• Title/Summary/Keyword: Comprehensive Security

Search Result 447, Processing Time 0.021 seconds

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Development of Fitness Avatar Model for Increasing Physical Activity in Individual with Spinal Cord Injury (척수장애인 신체활동 증가를 위한 피트니스 아바타 모형 개발)

  • Kang, Sunyoung
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.65-70
    • /
    • 2014
  • The aim of this study is to suggest the fitness Avatar model for increasing physical activities in individuals with SCI(spinal cord injury). With the increasing of the disable, the ratio of individuals with SCI is also increasing. Avatar is a movable image that represents a person in a virtual reality environment or in cyberspace. With the expansion of new technology, such as video games and virtual reality, there has been an increase in the interest of using virtual reality in therapy. It is not easy for individuals with SCI to access tho sports facilities due to paraplegia. The increasing physical activities based on virtual reality will be the most innovative and future-oriented approach. First, building a system and establishing a comprehensive support system is essential to activate and spread variety of physical activities for individuals with SCI. Second, providing a appropriate feedback and identifying the effect of intervention will be considered.

The Study on the improvement plan for Military combat power by the future computer (미래형컴퓨터를 이용한 군전투력 발전방안 연구)

  • Heo, Yeong Dae
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.57-66
    • /
    • 2013
  • Predicting pattern of future combat ensures a successful war. It is possible to anticipate the shape of the future combat from the fighting method of US Army in the Iraq War. The fighting method: a series of combat progress by real time information to pinpoint strike using a guided weapon by GPS, an intelligence satellite and unmanned surveillance vehicle (USV), shows that real time unification combat power is key element for decide outcome of a war. The NCW is an organically connected network centric warfare paradigm by networking a factor of operation. In this paper, studied on the improvement plan for combat power by the future computer like a portable computer, an audio-recognized computer and non-keyboard computer. In addition, this paper attempts to establish a comprehensive intelligence network of Korea Marine Corps and to apply to combat or training.

Investigation of Secure Wireless Multihop Ad hoc Network (안전한 무선 Multihop Ad hoc 네트워크를 위한 연구)

  • Lee, Sang-Duck;Park, Jong-An;Han, Seung-Jo;Pyun, Jae-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.118-126
    • /
    • 2007
  • An ad hoc network is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies allowing people and devices to internetwork without any preexisting communication infrastructure. Although ad hoc network is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; ad hoc networks are known to be particularly vulnerable to security attack. It is difficult to establish a centralized key distribution center and a trusted certification authority to provide cryptographic keys and digital certificates to nodes. To prevent attacks in ad hoc routing protocols, many algorithms have been used. In this paper, we have depicted a secure framework for multipath routing in wireless multihop network, which is comprehensive solution for secure data forwarding in wireless multihop networks. With the simulation results, the proposed scheme is compared with existing source routing scheme.

  • PDF

A Study on Close-to-Nature River Management for the Disaster Prevention (재해예방 중심의 자연형 하천정비 방안에 관한 연구)

  • Seo, Jung Pyo;Cho, Won Chul
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.3
    • /
    • pp.19-27
    • /
    • 2013
  • Along with green growth era in the 21st century and with the increasing economic, social, and cultural stabilization, people expect absolute freedom from the drought and flood and long for ecological exchange in the waterfront as a part of the living base at the same time. In order to match the changes in social demand, the focus on the river management policy urgently requires a comprehensive river management that considers the nature's environmental and ecological aspects as well as a new disaster prevention approach that grows out of existing simple flood prevention. Therefore, this thesis provides feasible solutions by suggesting the following findings to maintain and manage rivers to be harmonized with the natural environment considering disaster prevention aspects. It is necessary to change the river management policy and integrated river basin management, to control the river management lead by the central government and to promote close-to-nature river management approach for environmentally sound and sustainable development.

A Study of Matrix Model for Core Quality Measurement based on the Structure and Function Diagnosis of IoT Networks (구조 및 기능 진단을 토대로 한 IoT네트워크 핵심품질 매트릭스 모델 연구)

  • Noh, SiChoon;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.45-51
    • /
    • 2014
  • The most important point in the QoS management system to ensure the quality of the IoT system design goal is quality measurement system and the quality evaluation system. This research study is a matrix model for the IoT based on key quality measures by diagnosis system structure and function. Developing for the quality metrics measured Internet of Things environment will provide the foundation for the Internet of Things quality measurement/analysis. IoT matrix system for quality evaluation is a method to describe the functional requirements and the quality requirements in a single unified table for quality estimation performed. Comprehensive functional requirements and quality requirements by assessing the association can improve the reliability and usability evaluation. When applying the proposed method IoT quality can be improved while reducing the QoS signaling, the processing, the basis for more efficient quality assurances as a whole.

