• 제목/요약/키워드: Comprehensive Security

검색결과 441건 처리시간 0.026초

모바일 어플리케이션을 이용한 시설물 유지관리 시스템 (Facility Maintenance Management System Using a Mobile Application)

  • 주영도
    • 한국전자통신학회논문지
    • /
    • 제7권5호
    • /
    • pp.1145-1151
    • /
    • 2012
  • 최근 스마트폰 보급이 확대되고 기술이 발전함에 따라 오프라인 현장에서 언제 어디서나 온라인 정보를 활용하여 실시간 의사소통과 업무처리를 할 수 있는 시스템 요구가 증가하고 있다. 본 논문은 공동주택 및 각종 시설물 하자관리와 유지관리 업무에 적용될 수 있는 안드로이드 기반의 모바일 어플리케이션을 이용한 실시간 시설물 유지관리 시스템 모델을 제시하였다. 제안하는 시스템은 시설물 유지관리를 위한 제반 과정의 시스템화를 기초로 하여 모바일 오피스 구현이 가능한 웹/모바일 통합관리 시스템 개발을 목표로 하였다. 또한 모바일 시스템 개발 시 요구되는 기술적 보안체계도 분석하여 시스템에 구현하였다.

사이버경찰의 수사한계와 수사력 강화방안 (The Limited Investigation of the Cyber-police and the Reinforcement of its Investigative Ability)

  • 최응렬;황영구
    • 시큐리티연구
    • /
    • 제8호
    • /
    • pp.379-407
    • /
    • 2004
  • The cyber-crime is one of the results occurring from the increased dependency toward information-telecommunication devices. Currently, the Korean National Police Agency and many other related law enforcement agencies have made efforts to respond against the cyber-crimes. However, the number of cyber-crime is increasing steadily. The worse problem is that the arresting rate for the cyber-crime has been decreased than before. The reasons of decreasing arresting rate come from many different kinds of cyber-crime methods with the developed computer and network technology, Also, the easy concealment of the cyber-crime by the violater and the difficulty of specification against the data objected to search and seizure make the crackdown difficult. The other difficulties come from the lack of professionally trained investigators, the lack of high-technological investigation devices, and the failure of the technology development for the search and seizure of evidences because of the budget deficit. That is to say, these phenomenon show the comprehensive problem of the cyber-police system. Accordingly, to respond against newly changed cyber-crime activities and to investigate effectively, the cyber-police has to take consideration into the professional reorganization of the cyber-police, the development of the investigation technology, and the adjustment of current cyber-crime laws. Most importantly, the cyber-police needs the high-technological investigation devices, the development of the investigation methods, and the training for the professional human resources with the enough budget support.J

  • PDF

가상 데스크탑 기반에 응용프로그램 가상화 (Application Program Virtualization based on Desktop Virtualization)

  • 임세정;김광준;강태근
    • 한국전자통신학회논문지
    • /
    • 제5권6호
    • /
    • pp.595-601
    • /
    • 2010
  • 가상화 기술에서 데스크톱 가상화 기술은 로컬 컴퓨팅 시스템을 운영하는 과정에서 자원의 고갈이나 성능저하, 업그레이드 등과 같은 문제를 해결하고 시스템 관리 및 시스템의 중요한 정보가 보호될 수 있어야 한다. 또한, 가상화된 독립 환경을 구성하여 편리한 가상화된 사용자 영역 및 보안 인프라를 구축하며 외부로부터 공격이나 내부 결함으로 인해 문제가 발생하거나 서비스 장애가 발생하더라도 신속하게 대응하고 복구할 수 있도록 지원하여야 한다. 본 논문에서는 가상화 기술의 방대한 기술에서 데스크탑 기반의 응용프로그램 가상화에 필요한 기술 요소를 찾아내고 로컬 컴퓨팅 환경에서 보다 편리하고 안정된 새로운 가상화 기술을 제안하였다.

정부의 위기관리 조직 재설계 필요성 연구 - 재난.비상대비.민방위업무를 중심으로 - (A Study for the Necessity of Restructuring Korea's Emergency Management Organization - Focused on Disaster.Emergency Preparation and Civil Defence Affairs -)

  • 김국래
    • 한국화재소방학회논문지
    • /
    • 제22권2호
    • /
    • pp.1-8
    • /
    • 2008
  • 이명박 정부는 출범과 동시 대국 대과의 원칙을 가지고 정부조직을 15부 2처 체제로 대폭 축소 개편하였고 국가 위기관리 분야도 전시, 평시 대비 업무를 효율적으로 관리하기 위하여 행정안전부로 국무총리실의 비상기획 위원회 기능 등을 통합시켰으나 재난 안전관리, 비상대비, 위기상황 관리는 행정안전부가 소방, 재난관리와 민방위는 소방방재청이 대테러는 국가정보원에서 각각 관장하게 함으로써 행정안전부의 재난총괄, 비상대비, 위기 상황관리 업무가 소방방재청의 재난관리, 민방위, 재난 상황 관리 기능과 유사하게 중복되는 등 비효율적인 체제를 유지하고 있으므로 이에 대한 심도 있는 분석을 통하여 재난 비상대비 민방위 업무에 대한 정부의 바람직한 재난관리 조직 재설계 간을 제시하고자 함.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

400km/h급 고속철도 계측데이터 통합 모니터링 미들웨어 시스템 개발 (Development of Integrated Monitoring Middleware System for 400km/h High Speed Railway Measurement Data)

