• Title/Summary/Keyword: Data base security

Search Result 197, Processing Time 0.037 seconds

A Study on improvement for disaster resilience of the smart city - Mainly on the data analysis in Great East Japan Earthquake (스마트시티의 재해회복력 향상을 위한 고찰 - 동일본 대지진 데이터 분석을 중심으로)

  • Chang, Hye-Jung;Kim, Do-Nyun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.4
    • /
    • pp.373-387
    • /
    • 2016
  • The citizen is going to live on security for better life stably in all times, and, as for such human basic desire, it is to the base which is important about the durability and the development of the smart city. I defined needs and the priority about the disaster recovery of the community as a citizen through date analysis until I came back to the normal environment again after a smart city suffered the damage by the misfortune in the study. I was going to suggest a method to support inhabitants of the damage area that was the immediate, and was necessary for a base in such date analysis and recovery of the community. I considered the Great East Japan Earthquake in an example in 2011. I studied the smart city plan which could improve the resilience of the local citizen and community through data utilization.

Central American Region Maritime Organization and their Role in the occurrence of maritime casualties

  • Rojas Oscar Porras;Imazu Hayama;Fujisaka Takahiko
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2006.10a
    • /
    • pp.166-175
    • /
    • 2006
  • Since many years ago and in spite of the existence of national regulations and international conventions ratified by the countries that are conformed the Central American Region (CAR), the seagoing maritime sector of this Region, has developed its activity without any type of safety measures. Therefore, a large number of people are known to die, disappear and suffer from serious injuries each year. These maritime casualties devastate the families affected by these events, and severely impact the local social and economic well-being. While all these accidents occurred in this Region, non government or any other official records are available recording these casualties Due to the lack of any historical written reports about maritime casualties occurred in this Region, the compilation of this type of accidents information and data was carried out directly by the researchers in the field. Also, all the information about the CAR Maritime Organization Components was too compiled by the authors from the respective National Maritimes Authorities. From the compiled information was elaborated the CAR maritime casualties data base and from the analysis of the above data base were determined the main causes of the maritime accidents occurred in the CAR. The lack of safety measures onboard and the ignorance of the presence and influence of atmospheric phenomena were among main factors that had been caused the maritime casualties in this Region. By other hand, from the analysis of the CAR maritime organization components, the existence of one level of organization very similar among them was determinate. The objective of this research was to analyze the role of the CAR maritime organization in the prevention of the occurrence of maritime casualties. The results of this study provides general understanding of the causes of this type of accidents in the CAR and basis for support in improving safety navigation system and measures so that the number of fatalities and maritime accidents may be reduced in the future.

  • PDF

Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs (프로그램의 오염 정보 추적을 위한 동적 오염 분석의 이론 및 구현)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.303-310
    • /
    • 2013
  • As the role of software increases in computing environments, issues in software security become more important problems. Dynamic taint analysis is a technique to trace and manage tainted data originated from unreliable sources during the execution of a program. This analysis can be applied to software security verification as well as software behavior understanding, testing unexpected errors, or debugging. In the previous researches, they focussed only to show the analysis results of dynamic taint analysis, and they did not logically describe propagation process of tainted data and analysis procedures. So, there were difficulties in understanding the analysis procedures or applying to other analysis. In this paper, by theoretically describing the analysis procedure, we logically show how the propagation process of tainted data can be traced, and present a theoretical model for dynamic taint analysis. In addition, we verify the correctness of the proposed model by implementing an analyser, and show that propagation of tainted data can be traced by the model. The proposed model can be applied to understand the analysis procedures of data flows in dynamic taint analysis, and can be used as an base knowledge for designing and implementing analysis method, which applies such analysis method.

A Study on Anomaly Signal Detection and Management Model using Big Data (빅데이터를 활용한 이상 징후 탐지 및 관리 모델 연구)

  • Kwon, Young-baek;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.287-294
    • /
    • 2016
  • APT attack aimed at the interruption of information and communication facilities and important information leakage of companies. it performs an attack using zero-day vulnerabilities, social engineering base on collected information, such as IT infra, business environment, information of employee, for a long period of time. Fragmentary response to cyber threats such as malware signature detection methods can not respond to sophisticated cyber-attacks, such as APT attacks. In this paper, we propose a cyber intrusion detection model for countermeasure of APT attack by utilizing heterogeneous system log into big-data. And it also utilizes that merging pattern-based detection methods and abnormality detection method.

On Study for the CIM By DAS(DATA Acquisition System) (CIM구축을 위한 생산현장의 정보화 사례연구)

  • Lee, Jong-Hyung;Lee, Youn-Heui
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.8 no.2
    • /
    • pp.69-76
    • /
    • 2005
  • This study for Customer Satisfaction(Customer Focus) by Profit security' in the field Process improvement activity and man-power upgrade by DAS(DATA Acquisition System) in the Plant that is fusion Off Line and On Line(IT), Especially the basic of the most foundation in the beginning Step of Toyota system is 3-jeong(a standard instrument; right volume, right box, right position), 5S(Seiri, Seiton, Seisoh, Seiketsu, Sitsuke ; KAISEN, KANBNA System(for Logistic), Further more KPC has established the digital environment such as CIM ; Computer Integrated Manufacturing), IMS ; Intelligent Manufacturing System ERP ; Enterprise Resource Planning, DAS; Data Acquisition System, Autonomous QC & SPC etc,.) in order to realize the intelligent informatization, which is core base for obtaining the competitive power and for responding to the various 21C management environment in flexibility. In this digital management environment, continuously and powerfully they would advance for becoming the best of the world. For strategic changes to take place in industry 3 key important factors need to be included ; Integration of tasks function and process, Decentralization of information, Responsibility, Finally simplification of products and product structures.