The Effective Policy for the Establishment of Disaster Management System in Korea (우리나라의 효과적(效果的)인 재난관리체제(災難管理體制) 구책방안(構策方案)에 관한 연구(硏究))

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.83-116
    • /
    • 2000
  • Many concerns have been raised for importance of disaster management after 1990's numerous urban disasters in Korea. When the primary function of government is to protect lives and property of citizens, disaster management should be included in the mainstream of public administration and many hazard countermeasures should be carried out for that purpose. The principal purpose of this research is to establish ways and means needed to improve the disaster management system in Korea. This paper is split into five chapters. Chapter I is the introduction part. Chapter II introduces the reader to a disaster management theory, and deals with various disaster management systems of foreign countries such as the U.S.A. and Japan, Chapter III describes and characterizes the Korea's current disaster management system. The Korean disaster management system has been reestablished through the enactment of the Disaster Management Act of 1995 and the full revision of Natural Hazards Management Act of 1995 after series of catastrophic man-made disasters since 1993. Chapter IV is devoted to the establishment of an effective disaster management system in Korea. In this chapter, I discusses measures needed to improve the quality of CDMB(Central Disaster Management Bureau)'s service to the people. I strongly reemphasize the effectiveness of a comprehensive risk-based, all-hazard national emergency management system that addresses preparedness, mitigation, response, and recovery. To that end the Administration should develop legislation, new policies, and organizational plans to invigorate the agency with a refocussed mission. Chapter V is a conclusion. As the demand for citizens'welfare has been continuously increased in the localization, the importance of disaster management is emerging subject in the public sector. The disaster management carries out complicated affairs and manages diverse objects, the cooperation/connection system of the central-local government and citizens, and non-governmental organization should be established.

  • PDF

A Study on the Right to Housing in International Human Rights Laws and Instruments (국제인권법 및 인권규범의 주거권 규정에 대한 연구)

  • Kim, Yong Chang
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.3
    • /
    • pp.514-540
    • /
    • 2013
  • Today human rights are the most complex and prominent issue in the system of international law, and the right to housing(housing right) is also recognized as a basic human right in the international human right instruments including the Universal Declaration of Human Rights. This study targets to comprehensive review of the housing rights provisions with 85 international human rights laws and instruments. And the contents and characteristics of housing rights are analyzed with categorization based on housing rights in general, housing rights of workers, socially vulnerable groups, international regional organizations. Housing right takes also the features of universality, indivisibility, interdependence, and right to adequate housing should be interpreted with holistic view including legal security of tenure, accessibility, affordability, location beyond ensuring just a physical housing space. Approaches to the housing right comprehensively reflect the view of the right to development, the perspective of gender equality, the principle of non-discrimination, the participation rights, and orient the housing right should be seen as the right to live somewhere in security(safety), peace and dignity.

  • PDF

Ideology of Social Health Insurance and Health Policy (건강보험의 이념과 의료정책)

  • Lee, Kyu Sik
    • Health Policy and Management
    • /
    • v.28 no.3
    • /
    • pp.202-209
    • /
    • 2018
  • Health care has two different facets. One is commodity and another is a right of human being. Health care as a commodity is utilized by demand approach in market. Demand is determined by economic factors such as price and income. From the last third of the 19th century until the early 1920s, priority of sickness insurance was replacing the income that workers lost as a result of illness and injury. By the 1920s, the capacity of applied biological and medical science was remarkably developed. Development of medical science stimulated the cost of medical care, and the burden of increased medical care cost required new role of medical care security system. In 1942, Beveridge report was published in United Kingdom, and health care was considered as a right of human being. In 1948, United Nations declared heath care as a right in the Universal Declaration of Human Right. In most countries introduced new medical care security policy based on health care as a right. The viewing health care as a commodity must be shifted toward need based care as a right. Need were understood to rest on demographic, epidemiological, scientific, and medical knowledge factors. Bring needed care to the population could best be achieved institutionally by a hierarchy of provider organizations, guided by planning bodies, which would provide comprehensive benefits. In Korea, health care in social health insurance (SHI) is considered as a commodity not a right. However, health policies under SHI must be need approach based on health care as a right. Mismatch between health policies and ideology of SHI made big troubles. It is important to realize ideology of SHI for good health policies.

Damage Prediction of Infomation and Communication Facilities for Prolonged Power Outage (장기간 정전사태에 대비한 기반시설-정보통신시설-에서의 피해예측)

  • Song, Chang Young;Cho, In Uh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2012
  • Critical infrastructures (energy, information technology and communications, banking, transportation, public government services, etc.) are now more vital to modern society. Citizens, businesses and governments all rely on an array of interlinked physical and information infrastructures to satisfy their needs and perform their daily operations. At the same time, these infrastructures are becoming increasingly interdependent, such that failure of one of them can often propagate and result in domino effects. Recent dramatic episodes, from 9/11 to the Madrid train bombings, the April 2010 ash cloud the power cuts in Korea in 2011, and the cyber-attacks have highlighted the need for a comprehensive, internationally coordinated policy for the protection of critical infrastructures. For the purposes of this report, we define critical infrastructure as infrastructure whose failure would result in substantial damage to society and/or the economy.