• Title/Summary/Keyword: Desktop personal computer

Search Result 29, Processing Time 0.025 seconds

Study on Disaster Recovery Efficiency of Terminal PC in Financial Company (금융회사 단말PC 재해복구 효율에 관한 연구)

  • Yi, Seung-Chul;Yoon, Joon-Seob;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.211-224
    • /
    • 2015
  • Financial companies have invested a lot in their disaster recovery system and exercised training more than once a year to comply related laws and regulations. But massive PCs(Personal Computers) became disrupted simultaneously and it took a lot of time to recover massive PCs concurrently when March 20 cyber attack occurred. So, it was impossible to meet the tartgeted business continuity level. It was because the importance of PC recovery was neglected compared to other disaster recovery areas. This study suggests the measure to recover massive branch terminal PCs of financial companies simultaneously in cost-effective way utilizing the existing technology and tests recovery time. It means that in the event of disaster financial companies could recover branch terminal PCs in 3 hours which is recommended recovery time by regulatory body. Other financial companies operating similar type and volume of branches would refer to the recovery structure and method proposed by this study.

A Study on Strategies of educating Linux in University (대학의 리눅스 교육 방안 연구)

  • 김정훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.12
    • /
    • pp.1759-1764
    • /
    • 2002
  • Linux was developed by Linus Torvalds at University of Helsinkyi, Finland. Today Linux becomes to compete with windows operation of Microsoft. and is adopted worldwide on IBM products. The British government is viewing Linux as a desktop operating system. In Tunisia, Linux is under consideration as the governmental operating system. Even Sun Microsystems, the powerful supplier in workstation and sewer market, is working on developing ways in using Linux. is now getting further attentions on governmental level in several countries. The growing interests in adopting Linux in computer operating systems are not on a personal preference level any more. A number of companies and organizations, even some governmental administrations start to see its potential capabilities and are looking for ways for its applications. The necessity of teaching Linux in university is, therefore, imminent and should be discussed in course development without delay. The purpose of this paper is showing the things to be considered, problem analysis and some solution as grafting Linux in university education.

  • PDF

A Study on the Advancement Planning of Telecommunications Infrastructure of Educational Facilities for e-Learning (e-러닝을 위한 교육시설의 정보통신 인프라 고도화 계획에 관한 연구)

  • Park, Tong-So;Park, Chan-Joo;Kang, Hee-Su
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.15 no.1
    • /
    • pp.17-25
    • /
    • 2008
  • As a study on the advancement planning for the telecommunications infrastructure of the educational facilities for the purpose of the proliferation of e-learning, this study was conducted with the intents of preparing for the design guidelines to be considered in the initial stage of an architectural design for applying WLANs(wireless LANs), which play a role as the international standard for next generation of telecommunications, to the educational facilities and of making a proposal for changes of the existing computer rooms according to the appearance of new teaching and learning tools, for example, digital textbooks, and the proliferation of personal information devices. In this study, the design guidelines were made by analyzing the elements to be applied to architecture designs as well as understanding the trend of the cabling, pathways and spaces requirements in the area of telecommunications after examining the relevant international standards, such as ANSI and TIA, etc., in order for applying WLANs to the educational facilities. In addition, a field survey was conducted targeting on the elementary schools in 'C' city in order to suggest a proposal for the improvements of operations and maintenance of the existing computer labs and computers. As the results of analyzing the data from the field study, it was surveyed that the following matters should be urgently improved in order for the schools to be developed as Ubiquitous schools in the future: First, the biggest hold-up is how to maintain the desktop computers well. Second, there are some limitations far the students to use the computers enough due to the lack of the number of computers. Third, the computer education for the students is limited to instructing the students in training themselves only for the functions of each kind of application software.

Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device (휴대용통신단말의 효과적인 보안관리를 위한 보안 재구성기법의 설계 및 구현)

  • An, Gae-Il;Kim, Ki-Young;Seo, Dong-Il
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.691-698
    • /
    • 2009
  • A mobile communication device is a small size of portable computer which provides communication service, such as smart phone and PDA. Currently, one of the biggest barriers in developing the mobile communication device is security issue. Even though there are excellent security functions which can remove the security issues, there is a problem that the mobile communication device can not be loaded with all the functions because it has low storage, poor computational power, and inconvenient user interface, compared to the desktop personal computer. This paper proposes a context-aware security reconfiguration scheme for effective security management of the mobile communication device. The scheme can provide the mobile communication device with the optimized security service which is most adapted to its current security context. Through the prototype implementation and the experiments of the proposed scheme, we have confirmed that the proposed scheme is excellent in terms of computing resource efficiency and usability, without degrading security level.