  • PDF

Designed and Implementation of Layered Configuration Management for the Efficient Management of Intranet (효율적인 인트라넷 관리를 위한 계층적 구성 관리 시스템 설계 및 구현)

  • 라연경;김호철;서승호;문해은;김영탁
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1228-1237
    • /
    • 2002
  • Network management is composed of five major functional areas, fault, configuration, account, performance and security management in the ITU standards. Configuration management identifies, exercises control over, collects data from network element node system and provides data to the management systems. The proposed architecture is designed based on the Distributed Processing Environment of CORBA(Common Object Request Broker Architecture) Spec v2.3. In this paper, configuration management system has been designed and implemented with layered managed object. It provides that integrated management of various data link layer technology. We suggest MIB(Management Information Base)/MIT(Management Information Tree) to support integrated management and distributed environment.

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

The Base of Understanding for Interdisciplinary Studies on Cyber Crimes - Centering on Regulations in Criminal Law - (사이버범죄의 학제간 연구를 위한 이해의 기초 - 형법상 규제를 중심으로 -)

  • Lim, Byoung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.237-242
    • /
    • 2008
  • This study aims to provide theoretical base in criminal law for engineers in the viewpoint of jurists to encourage interdisciplinary studies on cyber crimes. Apart from seriousness of discussion on torrent cyber crimes, a good effect of the internet networks such as sharing of information has bee emphasized while the evil influence of its side effect has been neglected. Therefore, this study suggests that we need to consider reinforcement of cyber ethics, and legal mind of IT technicians, strict security by managers, active efforts to develop legitimate contents by managers of web hardware and P2P, and reinforcement of punishments against crimes by internet users. And this study approaches new norms on computer and cyber crimes in interpretational sense of criminal law, and provides the theoretical base of the criminal law focusing on traditional theories, assumptions, and precedents involved in regulations against computer virus distribution.

  • PDF

The site application with 700kg/$\textrm{cm}^2$ high strength concrete (700kg/$\textrm{cm}^2$ 고강도 콘크리트의 현장적용)

  • 권영호;박정국;이보근;박칠림
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1993.10a
    • /
    • pp.124-131
    • /
    • 1993
  • A successful site application with 700kg/$\textrm{cm}^2$ ultra-high strength concrete was made by research team of Daewoo Institute of Construction Technology in Jinhae. Trial mixings of concrete, the productivity of batcher plant, the elapsed time and the pumpability had been investigated for the site condition, before the site application. As results, the efficiency of production by automatic batcher plant systems was improved and the method of quality control was estabilished for the security of fluidity due to the elapsed time, the pumping and consolidation and so on. The concrete strength cores as well as cylinders was showed more than 700kg/$\textrm{cm}^2$ for the required age. And this study would be provided valuable data base for the practical utilization of high strength concrete. Further, this study would be given new possibilities of high rise RC constructions.

  • PDF

Development of SVDB for performance improvement of security (보안 시스템의 성능 향상을 위한 SVDB 개발)

  • 이원영;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.11a
    • /
    • pp.17-21
    • /
    • 2002
  • 네트워크 보안의 중요성과 필요성이 증대됨에 따라 많은 조직들이 다양한 보안 시 스템을 네트워크에 적용하고 있다. 침입 차단 시스템, 침입 탐지 시스템, 취약점 스캐너와 같은 보안 시스템들이 취약성 정보를 공유하게 되면 일관된 통합 보안 환경을 구축할 수 있다. 본 연구진은 통합 보안 시뮬레이션 환경의 구축을 위해 여러 보안 시스템 모델들이 사용할 수 있는 취약성 정보들을 집약시킴으로써 보안 시스템간의 정보 공유를 쉽게 할 수 있는 SVDB (Simulation based Vulnerability Data Base)를 구축하였다. 네트워크의 한 구성요소인 SVDB는 보안 시스템 모델의 구성에 필요한 다양한 정보를 담고 있어 한 호스트나 네트워크가 갖는 취약성을 조기에 발견할 수 있다. 또한 SVDB는 침입 탐지 시스템과 같은 보안 시스템이 존재하는 네트워크를 시뮬레이션 하는데 필요한 보안 정보를 제공한다. 보안시스템을 위한 시뮬레이션 모델은 DEVS (Discrete EVent system Specification) 방법론을 사용하여 구성하였다. 또한 이렇게 구축된 시뮬레이션 모델들이 SVDB와 연동하기 위한 인터페이스 모듈을 구현하였다. 취약성 스캐너, 침입 탐지 시스템, 침임 차단 시스템이 정보를 공유함으로써 공격에 효과적인 대응하는 것을 시뮬레이션을 통해 보인다.

  • PDF