological data, the integrated retrieval system was developed. This system is meaningful for the making collaborative use of real data and could be applied for data mining, marine research, marine environmental GIS and making-decisions.

  • PDF

An Integrated Authentication System for Mobile Codes (이동코드를 위한 통합 인증 시스템)

  • Bae, Seong-Hun;Lee, Su-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.535-542
    • /
    • 2001
  • Mobile codes such as Java, Java-Script, ActiveX, and Script code are loaded into a client system first and then run without any notice to the client user. Executing code by this mechanism may cause various security problems such as flowing out system information, deleting or modifying files, and exhausting system resources. In this paper we propose an integrated authentication system to establish the uniform security countermeasure on various mobile codes. The system helps to solve to problems mentioned above. An integrated authentication system allows to load into an interpreter using ACL (Access Control List) which sets up an access authority to the executable contents and communicates with an interpreter using client/server model.

  • PDF

Coastal Safety Facility based on Human Engineering (인간공학에 의한 연안역 안전시설)

  • Lee, Ho Sung;Youn, Sang Ho;Yi, Gyu Sei
    • 한국방재학회:학술대회논문집
    • /
    • 2011.02a
    • /
    • pp.215-215
    • /
    • 2011
  • 1996년도 UN해양법협약의 발효와 각국의 배타적 경제수역(EEZ) 선포로 연안역에 대한 관심이 국제적으로 고조되고 있는 가운데 우리나라에서도 연안역 관리법(가칭)이 제정되었다. 국토해양부는 연안역 공간이용 효율성 극대화와 부존 해양자원의 치계적인 개발과 보전을 위하여 연안역 관리법을 특별법으로 제정하였으며 1998년 중에 시행령 등 하위법령을 제정해 시행키로 하였다. 이 이후로도 연안역 특별법에 대한 연구는 계속 진행중이며, 현제 연안역은 연안어업, 수산양식장, 모래채취, 염전, 해수욕장, 관광지, 해양시설, 간척, 매립지, 공업단지 등으로 많이 이용되고 있다. 그러나 연안역 안전시설에 대한 상세 설계기준 및 시공에 대해서는 자세히 다루고 있지 않다. 연안역은 관광객이 증가하면서 안전시설과 구난장비의 미비한 실정으로 인해 인적 물적 피해가 빈번히 발생 증가하고 있는 것으로 나타나고 있다. 안전사고의 다발지역을 분석해 보면 관광객으로 인하여 방파제 주변에서의 안전사고가 증가하고 있는 상황이며, 이로 인한 인명피해도 증가하고 있다. 방파제에 대한 안전사고를 막기 위하여 우선적으로 방파제에 대한 안전사고를 해결하고자 인명피해를 막는 구난시설들에 대한 간격 등의 기준을 제시하였다. 다른 지역에 비하여 연안역은 파도에 의하여 사람이 떠내려가는 것을 고려하여 구난시설의 간격을 해안이나 다른 안전시설에 비하여 더 짧게 하였으며, 구난시설이 피해자에게 빠르게 전달되고자 멀리 던진 수 있으며, 구난시설을 잡음과 동시에 숨을 쉴 수 있는 여건이 조성되도록 연구하였다. 안전사고를 효율적으로 방지하기 위하여 인간공학을 접한 안전시설을 연구를 하였다. 인간공학이란, 인간의 행동, 능력, 한계, 특성 등에 관한 정보를 발견하고, 이를 도구, 기계, 시스템, 과업, 직무, 환경의 설계에 응용함으로 인간이 생산적이고 안전하며 쾌적하고 효과적으로 이용할 수 있도록 하는 것이다. 인간공학은 인간이 사용할 수 있도록 설계하는 과정에 있어 인간의 활용성 및 편리성을 증대하는 학문으로 보며, 설계초기 단계에서부터 인간의 요소의 체계적인 고려를 필요로 하게 되었다. 이 논문은 과거에 일어났던 사고사례들을 주시하면서 앞으로의 미래에 똑같은 사고사례가 발생하지 않도록 예방하이 위하여 인간공학과 안전시설을 통하여 연안역의 안전시설의 설치기준에 도움이 되는 자료를 제공하고자 한다.

  • PDF

Studies on Sensory Evaluation -[Part I] New Modified $Scheff{\grave{e}}'s$ Method I- (관능검사(官能檢査)에 관(關)한 연구(硏究) -제1보[第1報] Scheffe's method의 제1신법(第1新法)에 대(對)하여-)

  • Hong, Jin
    • Applied Biological Chemistry
    • /
    • v.20 no.2
    • /
    • pp.210-220
    • /
    • 1977
  • Modified Scheff's Method by Ura is an efficient method used very often in studying quality at a laboratory but, when panels are not well controlled and quality differences among samples are very small, it has sometimes been identified that it is impossible to detect quality differences by this method. Therefore in order to enhance efficiency to rank quality among samples, 'New Modified Scheffe's Method 1' is designed. Experimental results presented in this paper lead to the conclusion that detection is carried out more efficiently by 'New Modified Scheffe's Method 1' than by Modified Scheffe's Method by Ura, and also this title method can be utilized for the aim to train and control panels.

  • PDF

Treatment of chronic kidney disease in children (소아의 만성신장질환의 치료)

  • Lee, Joo Hoon
    • Clinical and Experimental Pediatrics
    • /
    • v.52 no.10
    • /
    • pp.1061-1068
    • /
    • 2009
  • The treatment of pediatric patients with chronic renal disease comprises management of nutritional imbalance, fluid, electrolyte, and acid-base disturbances, mineral bone disease, anemia, hypertension, and growth retardation. The treatment also includes administration of appropriate renal replacement therapy, if required. Adequate dietary intake of carbohydrates, fats, and proteins and caloric intake must be encouraged in such patients to ensure proper growth and development. In addition, fluid, electrolyte, and acid-base status must be regularly monitored and should be well maintained. Serum calcium, phosphorus, and parathyroid hormone levels must be maintained at their target range, which are determined on the basis of the glomerular filtration rate, to avoid the development of mineral bone disease. This can be achieved by using phosphorus binders and vitamin D analogues. An erythropoiesis-stimulating agent must be administered along with iron supplementation to maintain the hemoglobin level of the patients between 11-12 g/dL. Hypertension must be controlled with adequate water and sodium balance and appropriate antihypertensive agents. Administration of recombinant human growth hormone is recommended to improve the final adult heights.

RFID Tag Ownership Transfer Protocol Using Lightweight Computing Operators (간단한 연산을 사용한 RFID 태그 소유권 이전 프로토콜)

  • Lee, Jae-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1413-1426
    • /
    • 2013
  • RFID thecnology has been widely adopted by industries for supply chain management. When a product item is manufactured RFID tag is attached to the product item and supply chain management among factories, distributors, retailers and customers needs to handle ownership transfer for the product item carefully. With RFID technology, the secure and efficient ownership transfer protocol is an important issue for the identification of product items and the overall system efficiency on supply chain. Many ownership transfer protocols have been proposed now. They have security problems and use complex operations such as encryption operation and hash function. Lo et al. proposed a protocol using lightweight operations such as shift, addition, XOR, and random number generation[1]. However, this protocol has a security problem in which the secret key between the tag and the new owner is disclosed to the attackers, and it is also weak against the Fraud attack[2]. In this paper, we propose a new ownership transfer protocol using lightweight operations such as shift, addition, and random number generation. This protocol is the modified version of Lo et al.'s protocol and is secure against the security attacks.