• Title/Summary/Keyword: Access Security System

Search Result 1,039, Processing Time 0.025 seconds

A study of the methodology for the long-term preservation of electronic records : focus on the preservation concept (전자기록물의 장기보존을 위한 방안 연구 : 개념을 중심으로)

  • Nam, Sung-Un;Yoon, Dai-Hyun
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.2
    • /
    • pp.101-119
    • /
    • 2001
  • In this paper we explain the definition and component of electronic records, and reestablish the principle of the preservation. Also we discuss the conceptual approaches and requirements for long-term preservation in an electronic environment. The preservation in digital environment is to protect itself of record identity with the reliability and authenticity, and to ensure the accessibility of records. It needs to be periodical migration along with digital environment change for the long-term preservation of the electronic records. and to select software independent standard format. to ensure the integrity of electronic records along with this preservation strategy, process and relative information required for digital preservation are to record in the form of metadata. The preservation system is separated into four functional entities ; registration process, preservation process, access process, main record management system. Also, this article is conceptually to introduce the selection criteria of storage media, the security provision for the archive collections and the disaster recovery which apply to the digital archives.

A Polyline Watermarking Scheme for GIS Vector Map (GIS 벡터맵 폴리라인 워터마킹 방법)

  • Kim, Jun-Hee;Lee, Suk-Hwan;Kwon, Seong-Geun;Park, Seung-Seob;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.582-593
    • /
    • 2010
  • Recently the commercial value of GIS(geographic information system) has been increased with growing application demands of spatial information in life space. Also, GIS has been expanded to the integrated information system that provides the ease access to map information by public users and also the combined service of GIS map data and various multimedia contents. But several security problems of GIS map data have brought up at GIS industries, such as the illegal copy and distribution of GIS map data. Furthermore, the copyright protection of GIS map data has not been researched yet compared with image and video contents. This paper presents a polyline based watermarking scheme for the copyright protection of GIS vector map. The proposed scheme analyzes the structure of vector map and embeds adaptively the watermark by using the distance distribution of polyline components. From experimental results, we verified that the proposed scheme satisfies the invisibility and the robustness of geometrical attacks.

A Exploratory Study of Confidential Document Circulation System Design (기밀문서 유통체계 설계에 관한 탐색적 연구)

  • Chang, Hang-Bae;Kim, Heung-Gook
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.462-470
    • /
    • 2011
  • Since, Davis(1991) has proposed the TAM(Technology Acceptance Model) through a literature review of informatization promotion, which insists that a user conveniency is judged by the degree of effectiveness caused by IT, the advancement of IT such as the Internet, e-mail, electronic data exchange, and groupware have brought into various changes in ordinary corporations and public institutions. However, with the right function, the advancement of IT has provided various benefits including additional reverse functions. Based on an integrated environment of business process, unauthorized user could access to information and a management of information becomes more difficult than before due to informatization of critical information. Furthermore, external hacking or information leakage by insider becomes easier owing to advancement in communication technology. This study has tried to develop a specified management procedure and implementation method for confidential documents.

Ransomware attack analysis and countermeasures of defensive aspects (랜섬웨어 공격분석 및 방어적 측면의 대응방안)

  • Hong, Sunghyuck;Yu, Jin-a
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.139-145
    • /
    • 2018
  • Ransomeware is a kind of malware. Computers infected with Ransomware have limited system access. It is a malicious program that must provide a money to the malicious code maker in order to release it. On May 12, 2017, with the largest Ransomware attack ever, concerns about the Internet security environment are growing. The types of Ransomware and countermeasures to prevent cyber terrorism are discussed. Ransomware, which has a strong infectious nature and has been constantly attacked in recent years, is typically in the form of Locky, Petya, Cerber, Samam, and Jigsaw. As of now, Ransomware defense is not 100% free. However, it can counter to Ransomware through automatic updates, installation of vaccines, and periodic backups. There is a need to find a multi-layered approach to minimize the risk of reaching the network and the system. Learn how to prevent Ransomware from corporate and individual users.

SaaS-based construction process transfer and Safety Management System (SaaS기반의 건설공정전송 및 안전관리 시스템)

  • Kim, Eui-ryong;Jung, Soo-Sung;Kim, Young-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.735-737
    • /
    • 2015
  • In this paper, SaaS (Software as a Service) based transport and construction process safety management systems by utilizing the construction work process management and safety management and schedule, and results for various types of construction process, achieved through high-speed wireless Internet access by applying to ensure a systematic means for safety and can quickly and accurately manage all made within the process control system. The operator should be indicated by using a smart phone to work as a supervisor report the current status and results of the operation. Also be reported to the supervisor immediately in an emergency situation and there is no vibration occurs over a period of time the smartphone is to check the danger to the operator. If the commissioner is directed to specific business processes that establish and verify the results obtained and the result is satisfied by presenting the part down the measures insufficient command of the field workers risk situations. In the case of software (server) to store all the data relating to the operation member in charge of management and security.

  • PDF

Automatic Door System Performance Improvement Study by the disturbance compensation (외란보상을 통한 자동문 시스템 성능 개선연구)

  • Park, Won-Hyeon;Kim, Min;Jeong, Jae-Hoon;Lee, Dong Heon;Choi, Myoung Hoon;Lim, Jae Jun;Byun, Gi-Sik;Kim, Gwan-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.734-736
    • /
    • 2016
  • Doors are in various buildings, such as large retail stores, hospitals, restaurants, government offices and is used as a door to provide convenience for customers, the convenience of security to control doors and exterior access Castle, etc. In the case of housing door facilities It has been used widely. However, the conventional automatic door controller Although the primary use of the PID control, the contact size and weight depending on the location to cause an instability in the system controller or the like, and disturbance of parameter variation and uncertain dynamics because of the wide variations. In this paper, we design a robust controller to compensate for uncertainties and to compensate for the disturbance.

