• Title/Summary/Keyword: Comprehensive Security

Search Result 441, Processing Time 0.022 seconds

Facility Maintenance Management System Using a Mobile Application (모바일 어플리케이션을 이용한 시설물 유지관리 시스템)

  • Joo, Young-Do
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1145-1151
    • /
    • 2012
  • Recently, the demand for mobile system is growing owing to the spread of smart phones to enable the real-time business process. This paper proposes the real-time facility maintenance management system using an android-based mobile application to apply to the facility defect/maintenance field for the apartment building complex. The proposed system model aims to develop the comprehensive management system to integrate the web and mobile system to lead to the realization of mobile office. The security measures required in the mobile system are technically analyzed and implemented on the system.

The Limited Investigation of the Cyber-police and the Reinforcement of its Investigative Ability (사이버경찰의 수사한계와 수사력 강화방안)

  • Choi, Eung-Ryul;Hwang, Young-Gu
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.379-407
    • /
    • 2004
  • The cyber-crime is one of the results occurring from the increased dependency toward information-telecommunication devices. Currently, the Korean National Police Agency and many other related law enforcement agencies have made efforts to respond against the cyber-crimes. However, the number of cyber-crime is increasing steadily. The worse problem is that the arresting rate for the cyber-crime has been decreased than before. The reasons of decreasing arresting rate come from many different kinds of cyber-crime methods with the developed computer and network technology, Also, the easy concealment of the cyber-crime by the violater and the difficulty of specification against the data objected to search and seizure make the crackdown difficult. The other difficulties come from the lack of professionally trained investigators, the lack of high-technological investigation devices, and the failure of the technology development for the search and seizure of evidences because of the budget deficit. That is to say, these phenomenon show the comprehensive problem of the cyber-police system. Accordingly, to respond against newly changed cyber-crime activities and to investigate effectively, the cyber-police has to take consideration into the professional reorganization of the cyber-police, the development of the investigation technology, and the adjustment of current cyber-crime laws. Most importantly, the cyber-police needs the high-technological investigation devices, the development of the investigation methods, and the training for the professional human resources with the enough budget support.J

  • PDF

Application Program Virtualization based on Desktop Virtualization (가상 데스크탑 기반에 응용프로그램 가상화)

  • Lim, Se-Jung;Kim, Gwang-Jun;Kang, Tae-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.595-601
    • /
    • 2010
  • Desktop virtualization technology running on the local computing system in the process of resource depletion or degradation, such as upgrading the system to solve problems and manage critical information and systems must be protected. In addition, a virtualized environment by constructing a convenient stand-virtualized infrastructure and user space, and security from external attack or internal flaw or a problem, even if the service fails to respond quickly and should help to recover. In this paper, a comprehensive virtualization technology based on the client's desktop virtualization technology elements needed to find a local computing environment more comfortable and stable in the proposed new virtualization technologies.

A Study for the Necessity of Restructuring Korea's Emergency Management Organization - Focused on Disaster.Emergency Preparation and Civil Defence Affairs - (정부의 위기관리 조직 재설계 필요성 연구 - 재난.비상대비.민방위업무를 중심으로 -)

  • Kim, Kook-Rae
    • Fire Science and Engineering
    • /
    • v.22 no.2
    • /
    • pp.1-8
    • /
    • 2008
  • With a purpose to set up an efficient national security system for both at war-time and peace-time, President Lee's government transferred the emergency management function from the Office of Prime Minister to Ministry of Public Administration and Security (MOPAS). As a result national emergency management system has been changed into diversified management system ; the function of comprehensive disaster control, emergency preparation to MOPAS, fire, civil defense and disaster management to NEMA and anti-terrorism to NIS, which produce another inefficiency. For this reason, this research presents desirable improvement alternatives through scrutinizing current governmental function and structure.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

Development of Integrated Monitoring Middleware System for 400km/h High Speed Railway Measurement Data (400km/h급 고속철도 계측데이터 통합 모니터링 미들웨어 시스템 개발)

  • Hwang, KyungHun;Na, JunSu;Song, ByungKeun;Yang, OKYul
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.61-68
    • /
    • 2013
  • Needs for a new technologies of infrastructure systems arose, following the development of next generation EMU(Electric Multiple Unit) train with maximum speed over 400km/h. For high-speed operation tests of the new EMU, a high-speed railway infrastructure test-bed was constructed in a 28km long section of the Honam High-speed Railway. Diverse sensors and monitoring system was installed for continuous monitoring of the railway. Due to such effort, further demands and needs of the integrated monitoring system was derived in a more comprehensive and long-term perspective.