Multiple Method Authentication System Using Embedded Device (임베디드 기기를 활용한 다중 방식 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.7
    • /
    • pp.7-14
    • /
    • 2019
  • Users who use smartphone can using knowledge-based authentication, possession-based authentication, biometric-based authentication, and token-based authentication in order to access rights to systems requiring authentication. However, desktop computer users use method only ID and password, which are knowledge-based authentication factors, due to limitations of authentication devices, despite various authentication methods. In this paper, we designed and implemented a raspberry pi based authentication system that provides multiple authentication method of a user's desired type. The implementation system uses knowledge-based authentication, possessive-based authentication, biometric-based authentication, and token-based authentication. The proposed system can provide a security function that can be used by SMEs, which is difficult to hire a security officer due to the economic burden. The implemented system can be used not only for personal use but also for enterprise, and it can be applied to various fields such as finance and game.

Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis (유출트래픽 분석기반의 침입탐지시스템 설계 및 구현)

  • Shin, Dong-Jin;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.131-141
    • /
    • 2009
  • An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are growing quickly. This paper proposes an intrusion detection system based outflow traffic analysis. Many research efforts and commercial products have focused on preventing intrusion by filtering known exploits or unknown ones exploiting known vulnerabilities. Complementary to these solutions, the proposed IDS can detect intrusion of unknown new mal ware before their signatures are widely distributed. The proposed IDS is consists of a outflow detector, user monitor, process monitor and network monitor. To infer user intent, the proposed IDS correlates outbound connections with user-driven input at the process level under the assumption that user intent is implied by user-driven input. As a complement to existing prevention system, proposed IDS decreases the danger of information leak and protects computers and networks from more severe damage.

Automation of Dobson Spectrophotometer(No.124) for Ozone Measurements (돕슨 분광광도계(No.124)의 오존 자동관측시스템화)

  • Kim, Jhoon;Park, Sang-Seo;Moon, Kyung-Jung;Koo, Ja-Ho;Lee, Yun-Gon;Miyagawa, Koji;Cho, Hi-Ku
    • Atmosphere
    • /
    • v.17 no.4
    • /
    • pp.339-348
    • /
    • 2007
  • Global Environment Laboratory at Yonsei University in Seoul ($37.57^{\circ}N$, $126.95^{\circ}E$) has carried out the ozone layer monitoring program in the framework of the Global Ozone Observing System of the World Meteorlogical Organization (WMO/GAW/GO3OS Station No. 252) since May of 1984. The daily measurements of total ozone and the vertical distribution of ozone amount have been made with the Dobson Spectrophotometer (No.124) on the roof of the Science Building on Yonsei campus. From 2004 through 2006, major parts of the manual operations are automated in measuring total ozone amount and vertical ozone profile through Umkehr method, and calibrating instrument by standard lamp tests with new hardware and software including step motor, rotary encoder, controller, and visual display. This system takes full advantage of Windows interface and information technology to realize adaptability to the latest Windows PC and flexible data processing system. This automatic system also utilizes card slot of desktop personal computer to control various types of boards in the driving unit for operating Dobson spectrophotometer and testing devices. Thus, by automating most of the manual work both in instrument operation and in data processing, subjective human errors and individual differences are eliminated. It is therefore found that the ozone data quality has been distinctly upgraded after automation of the Dobson instrument.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

Design of Serendipity Service Based on Near Field Communication Technology (NFC 기반 세렌디피티 시스템 설계)

  • Lee, Kyoung-Jun;Hong, Sung-Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.293-304
    • /
    • 2011
  • The world of ubiquitous computing is one in which we will be surrounded by an ever-richer set of networked devices and services. Especially, mobile phone now becomes one of the key issues in ubiquitous computing environments. Mobile phones have been infecting our normal lives more thoroughly, and are the fastest technology in human history that has been adapted to people. In Korea, the number of mobile phones registered to the telecom company, is more than the population of the country. Last year, the numbers of mobile phone sold are many times more than the number of personal computer sold. The new advanced technology of mobile phone is now becoming the most concern on every field of technologies. The mix of wireless communication technology (wifi) and mobile phone (smart phone) has made a new world of ubiquitous computing and people can always access to the network anywhere, in high speed, and easily. In such a world, people cannot expect to have available to us specific applications that allow them to accomplish every conceivable combination of information that they might wish. They are willing to have information they want at easy way, and fast way, compared to the world we had before, where we had to have a desktop, cable connection, limited application, and limited speed to achieve what they want. Instead, now people can believe that many of their interactions will be through highly generic tools that allow end-user discovery, configuration, interconnection, and control of the devices around them. Serendipity is an application of the architecture that will help people to solve a concern of achieving their information. The word 'serendipity', introduced to scientific fields in eighteenth century, is the meaning of making new discoveries by accidents and sagacity. By combining to the field of ubiquitous computing and smart phone, it will change the way of achieving the information. Serendipity may enable professional practitioners to function more effectively in the unpredictable, dynamic environment that informs the reality of information seeking. This paper designs the Serendipity Service based on NFC (Near Field Communication) technology. When users of NFC smart phone get information and services by touching the NFC tags, serendipity service will be core services which will give an unexpected but valuable finding. This paper proposes the architecture, scenario and the interface of serendipity service using tag touch data, serendipity cases, serendipity rule base and user profile.