  • PDF

A Study on the IUU Governance System of Regional Fishery Management Organization and Major State (국제 지역 수산 관리 기구와 주요 국가의 IUU 통제제도 연구)

  • Park, Min-Gyu
    • The Journal of Fisheries Business Administration
    • /
    • v.41 no.3
    • /
    • pp.103-127
    • /
    • 2010
  • The FAO reports that IUU fishing activities have widespread economic, social, and management consequences, including depriving legitimate fishers of harvest opportunities. It affects all fisheries from small scale to industrial. It also affects the ability of governments to support sustainable livelihoods for fishers and, more broadly, to achieve food security. The complexity of IUU requires various measures to combat IUU fishing such as adoption of IUU vessel lists; stronger port State controls; improved monitoring, control and surveillance (MCS); implementation of market-related measures to help ensure compliance; and capacity-building assistance. Trade and market measures reduce opportunities for IUU fishing activities by precluding or impeding access to markets for IUU product in a manner consistent with international law. ICCAT, CCAMLR, and IATTC, have put in place trade tracking programs or catch documentation schemes, and WCPFC is considering such a program. Vessel lists assist enforcement authorities in determining which vessels are or are not authorized to be fishing or conducting fishing support activities in specified areas. A number of RFMOs maintain records of IUU vessels: CCAMLR, IATTC, ICCAT, NAFO, NASCO, NPAFC, WCPFC. Section 608 of the US MSRA calling on the Secretary of Commerce, in consultation with the Secretary of State, and in cooperation with relevant regional fishery management councils and any relevant advisory committees, to take actions to improve the effectiveness of international fishery management organizations in conserving and managing stocks under their jurisdiction. EU IUU Regulation entered into force on 1 January 2010, was intended to regulate the highly complex multi-channel fisheries supply system of the European Community (EC) in an effort to improve global fisheries sustainability.

Real time Monitoring System using Web Camera (웹 카메라를 통한 실시간 모니터링 시스템)

  • Ryu, Kwang-Hee;Choi, Jong-Kun;Im, Young-Tae;Park, Yeon-Sik;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.667-670
    • /
    • 2005
  • As security and surveillance have become the center of interest, remote controlled CCTV(Closed-Circuit Television) market has been formed while rapid development of digital image compression technology and Internet triggered the advent of web cameras. The characteristic of web camera is that it can provide users with higher quality image than CCTV at any place where Internet access is available. However, As for the system administrator, the existing web camera have disadvantage in that they allows users only. who are connected to the server of the web camera, to see the image from it. In this paper, in order to make up for this defect, designed multi-vision interface showing multi images on single screen and, for the purpose of the improvement in efficiency, the functions of saving images and of scheduling the time to save the images.

  • PDF

An Anti-Trojan Horse Mechanism with Attached Data from Developers (개발자 첨부 자료에 의한 트로이 목마 대응 기법)

  • Cho, Eun-Sun;Yeh, Hong-Jin;Oh, Se-Chang;Hong, Sun-Ho;Hong, Man-Pyo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.4
    • /
    • pp.220-231
    • /
    • 2002
  • Trojan-horse programs are the programs that disguise normal and useful programs but do malicious thing to the hosts. This paper proposes an anti-Trojan horse mechanism using the information attached to the code by the developers. In this mechanism, each code is accompanied with the information on their possible accesses to resources, and based on this information users determine whether the code is malicious or not. Even in the case a code is accepted by users due to its non-malicious appearance, its runtime behaviors are monitored and halted whenever any attempts to malicious operations are detected. By hiring such runtime monitoring system, this mechanism enables detecting unknown Trojan horses and reduces the decision-making overhead being compared to the previous monitoring-based approaches. We describe the mechanism in a formal way to show the advantages and the limitations of the security this mechanism provides.

Pig production in Africa: current status, challenges, prospects and opportunities

  • Akinyele O. K. Adesehinwa;Bamidele A. Boladuro;Adetola S. Dunmade;Ayodeji B. Idowu;John C. Moreki;Ann M. Wachira
    • Animal Bioscience
    • /
    • v.37 no.4_spc
    • /
    • pp.730-741
    • /
    • 2024
  • Pig production is one of the viable enterprises of the livestock sub-sector of agriculture. It contributes significantly to the economy and animal protein supply to enhance food security in Africa and globally. This article explored the present status of pig production in Africa, the challenges, prospects and potentials. The pig population of Africa represents 4.6% of the global pig population. They are widely distributed across Africa except in Northern Africa where pig production is not popular due to religio-cultural reasons. They are mostly reared in rural parts of Africa by smallholder farmers, informing why majority of the pig population in most parts of Africa are indigenous breeds and their crosses. Pig plays important roles in the sustenance of livelihood in the rural communities and have cultural and social significance. The pig production system in Africa is predominantly traditional, but rapidly growing and transforming into the modern system. The annual pork production in Africa has grown from less than a million tonnes in year 2000 to over 2 million tonnes in 2021. Incidence of disease outbreak, especially African swine fever is one of the main constraints affecting pig production in Africa. Others are lack of skills and technical know-how, high ambient temperature, limited access to high-quality breeds, high cost of feed ingredients and veterinary inputs, unfriendly government policies, religious and cultural bias, inadequate processing facilities as well as under-developed value-chain. The projected human population of 2.5 billion in Africa by 2050, increasing urbanization and decreasing farming population are pointers to the need for increased food production. The production systems of pigs in Africa requires developmental research, improvements in housing, feed production and manufacturing, animal health, processing, capacity building and pig friendly policies for improved productivity and facilitation of export.