A System for Improving Data Leakage Detection based on Association Relationship between Data Leakage Patterns

  • Seo, Min-Ji;Kim, Myung-Ho
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.520-537
    • /
    • 2019
  • This paper proposes a system that can detect the data leakage pattern using a convolutional neural network based on defining the behaviors of leaking data. In this case, the leakage detection scenario of data leakage is composed of the patterns of occurrence of security logs by administration and related patterns between the security logs that are analyzed by association relationship analysis. This proposed system then detects whether the data is leaked through the convolutional neural network using an insider malicious behavior graph. Since each graph is drawn according to the leakage detection scenario of a data leakage, the system can identify the criminal insider along with the source of malicious behavior according to the results of the convolutional neural network. The results of the performance experiment using a virtual scenario show that even if a new malicious pattern that has not been previously defined is inputted into the data leakage detection system, it is possible to determine whether the data has been leaked. In addition, as compared with other data leakage detection systems, it can be seen that the proposed system is able to detect data leakage more flexibly.

Features of the Impact of Social and Digital Changes on the System of Government Regulation of Banking Activity

  • Zalutska, Khrystyna;Pasichnyk, Vаsyl;Smolinska, Natalia;Grybyk, Igor;Antonova, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.217-222
    • /
    • 2022
  • The main purpose of the article is to study the features of the impact of social and digital changes on the system of government regulation of banking acitivity. The digital economy sets the vector along which socio-economic systems of micro-, meso-, macro-levels will develop in the long term, which necessitates research and a comprehensive analysis of digital transformation processes. Once a priority for individual innovative companies, today digital transformation has become a mass phenomenon, and the corresponding projects are vital for the success of not only individual companies, but also regions and countries. At the same time, this transformation itself is closely connected with the trend of servicing socio-economic systems and is largely implemented on its basis. Moreover, this relationship and the mechanism for its implementation remain insufficiently studied, which necessitates the development of tools for its identification, assessment and management. As a result of the analysis, the key aspects of the impact of social and digital changes on the system of state regulation of banking activities were identified.

Features and Tendencies of the Digital Marketing Use in the Activation of the International Business Activity

  • Zhygalkevych, Zhanna;Zalizniuk, Viktoriia;Smerichevskyi, Serhii;Zabashtanska, Tetiana;Zatsarynin, Serhii;Tulchynskiy, Rostislav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.77-84
    • /
    • 2022
  • The study highlights the features and trends of digital marketing for international business. To achieve these goals, the authors used a systematic approach that allows a comprehensive approach to the object of study, as well as used general and specific methods of scientific knowledge on the application of digital marketing for international business. The dynamics of the number of users of social networks in the world is analyzed, which allowed us to conclude about the steady trend of increasing the number of users of the Internet and social networks, as well as the time spent by users on social networks. The study of the dynamics of the number of users of social networks provides increased efficiency in the use of digital marketing tools to enhance international business. The most effective digital marketing tools for international business, including artificial intelligence, conversational marketing, chatbots, personalization, video marketing, live shopping, social media stories, interactive content, omnic marketing, augmented reality and technology immersion, native advertising, green marketing and mobile commerce.

Influencing Factors on the Acceptance of Blockchain Technology in Capturing and Sharing Project Knowledge: A Grounded Theory Study

  • Bardesy, Waseem S.;Alsereihy, Hassan A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.262-270
    • /
    • 2022
  • In the past two decades, there has been an increasing interest in project knowledge management, as knowledge is a crucial resource for project management success. Knowledge capture and sharing are two effective project management practices. Capturing and sharing project knowledge has become more efficient due to technological advances. Nevertheless, present technologies face several technical, functional, and usage obstacles and constraints. Thus, Blockchain technology might provide promising answers, yet, there is still a dearth of understanding regarding the technology's proper and practical application. Consequently, the goal of this study was to fill the gap in the literature about the adoption of Blockchain technology and to investigate the project stakeholders' acceptance and willingness to utilize the technology for capturing and sharing project knowledge. Due to this inquiry's exploratory and inductive characteristics, qualitative research methodology was used, namely the Grounded Theory research approach. Accordingly, eighteen in-depth, semi-structured interviews were conducted to collect the data. Concurrent data collection and analysis were undertaken, with findings emerging after three coding steps. Four influencing factors and one moderating factor were identified as affecting users' acceptance of Blockchain technology for capturing and sharing project knowledge. Consequently, the results of the study aimed to fill a gap in the existing literature by undertaking a comprehensive analysis of the unrealized potential of Blockchain technology to improve knowledge capture and sharing in the project management environment.