• Title/Summary/Keyword: External Threats

Search Result 141, Processing Time 0.025 seconds

Development of Baby Care Mobile Application Using Smart Sensor (스마트 센서를 이용한 Baby Care 모바일 어플리케이션 개발)

  • Chung, Jae-Pil
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.643-647
    • /
    • 2015
  • Nowadays, ubiquitous technology which combines sensors and network technology is emerging and it is called ubiquitous sensor network (USN). In this paper, mobile application for baby care using smart sensor is proposed. The proposed mobile application consists of mobile networks to transfer the information. It detects various information such as falling detecting, crying and fever detecting of infants. It keeps infants from external threats. The developed mobile application will be examined by simulation.

A Security Platform based on CORBA and its Application (CORBA 기반의 보안 플렛폼과 그 응용)

  • Na, Jung-Chan;Kim, Yeong-Gyun;Kim, Gyeong-Beom;Kim, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3278-3288
    • /
    • 1999
  • This paper proposes a security platform, called SCAP(Security platform for CORBA based APplication), to cope with potential threats in a distributed object system. SCAP supports CORBA security specification announced by OMG. SCAP is comprised of four functional blocks, which co-work with ORB to provide security services: Authentication Block, Association Block, Access Control Block, and Security Information Management Block. It is designed to support Common Secure Interoperability Functionality Level 2, which is useful for large-scale intra-, or inter-network based applications. Actual security services, which are dependent on supporting security technology, will be provided as external security service for replace ability. Implementation issues such as how to simulate an interceptor mechanism using a commercial ORB product without source code, and how to extend Current object required for security services are also described. At the end of the paper, the SCAP applied to the web environment is described to show its practical utilization.

  • PDF

A Study on the Strategic Management of University Library (대학도서관 경영전략에 관한 연구)

  • 박인웅
    • Journal of Korean Library and Information Science Society
    • /
    • v.30 no.3
    • /
    • pp.97-116
    • /
    • 1999
  • The purpose of this paper is to develop a model of the strategic management of university library in Korea. The model from this study is summarized as follows: 1. External environment is divide into opportunities and threats. 2) Internal environment is divide into strengths and weakness. We can formulate a management strategy on the basis of library environment element from environment analysis and library situation. 2. Formulation of strategic management are formulated through three stages. 1) Library strategy: $\circled1$Growth strategy $\circled2$Stability $\circled3$Retrenchment 2) Business(competition) strategy 3) Functional strategy: $\circled1$Material organization strategy $\circled2$Collection strategy $\circled3$Reference service strategy $\circled4$Human resource management strategy $\circled5$marketing strategy 3. Implementation of strategic management 1) The chief of strategy implementation 2) Programs, budgets and procedures 3) Structure and strategy implementation 4) culture and strategy implementation 4. Evaluation and control of strategy implementation.

  • PDF

Study on Improvement for Information System Installation for e-Government's Internal Control through Legal Review : Focused on Barum e-System (전자정부의 내부통제를 위한 정보시스템 도입에 있어서 제도적 개선방안에 관한 연구 : 바름 e 시스템을 중심으로)

  • Lee, Dong Han;Lee, Ook
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.179-193
    • /
    • 2013
  • E-Government refers to government to use ICT (information and communications technology) to work more effectively, share information and deliver better services to the public. With ICT, e-Government has increased transparency of governments. However even there has been much trial for transparency, corruption has been growing with the form of e-corruption. While external threats such as hackers and viruses can have serious consequences, currently most crime involving emerging technology is carried out by insiders i.e. employees in the e-government. Among the many tools being developed to fight e-corruption, there has been much focus lately on internal control system. So, South Korea developed and test-operated "Barum e-system" for internal control last year. This research establishes legal basis, information system link and privacy policy for settlement of this information system through legal review.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

A Study on the Smart Medical Equipment Management Program (Secure-MEMP) Method Considering Security (보안성을 고려한 스마트 의료기기 관리(Secure-MEMP) 방법에 관한 연구)

  • Kim, Dong-Won
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.63-72
    • /
    • 2021
  • The hospital biomedical engineering team is responsible for establishing and regulating the Medical Device Management Program (MEMP) to ensure that medical devices are safe and reliable. As technology advances, medical devices such as artificial intelligence and precision medicine are developing into a form that allows connection between objects anytime, anywhere, and as various technologies converge, internal and external security threats continue to increase. In this paper, we present a study of the Medical Device Management Program (Secure-MEMP) method, considering that the security threat of medical devices continues to increase due to advances in technology.

A Decision Making Model Proposal for Firewall Selection

  • Akturk, Cemal;Cubukcu, Ceren
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3588-3607
    • /
    • 2021
  • Covid-19 pandemic required all the world to use internet more actively. As a result, individuals and businesses are more open to digital threats. In order to provide security within the network, firewalls should be used. Firewalls act as a gateway between the corporate and the external networks. Therefore, it is more important than ever to choose the right firewall for each network. In this study, a new linear decision making model is proposed in order to find out the most suitable firewall and the estimates are completed according to this new model. Also, this model is compared with multi-objective optimization on the basis of ratio analysis (MOORA) method. This study distinguishes from other studies by proposing a new solution which ranks the firewall alternatives using linear and MOORA approaches. These approaches are used in many fields before but not in information technologies. Thus, this study can be considered quite innovative in terms of the problem it handles and the approaches used. It offers up-to-date and practical suggestions related to a decision making problem that has not been previously studied in the literature.

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.

Success Factors of Paris Baguette's Bakery Franchise Business: Industry Competition and Core Competence Analysis

  • Jeong, Jaeseok;Jeong, Hannara;Ko, Kihyeon;Moon, Junghoon;Kang, Hyoung Goo
    • Asia Marketing Journal
    • /
    • v.15 no.2
    • /
    • pp.1-27
    • /
    • 2013
  • The main goal of this study is to examine the competition intensity in the Korean bakery franchise industry and to identify the core competencies of the industry's leading company, Paris Baguette. The frameworks of PEST analysis, Cross Impact analysis, a Five Forces Model, a Value Chain, and VRIO analysis. PEST and Cross Impact analysis were employed to investigate the industry's external environment, and the results indicated that 'increased attention on corporate's Creating Shared Value (CSV) activities' is the most influential factor among others. The analysis using the Five Forces Model found industry rivalry and substitutes were the greatest threats. Finally, the results of Value Chain and VRIO analysis identified four core competencies of Paris Baguette: its CEO's craftsmanship, e-procurement system, quality of dormant dough, and hub system. Multiple managerial implications are suggested for practitioners in the marketing area, especially in the saturated market environment.

  • PDF

Design and Implementation of Web-based SWOT Analysis Supporting Tool (웹 기반의 SWOT 분석 지원도구 설계 및 구현)

  • Hwang, Jeena;Seo, Ju Hwan;Lim, Jung-Sun;Yoo, Hyoung Sun;Park, Jinhan;Kim, You-eil;Kim, Ji Hui
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.1-11
    • /
    • 2017
  • The best business strategy leading to innovation and productivity can be achieved by carefully analyzing internal and external environments of a company. Many companies often require, but difficult to find a tool to determine their own internal/external environmental factors including strengths, weaknesses, opportunities and threats(SWOT). SWOT is one analytical base model that is utilized in this research to design semi-automated environmental analysis process. This study investigates on SWOT generation system that is built on existing analysis database created by experts in each field. Companies can search and choose their best expressing environmental elements that are stored in the database. This semi-automated SWOT tool is expected to contribute that companies can recognize their internal capabilities more accurately, and help consider external environment changes around them.