  • 황경훈;나준수;송병근;양옥렬
    • 융합보안논문지
    • /
    • 제13권6호
    • /
    • pp.61-68
    • /
    • 2013
  • 본 논문은 동력분산식 차세대고속열차가 최고속도 400km/h 이상으로 개발됨에 따라 차량의 최고속도 시험에 대비하여 호남고속철도 건설구간에서 인프라시스템 기술개발이 필요하여 국내에서는 유일하게 현재 호남고속철도 건설구간 중 28km 구간에서 400km/h급 고속철도 인프라를 구축하였다. 또한 계측장비의 설치 및 모니터링 시스템을 설치하여 선로의 지속적인 모니터링이 가능하도록 설계하였다. 이를 통해, 보다 포괄적이며 장기적인 관점에서 통합모니터링의 요구사항과 향후 연구방향을 확인할 수 있었다.

A System for Improving Data Leakage Detection based on Association Relationship between Data Leakage Patterns

  • Seo, Min-Ji;Kim, Myung-Ho
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.520-537
    • /
    • 2019
  • This paper proposes a system that can detect the data leakage pattern using a convolutional neural network based on defining the behaviors of leaking data. In this case, the leakage detection scenario of data leakage is composed of the patterns of occurrence of security logs by administration and related patterns between the security logs that are analyzed by association relationship analysis. This proposed system then detects whether the data is leaked through the convolutional neural network using an insider malicious behavior graph. Since each graph is drawn according to the leakage detection scenario of a data leakage, the system can identify the criminal insider along with the source of malicious behavior according to the results of the convolutional neural network. The results of the performance experiment using a virtual scenario show that even if a new malicious pattern that has not been previously defined is inputted into the data leakage detection system, it is possible to determine whether the data has been leaked. In addition, as compared with other data leakage detection systems, it can be seen that the proposed system is able to detect data leakage more flexibly.

Features of the Impact of Social and Digital Changes on the System of Government Regulation of Banking Activity

  • Zalutska, Khrystyna;Pasichnyk, Vаsyl;Smolinska, Natalia;Grybyk, Igor;Antonova, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.217-222
    • /
    • 2022
  • The main purpose of the article is to study the features of the impact of social and digital changes on the system of government regulation of banking acitivity. The digital economy sets the vector along which socio-economic systems of micro-, meso-, macro-levels will develop in the long term, which necessitates research and a comprehensive analysis of digital transformation processes. Once a priority for individual innovative companies, today digital transformation has become a mass phenomenon, and the corresponding projects are vital for the success of not only individual companies, but also regions and countries. At the same time, this transformation itself is closely connected with the trend of servicing socio-economic systems and is largely implemented on its basis. Moreover, this relationship and the mechanism for its implementation remain insufficiently studied, which necessitates the development of tools for its identification, assessment and management. As a result of the analysis, the key aspects of the impact of social and digital changes on the system of state regulation of banking activities were identified.

Features and Tendencies of the Digital Marketing Use in the Activation of the International Business Activity

  • Zhygalkevych, Zhanna;Zalizniuk, Viktoriia;Smerichevskyi, Serhii;Zabashtanska, Tetiana;Zatsarynin, Serhii;Tulchynskiy, Rostislav
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.77-84
    • /
    • 2022
  • The study highlights the features and trends of digital marketing for international business. To achieve these goals, the authors used a systematic approach that allows a comprehensive approach to the object of study, as well as used general and specific methods of scientific knowledge on the application of digital marketing for international business. The dynamics of the number of users of social networks in the world is analyzed, which allowed us to conclude about the steady trend of increasing the number of users of the Internet and social networks, as well as the time spent by users on social networks. The study of the dynamics of the number of users of social networks provides increased efficiency in the use of digital marketing tools to enhance international business. The most effective digital marketing tools for international business, including artificial intelligence, conversational marketing, chatbots, personalization, video marketing, live shopping, social media stories, interactive content, omnic marketing, augmented reality and technology immersion, native advertising, green marketing and mobile commerce.

Influencing Factors on the Acceptance of Blockchain Technology in Capturing and Sharing Project Knowledge: A Grounded Theory Study

  • Bardesy, Waseem S.;Alsereihy, Hassan A.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.262-270
    • /
    • 2022
  • In the past two decades, there has been an increasing interest in project knowledge management, as knowledge is a crucial resource for project management success. Knowledge capture and sharing are two effective project management practices. Capturing and sharing project knowledge has become more efficient due to technological advances. Nevertheless, present technologies face several technical, functional, and usage obstacles and constraints. Thus, Blockchain technology might provide promising answers, yet, there is still a dearth of understanding regarding the technology's proper and practical application. Consequently, the goal of this study was to fill the gap in the literature about the adoption of Blockchain technology and to investigate the project stakeholders' acceptance and willingness to utilize the technology for capturing and sharing project knowledge. Due to this inquiry's exploratory and inductive characteristics, qualitative research methodology was used, namely the Grounded Theory research approach. Accordingly, eighteen in-depth, semi-structured interviews were conducted to collect the data. Concurrent data collection and analysis were undertaken, with findings emerging after three coding steps. Four influencing factors and one moderating factor were identified as affecting users' acceptance of Blockchain technology for capturing and sharing project knowledge. Consequently, the results of the study aimed to fill a gap in the existing literature by undertaking a comprehensive analysis of the unrealized potential of Blockchain technology to improve knowledge capture and sharing in the project management environment.